| ▲ | JCattheATM 5 hours ago | |
> From their perspective, on their project, with the constraints they operate under, bugs are just bugs. That's a pretty poor justification. Their perspective is wrong, and their constraints don't prevent them from treating security bugs differently as they should. | ||
| ▲ | ada0000 5 hours ago | parent [-] | |
> almost any bugfix at the level of an operating system kernel can be a “security issue” given the issues involved (memory leaks, denial of service, information leaks, etc.) On the level of the Linux kernel, this does seem convincing. There is no shared user space on Linux where you know how each component will react/recover in the face of unexpected kernel behaviour, and no SKUs targeting specific use cases in which e.g. a denial of service might be a worse issue than on desktop. I guess CVEs provide some of this classification, but they seem to cause drama amongst kernel people. | ||