Releasing with a known broken kernel
Alexander Skwar
listen at alexander.skwar.name
Tue Aug 15 06:25:11 UTC 2006
ยท Gabriel M Dragffy <dragffy at yandex.ru>:
> On Mon, 2006-08-14 at 11:30 -0400, Brian McKee wrote:
>> On 14/08/06, Alexander Skwar <listen at alexander.skwar.name> wrote:
>> > Adam Conrad <adconrad at ubuntu.com>:
>> >
>> > > Alexander Skwar wrote:
>> > >>
>> > >> Kernel -25 is more stable.
>> > >
>> > > ... and also has security issues.
>> >
>> > Yes, known. But -25 works.
>>
>>
>> It's just a numbers game right?
Yep. It's how you weight what's important. IMO "works" has a weight of
100 and "works well" (ie. removing security holes) has a weight of
less than 100. Thus, the game is quiet easy.
>> Security hole for all users vs. Doesn't work at all for some subset of users
>>
>> If won't boot = 100 and security hole = 1
>> Because it's an obscure unlikely to be a problem security hole
>> (((I'm guessing here, I don't know the details of the security issue!)))
>>
>> multiply the numbers out and see which side wins....
>>
>> Since I have no idea how big a percentage of the Ubuntu user base has
>> the problem
>> hardware, I can't tell you if they made the right decision, and until
>> somebody can put
>> hard numbers to this, we are all blowing smoke on this thread I think.
>>
>> OTOH, a big notice for affected users in the release notes could have
>> been in order I suppose.
>>
>
> I'm glad it was released with a patched kernel even if it doesn't work.
No. It's never better to release something, which is known to *NOT*
work.
> If they released a vulnerable system then they'd be no better than MS.
> Honestly, neither situation is particularly ideal, but if push comes to
> shove then security should take precedence.
No. A non-working system is never acceptable.
> If it's a business game then
> you would have to take the MS strategy of releasing broken stuff because
> the profits are higher, but Ubuntu isn't here just to take the biggest
> chunks of money so the business model is different. I mean what kind of
> reputation will ubuntu get if word gets around it's releasing with KNOWN
> security vulnerabilities.
And what kind of reputation will it get, when it's releasing with KNOWN
broken kernel? As I said before: It's the kernel, and becaues of that,
later updating to something workable, which is STILL not there!, is
not possible.
> Remember the bug with Breezy where the admin
> password was stored in cleartext during install, not a pretty time.
But by far not as bad as the current situation. The "Breezy issue"
was easily resolved by doing a update after installation.
> I'm not an expert on this but from what I read it's a problem afflicting
> users with VIA chipsets. In which case if they dist-upgrade they will
> have already found out that kernel doesn't work, so should avoid the
> 6.06.1 iso. The problem is losing potential new users, perhaps a note in
> an obvious place could be set up, to alert people if they have a VIA
> chipset they're better off getting the original release for now.
To underline how, IMO, stupid the decision was, they even removed
the 6.06 image, so users really *CANNOT* use Ubuntu. See e.g. http://ubuntu-releases.cs.umn.edu//6.06/
IMO the 6.06.1 release was rushed and should be removed.
Alexander Skwar
--
In der Liebe gilt Schweigen oft mehr als Sprechen.
-- Blaise Pascal
More information about the ubuntu-users
mailing list