RUS-CERT Criticizes Mozilla Security Bugs Policy
Thursday March 11th, 2004
Simon Paquet sent us a link to a German article from the Computer Emergency Response Team of the University of Stuttgart (RUS-CERT) that criticizes Mozilla's security policy.
Simon provides a translation of the key points of the article: "The RUS-CERT criticizes Mozilla's security approach to security leaks. They find fault in the fact that no official security advisories are published by the Mozilla Foundation. Instead security leaks are silently patched and incorporated into newer releases.
"They come to the conclusion, 'At the moment Mozilla is obviously no convincing alternative to the market leader [Microsoft].' In an update to their article, they state that this sentence was interpreted as saying that everyone should refrain from using Mozilla. This is not the case. They only state that Mozilla suffers from the same security problems as all other clients and that the use of Mozilla alone is no solution to those security problems."
Yes, that's why I wrote (although I screwed up that sentence) that there'd be more value in patching from a stable release to a x.x.1 release with a security fix. The hard bit isn't making the patch, it's making, testing and releasing a build of a previous version with one extra patch in it. If nobody is going to do the work to make the fixed builds, setting up the patching stuff isn't worth the effort - you need to do both tasks to make it worthwhile.