On Wed, 12 Mar 2003, Chuck Yerkes wrote:

> I'm not sure if slackware can count as a vendor.

The distribution is sold and there are outfits offering commercial support.

> The issue is this was a highly sensitive problem and the person
> notified had to be 1) trusted and 2) under NDA.  Deeply under
> NDA until it was revealed.

Uh, says who?

As a direct result of the sendmail shenanigans, plus CERT's recent
statements regarding who does and doesn't get heads-up prior to
dosclosure, I was expecting that people would start simply announcing
vulnerabilities to bugtraq and other full disclosure lists without
bothering to give the usual 7 day lead time.

I'd say the Qpopper announcement is just the start of it.

Having people threatened with jailtime using the Homeland security act
should they disclose a security vulnerability is just plain over the
top. Expect to see the announcements start coming from countries where
it would be quite hard for the USA to trace the senders.


> As for exploits, I'm aware of a couple anti-stack smashing kernel
> patches that Linux ignores regularly.

I'm aware of them. There are reasons for not including them as standard
 - they break on various architectures as currently distributed.

>  I expect that from Sun, but
> open source projects are able to be agile enough to actually work
> on security.  I just wish Linus would.

Linus is just the coordinator these days (and in the development trees
he's farmed that off to Alan, Rik and Marcelo). It takes someone to
write the code and then at least 4-5 more people to audit it before it's
declared ready for inclusion in the experimental kernels...


AB


Reply via email to