if ppl stop giving "special" consideration to security, the quality of
security enforcement could come down. Ideally we like to "clean" all
bugs. But as is pointed out, bugs are many. Prioritizing bugs and
"dealing with a strong deadline" is vitally important. classification
of bugs into domain is the most effective way to deal with them. Not
only does it help people concerened in the area to be aware..fast. but
also it helps in "discussiong" it with like-minded people. Posting a
security bug in a general list will prove a little hard, as the people
may not know what meat-in-the middle, priviledge escalation..etc mean.
Its just bare stupidity to "clout" the bug space by generalizing it.
One more point, The security bugs are important because the harm done
is usually "crafted", with "bad intentions" and "on purpose". It also
leads to financial "theft" an d"crimes" than just the normal loss of
data or worktime(as in normal bug). You could get pennnalized as
abeiting the crime. But a gui crash is always less severe. People can
quickly loose trust in the software and the services that depend on
them can be irrecoverabliy damaged. Think about it.... there are more
people engaged in penetrating, propagating security holes than filing
common bug reports.... it definitely isnt a time-waster for them.

Hats of to open bsd people... its my second best distro for my
boundary router/firewall(if i dont use cisco that is.). My first
choice will be a kernel i "audited" myself... since i cant invest in
it... openbsd does a good job too... ;)

On Wed, Jul 16, 2008 at 11:03 PM, Siju George <[EMAIL PROTECTED]> wrote:
> http://article.gmane.org/gmane.linux.kernel/706950
>
> Again a mis representation in pulic?
>
> --Siju
>
>



-- 
As soon as men decide that all means are permitted to fight an
evil, then their good becomes indistinguishable from the evil
that they set out to destroy.
 - Christopher Dawson, The Judgment of Nations

Reply via email to