| ▲ | fresh_broccoli 3 hours ago | |||||||||||||||||||||||||
>the reporter should not be the one responsible for reporting separately to every single downstream of the thing they found a vuln in. Not "separately to every single downstream", there is the "linux-distros" mailing list for disclosures: https://oss-security.openwall.org/wiki/mailing-lists/distros This random blogpost from 2022 serves as a proof that disclosing kernel vulnerabilities to the distros list is a well-known practice: https://sam4k.com/a-dummys-guide-to-disclosing-linux-kernel-... I agree it's a shame that the process isn't more streamlined and the kernel developers aren't forwarding the reports to the distros list. | ||||||||||||||||||||||||||
| ▲ | tptacek 3 hours ago | parent | next [-] | |||||||||||||||||||||||||
It is literally not the vulnerability researcher's problem to solve or address this. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
| ▲ | troad 2 hours ago | parent | prev [-] | |||||||||||||||||||||||||
Why is it the job of the kernel to notify the distros? Why isn't it the job of the distros to keep up on upstream security disclosures? Expecting a FOSS project to go track down all of its (millions of?) users seems like a very unreasonable expectation, and is well outside of their scope of responsibility. People have gotten so used to the Github flavour of free-labour, social-network-style FOSS that they've forgotten what all those LICENSE files actually say, which is to make it explicitly clear that the devs are not responsible to you for your issues, up to and including the software setting your house on fire. If you don't like it, you don't have to use it. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||