| ▲ | troad 2 hours ago | |
Why is it the job of the kernel to notify the distros? Why isn't it the job of the distros to keep up on upstream security disclosures? Expecting a FOSS project to go track down all of its (millions of?) users seems like a very unreasonable expectation, and is well outside of their scope of responsibility. People have gotten so used to the Github flavour of free-labour, social-network-style FOSS that they've forgotten what all those LICENSE files actually say, which is to make it explicitly clear that the devs are not responsible to you for your issues, up to and including the software setting your house on fire. If you don't like it, you don't have to use it. | ||
| ▲ | plg94 26 minutes ago | parent | next [-] | |
> Why isn't it the job of the distros to keep up on upstream security disclosures? They can't, because (responsible) security disclosures are private, _not public_. That's the whole point of the system: notify the developers in private ahead of time (usually 30, 60 or 90 days) so they can write, test and roll-out the fixes before you release the info to the whole world. This is to minimize the time between when bad actors gain access to the exploits vs. when users install the patch. So "keeping up on security disclosures" cannot ever be a 'pull' process. Usually the maintainers of the big distros are part of (private) security mailinglists and receive such info. Just not in this case it seems. | ||
| ▲ | bathtub365 an hour ago | parent | prev | next [-] | |
Where do you suggest they should have kept up on this disclosure? | ||
| ▲ | an hour ago | parent | prev | next [-] | |
| [deleted] | ||
| ▲ | qotgalaxy 2 hours ago | parent | prev [-] | |
> Expecting a FOSS project to go track down all of its (millions of?) users seems like a very unreasonable expectation, and is well outside of their scope of responsibility. The post you are responding to says that it would be nice if they copied literally one mailing list. | ||