“The United States Computer Emergency Readiness Team released its year-end summary of computer vulnerabilities. While Windows is regarded as the most insecure operating system, the US-CERT found four times as many vulnerabilities specifically related to Unix and Linux. Of 5198 reported flaws, 812 were for the Windows, 2328 for Unix and Linux, and 2058 more affected more than one operating system. Notably missing from the list of Windows vulnerabilities is the recently discovered Windows Metafile issue. No vulnerabilities were listed for Apple’s Mac OS X, however several had been disclosed during the year. Also, since OS X is based on Unix, it is vulnerable to some of the flaws associated with its core operating system.” Note: The link is fixed. I have no idea what happened there, sorry guys!
US-CERT: 5198 Linux, Windows OS Flaws in 2005
59 Comments
-
2006-01-04 5:06 pmThom Holwerda
Indeed, this announcement has got a lot hidden behind it.
http://www.groklaw.net/article.php?story=20051231142317870
“the Unix/Linux list duplicates items, counting a vulnerability more than once in the list.”
“the same vulnerability is listed, under the same title, four times”
Check out this link for better information.
Why don’t you read the entire newsitem on Groklaw, instead of copying/pasting only the bits that follow a pro-NIX attitude? Let me copy the rest:
“To be fair, the Windows list isn’t really an accurate list of Windows vulnerabilities either, not the way I would think of it. It also has duplicative items, such as for Microsoft ASP.NET Canonicalization (Updated). And it includes Apple, F-Secure, IBM WebSphere, McAfee and other third-party vendor issues. If it can happen to you if you use Windows and the third party software, it’s on the list, I guess. So, personally, I don’t see 812 as being a fair number, unless you qualify what the number means.”
So, in a sense, the list sucks on both sides. Obviously, this item coming from Groklaw, the attention given to the NIX side of things far outweigh the attention given to the Windows side. But that’s natural seeing the source.
-
2006-01-04 7:16 pmdylansmrjones
Yes. The list sucks for Windows as well as for all other OS’es and 3rd party applications.
That’s what I wrote in my post.
Of course groklaw spens more time on the *nix side than Windows. Of course. It’s not the same as being biased though.
PJ favours *nix’es, and she doesn’t hide it. But she always remember to view it from both sides, which is why her credibility is so high. Much higher than any moderator or poster at OSNews (incl. me).
I know you don’t like her at all, but that says more about you than her, considering how much respect there is around her, especially from her selfappointed “enemies” (in regard to the SCO vs. IBM battle).
The poster you replied to is clearly biased and forgot the information about Windows – which I did post. Not that I’m not biased – but fairness is a virtue not to be forgotten. Hope you’ll learn it too, someday
-
2006-01-04 7:51 pmwhat
Thom, just run this little script I made (requires lynx and GNU sed):
#!/bin/bash
lynx –dump http://www.us-cert.gov/cas/bulletins/SB2005.html > stats.tmp
echo “”
echo “”
echo “Windows”
sed -e ‘/ * Windows Operating Systems/,/Unix/ Linux Operating Systems/ !d’
-e ‘s/(Updated*)//g’
-re ‘s/^[ t]+//’
-e ‘/^[*+] [[0-9]+]/ !d’
-e ‘s/[[0-9]+]//’ stats.tmp | uniq -c
|awk ‘{sum ++ ; entries += $1 }
END {print “Actual flaws :ttt ” sum “nNumber of flaws listed :t ” entries “nPercentage of dupes :tt”100 * ( 1 – sum/entries) “nn” }’
echo “Linux/Unix”
sed -e ‘/Unix/ Linux Operating Systems/,/Multiple Operating Systems/ !d’
-e ‘s/(Updated*)//g’
-re ‘s/^[ t]+//’
-e ‘/^[*+] [[0-9]+]/ !d’
-e ‘s/[[0-9]+]//’ stats.tmp | uniq -c
|awk ‘{sum ++ ; entries += $1 }
END {print “Actual flaws :ttt ” sum “nNumber of flaws listed :t ” entries “nPercentage of dupes :tt”100 * ( 1 – sum/entries) “nn” }’
echo “Any”
sed -e ‘/Multiple Operating Systems/,$ !d’
-e ‘s/(Updated*)//g’
-re ‘s/^[ t]+//’
-e ‘/^[*+] [[0-9]+]/ !d’
-e ‘s/[[0-9]+]//’ stats.tmp | uniq -c
|awk ‘{sum ++ ; entries += $1 }
END {print “Actual flaws :ttt ” sum “nNumber of flaws listed :t ” entries “nPercentage of dupes :tt”100 * ( 1 – sum/entries) “nn” }’
Here’s the result :
Windows
Actual flaws : 699
Number of flaws listed : 813
Percentage of dupes : 14.0221
Linux/Unix
Actual flaws : 1227
Number of flaws listed : 2329
Percentage of dupes : 47.3164
Any
Actual flaws : 1640
Number of flaws listed : 2058
Percentage of dupes : 20.311
47% of dupes for Unix or Unix like OSes. That’s pretty much isn’t it ?
