I can see why you think it is (as i originally marked) no security
vulnaribility, but that opens the need for an exact definition of what
security issues are.

Let me explain (you might have overseen it): I have to coldshut the
system, means i have to drop the power and retart to get access back.
And this, due to massive caching of any Linux Distribution is for sure a
security issue.

You might want to say, Ubuntu Lucid Lynx is in Alpha stage so it is not
useful to treat such a bug as a sec issue. But what for are people like
me then?

If you (engineers of the distribution) would be able to automatically
test and simulate any user experience in virtual, then there would be no
need to announce these bugs.

Instead of sorting anything out to lower levels you should avoid these
tactics, because a problem (a full freeze of the system is a problem)
has to have a top priority; Imagine, what if network connections are
open, but only the ui isn't reacting, what about shared data? Can you
ensure that this behaviour does not allow access to the machine from the
outside? Or do you mind that any user having such an issue should stop
any router (wifi access) or unplug from the network? What if that leads
to a mo' massive problem because of lost packets, which might be harming
much more while updating system.

However, i'm not into internals, but you might take the catch and try to
step away from this 'let us work less, because it seems to be a
philosophical problem'

I'm very annoyed of people who state themselves pro's but aren't pro
enough to find solutions to conflicts, instead sort things out and let
them hang there for a while. You're right it might be better, to wait
until thousands and more have issued this problem.

Thanks for your patience.

Claudius Raphael Paeth, A3lyphe
A3lyphe.Boss | b...@a3lyphe.de

-- 
Ubuntu.LucidLynx.x64::UpdateManager; After partially upgrade the main menu 
shows doubled items/shortcuts
https://bugs.launchpad.net/bugs/501669
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to