[Media] 8.04 Servers - Wikipedia

Mario Vukelic mario.vukelic at dantian.org
Thu Oct 16 07:15:37 UTC 2008


On Thu, 2008-10-16 at 16:34 +1300, Michael Hutchinson wrote:
> If a distribution is "stable", why do updates come out for it,
> consistently? 

Basically you are asking, "why does software have bugs". There are many
answers to this, <http://www.google.de/search?q="why+does+software+have
+bugs>

> As Res has already said - packages get messed with, and
> therefore more packages need to come out. You may as well run your
> Operating System over the internet.

Look, my argument was that bugs _are_ found in upstream code,
independently from any changes that are made on the distro level. If a
security issue is found in, say, apache, then you will have to update
apache, whether your distro made changes to the upstream code or not.

I even made a quick check for the updates that were announced on the
security-announce list since September, and after a quick glance it
seems that they all were caused by bugs in the upstream code, and not in
the Ubuntu changes. (See one of my replies for that)

As I said to Res, I understand that one could make an argument that any
code changes by the distro only add more bugs on top of the upstream
bugs that exist anyway, making the problem worse. However, neither he
nor you brought the smallest fact to the table to support this. It is
equally possible that on balance, the code checks and changes by the
distro remove bugs. This is _certainly_ true for the kernel, and I doubt
that any major distro uses a vanilla kernel, since Linus himself expects
the distros to perform stabilization work.

It would be easy to support your argument by showing that the majority
of security updates in Ubuntu are caused by distro-specific changes. Or,
let me do your job for you and compare the Slackware and Ubuntu security
advisories, again in September for brevity:

Slackware,
<http://www.slackware.com/security/list.php?l=slackware-security&y=2008>

2008-09-26 - [slackware-security] mozilla-thunderbird (SSA:2008-270-01)
2008-09-25 - [slackware-security] seamonkey (SSA:2008-269-02)
2008-09-25 - [slackware-security] mozilla-firefox (SSA:2008-269-01)
2008-09-03 - [slackware-security] php (SSA:2008-247-01)


Ubuntu,
<https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-September/thread.html>

[USN-639-1] tiff vulnerability  Kees Cook 
[USN-640-1] libxml2 vulnerability  Kees Cook 
[USN-641-1] Racoon vulnerabilities  Kees Cook 
[USN-642-1] Postfix vulnerabilities  Kees Cook 
[USN-643-1] FreeType vulnerabilities  Kees Cook 
[USN-644-1] libxml2 vulnerabilities  Kees Cook 
[USN-646-1] rdesktop vulnerabilities  Jamie Strandboge 
[USN-645-1] Firefox and xulrunner vulnerabilities  Jamie Strandboge 
[USN-645-3] Firefox and xulrunner regression  Jamie Strandboge 
[USN-647-1] Thunderbird vulnerabilities  Jamie Strandboge 
[USN-648-1] nasm vulnerability  Kees Cook 


As we can see, there are 4 for Slack and 11 for Ubuntu (8.04). According
to your argument, the difference should be mainly caused by buggy Ubuntu
patches. According to my argument, a closer look is needed at the
details, so let's do that:

I would argue that we can save the time to look closely at the firefox,
seamonkey and thunderbird announcements, as they occur in both distros
and are very likely upstream fixes.

That leaves php in Slackware and tiff, libxml2, racoon, postfix,
freetype, rdesktop, and nasm in Ubuntu.

In case of php, Ubuntu uses PHP 5.x while Slackware is at 4.x, so it is
very likely that it was an upstream bug that only occurs in v4.

tiff: upstream bug
http://secunia.com/advisories/cve_reference/CVE-2008-2327/

libxml2: upstream bug
http://secunia.com/advisories/cve_reference/CVE-2008-3281/

racoon: upstream bug
http://secunia.com/advisories/cve_reference/CVE-2008-3652/

postfix: upstream bug
http://secunia.com/advisories/cve_reference/CVE-2008-3889

freetype: upstream bug
http://secunia.com/advisories/cve_reference/CVE-2008-1808

rdesktop: upstream bug
http://secunia.com/advisories/cve_reference/CVE-2008-1803

nasm: upstream bug
http://secunia.com/advisories/cve_reference/CVE-2008-2719


Now, I don't really care to find out why Slackware does not patch these
security issues in upstream code. It might be because those packages are
not included in Slackware at all, that Slackware had older/newer
versions that are not affected, or that they remain unpatched. I'm not a
user, and I don't care.

I do care, however, about intellectual honesty. Therefore, please only
bother to reply after you have done your homework and can present some
facts. (And the single Debian OpenSSH incident, as regrettable and
stupid it was, does not count as a trend.)

Regards
Mario






More information about the ubuntu-users mailing list