Edit: Backslashes aren’t rendered properly, I hope y’all know sed and awk
Edited 2006-01-04 19:52
-
2006-01-05 2:13 pmnii_
http://www.groklaw.net/article.php?story=20051231142317870
“Why don’t you read the entire newsitem on Groklaw, instead of copying/pasting only the bits that follow a pro-NIX attitude?“
I read the entire thing, twice too and checked into it further than that. OSs are grouped together as one for example a number of *nix OSs, and multiple vulnerabilities of varying severity are listed more than once – effectively ad hocly.
I put in one short quote giving an example of how problems are listed more than once, and then advised people “Check out this link for better information.“. Where is this at all pro-*nix? My advise is still to go and read Groklaw. I’m certainly not going to go paste the entire thing in here when people can easily click on a link.
Linux contains software like the following:
1.) Web Server – Apache – runs 70%+ web servers on the internet
2.) Database Server – mysql / postgresql (yahoo/google/livejournal are known to use mysql)
3.) Remote Management – ssh/freenx (unlimited users)
4.) Email Server with spam filtering – Postfix + dspam + roundcube webmail (Same software as in use at 30gigs.com)
With windows, that software is not in the Core OS unless you pay for it to be added on:
1.) IIS – Comes bundled with Windows if you pay for the “Enterprise” editions or Small Business Server
3.) MSSQL – $5,999 / each processor
4.) Windows Terminal Server with 5 Users – $749.00
5.) Exchange Server 2003 Standard Edition (for medium organizations) – $699 + Client access licenses for EACH user that connects
http://www.microsoft.com/windowsserver2003/howtobuy/licensing/prici…
http://www.microsoft.com/sql/howtobuy/default.mspx#EDAA
http://www.microsoft.com/exchange/howtobuy/medium.mspx
They try to say that Linux has *more* vulnerabilities
when in fact their assumption is fatally flawed. Linux
simply includes much more software. Flaws in the
included software are considered a flaw with
Linux.
If all of the 0 day exploits released for IIS,
MSSQL, Exchange Server, MS Office, etc were considered
vulnerabilities in MS Windows, I dare to say Windows
would have far more vulnerabilities.
You will see.
It doesn’t matter how flawed this report could look. It’ll make it to the Get The FUD page… big time! 🙂
I don’t see what US-Cert has to gain by showing bias toward any operating system. This isn’t the usual article written by some opinionated columnist.
Edited 2006-01-04 14:04
Yikes. Countless Windows and Linux kernel vulnerabilities. Times like this, I ponder switching to OpenBSD fulltime instead of just for playing around (if not for this damned recently aquired gaming addiction :-P).
One buffer overflow for the whole year, and with all of the built-in exploit mitigation stuff, I’m not sure how dangerous it’d be…
EDIT: yeah, I’m aware that many of the third party apps one would run on it would have all the flaws listed there, but still…
Edited 2006-01-04 14:36
Well, my take is that why compare a multitude of OSs against just one? The study is obviously blatantly biased but very important that OS News posted it because this is something coming from a very powerful government.
It does show that the U.S. is in league with MS. That’s why I go with non-profits as I don’t trust the government and with good reason.
From now on I wouldn’t take CERT seriously.
Especially with such a massive security risk to people how could the government be so careless? It’s sad.
Linux is the kernel and saying that “Linux” has more vulnerabilities is wrong. I can guarantee that most distros don’t have no where near that many vulnerabilities. US-CERT, are they working for Bush paid off by Microsoft?. OSnews, this is a terrible link and you should only publish them if you know they are FACT not FUD. I guess you need to balance the bad news about Microsoft and Windows with some FUD about Linux.
-
2006-01-04 3:28 pmBen Jao Ming
I very much agree. But of course people are allowed to make up their own opionions. What I personally achieved from this post was a mere belief that the US-CERT are a bunch of idiots posting security bulitins with no clue whatsoever.
On the more serious part, I think OSNews has a responsibility to be more than just a bunch of unsorted news flashes.
I’m sorry folks, but stuff like this WILL get posted on OSNews, just because it is interesting. That fact that their methodology might not rhyme with your own methodoligies is hardly a reason NOT to post it.
Other than that, the last time I checked the United States was a democracy, so we can expect a certain degree of independence from its institutions. Then again, I’m Dutch and I’m used to state institutions being independant, I don’t really know how that counts outside of Europe.
-
2006-01-04 3:19 pmdeepspace
I’m sorry folks, but stuff like this WILL get posted on OSNews, just because it is interesting. That fact that their methodology might not rhyme with your own methodoligies is hardly a reason NOT to post it.
That is very true. This “news” should not be hidden, nor is the way it it brought wrong (treat it as sarcasm). Look at the reactions… that’s just great! Much better than ignoring it.
Other than that, the last time I checked the United States was a democracy, so we can expect a certain degree of independence from its institutions.
Well, then you didn’t check today. The USA is a country where you can simply pay a lot of money to get somthing done. Half the congress is bought. Hardly what you call a true democracy if you ask me… Let alone talk about independance.
Then again, I’m Dutch and I’m used to state institutions being independant, I don’t really know how that counts outside of Europe.
Exactly (I’m dutch, too)
If you work for any US Government agency, the quality of the security information is usually fair to poor, and in many cases gleaned from other web sites. When I get notification of vulnerabilities from the Government (DoD), I usually have them patched or have the downtime to patch scheduled before receiving the notice.
This is why I use SecurityFocus and SecurityTracker on a daily basis rather than wait for a Government agency to send an advisory. And on the rare occasion that I actually need it, go to CVE (cve.mitre.org) for information from them on specific vulnerabilities.
The U.S. is a large bureaucracy. It’s defiantly not a bunch of independent institutions like Holland, if that’s the case.
Yes I am from America and am sick of it but it’s the same throughout the world today anyway.The democracy part is only partial because voting for candidates is not based on merit since anyone can get in. I don’t agree with it.
Also anything using U.S. currency is contracted to U.S. in some way so naturally the U.S. defends it’s interests to the detriment of us all. Linux tries to stay independent under a GNU contract not dictated by the dollar which I whole-heartily agree with since I am a Star Trek person who thinks money is dying
Windows more secure.
If anyone from OS News deletes this comment, I will voodoo Linux to eternity come!
Hummm, what about this new cert FIN-06-004-01
(Another BIG ole windows hole)
I mean you go to the US-CERT site and almost everything you see on there is Windows, Windows, Windows.
As always you have Windows guys trying to talk Unix security. But when you look closer the truth is I have NEVER had to run scared, double check my virusscan or any of those things when using Linux/Unix/Mac OS
Sorry.
-
2006-01-04 6:26 pmma_d
That’s probably because:
1.) 94% of the Country is running Windows.
2.) 99% of those people are complete idiots (when it comes to operating systems).
The Mac side is much more into getting their updates, and many are very geeky. And the linux side is probably half obsessive geeks and half wannabe geeks on the way… With a small mix of know-nothings thrown in to spice up the mix.
CERT is supposed to be protecting computer users (sadly, from themselves I think). They’re not going to confused 94% of the country to help the fifty people who visit the site with a Linux box who aren’t geeks.
Now, I agree that Unix security is much higher than Windows in general. But, I don’t think CERT’s website is a good proof of that.
-
2006-01-04 6:41 pmWindows Sucks
You are right about the CERT site that is for sure.
But looking over the problems with Unix and Linux on the site 95% of those problems would not affect desktop users of Linux, Unix and/or Mac OS anyway.
Unlike the 95% of Windows problems that affect any and every version of Windows, servers and desktops.
That is a big difference (And you don’t have to look on the cert site to see that. LOL!)
Users should not be the blame for Microsofts lack of education about the features in their products. They don’t include any documentation, they dont make the user secure the machine and they dont really teach the importance of patches.
All you see from Microsoft are Slick ads telling you that you can hook a telescope to your Windows machine and see the Cats Eye Nebula. LOL! They don’t even feature their products in their ads anymore. LOL!
You can’t exspect people to: Not open attachments, Not go to bad sites, buy virusscan, update virusscan, lock down the machine, not log in with admin rights, turn on and configure the firewall, update patches, read about security problems etc, etc without education. Sorry but people just want to turn on their machines and go, which you can do almost at will on your Mac or Linux desktop.
“Then again, I’m Dutch and I’m used to state institutions being independant, I don’t really know how that counts outside of Europe.
Exactly (I’m dutch, too)”
So you’re saying you don’t have graft and corruption in the Netherlands? Political parties there don’t take campaign contributions and don’t do favors for people/corporations that do make (bribes) contributions?
-
2006-01-04 8:30 pmThom Holwerda
So you’re saying you don’t have graft and corruption in the Netherlands? Political parties there don’t take campaign contributions and don’t do favors for people/corporations that do make (bribes) contributions?
Exactly. That’s because the law prohibits it. Personal donations are limited to a very small amount, and only once per year per person, and contributions from commercial entitities is prohibited altogether. Also, parties must, by law, detail their financial activities to the public. Remember, the Dutch parliament consists of about 8-10 parties, instead of the 2 (ok 3) that the US has.
And on the world index for corruption, the Netherlands is 11th, and the US 17th– but that’s bound to change after today’s news .
“That’s because the law prohibits it.”
LOL. Thanks for that laugh. The best I’ve had all day. Indeed, corruption is illegal in the U.S. as well. So is murder, theft, extortion, etc. So much for law and order.
Honestly, do you the younger generations of Europeans never look around and consider for a moment that this temporary Tolkieneque view Europeans have of themselves being for human rights and the pinnacle of humanity comes only after centuries upon centuries of raping and pillaging the Third world, slaughtering each other and perfecting warfare to an exact science and having taught all your former colonies (especially the U.S.) that science? Does it not occur that Europe is just as “evil” as America if not more so? Because all too often on internet bulletin boards I get the notions that current generations of Europeans have forgotten just how ugly their history is and probably think the old ways are gone forever.
-
2006-01-04 8:51 pmThom Holwerda
Microshag, don’t twist my words. You asked:
Political parties there don’t take campaign contributions and don’t do favors for people/corporations that do make (bribes) contributions?
I said: no, because it’s not allowed to donate money AT ALL— contrary to the US, where donating money to parties and party members is completely LEGAL. Where else did you think the money for those big campaigns come from?
And what does this have to do with Europe’s history? What does this have to do with Europe Vs. US at all?
you are going to take a lot of flak on this one, Thom. The linked article is a perfect example of how one can use statistics to prove anything. I think the most telling comparison would be to show how many days of last year Windows had an unpatched critical vulnerability vs the same info for UNIXLinux. I think you will see a radically different picture. So the real question would become which OS is less secure? One that has more vulnerabilities that are patched quickly or one that has fewer that remain unpatched for longer periods of time? I know such a study has been done, but darned if I can find a link to it.
-
2006-01-04 9:15 pmThom Holwerda
you are going to take a lot of flak on this one, Thom.
Eh, I still think it is the US-CERT to blame, not really the writer of the blurb on BetaNews. I mean, it’s not as if everyone reads Groklaw (luckily) or grep’s the CERT page. I can understand that the writer assumed that a governmental org. wouldn’t be biased.
“Other than that, the last time I checked the United States was a democracy, so we can expect a certain degree of independence from its institutions.
Well, then you didn’t check today. The USA is a country where you can simply pay a lot of money to get somthing done. Half the congress is bought. Hardly what you call a true democracy if you ask me… Let alone talk about independance.
Then again, I’m Dutch and I’m used to state institutions being independant, I don’t really know how that counts outside of Europe.
Exactly (I’m dutch, too)”
I don’t have to twist anybody’s words. It’s pretty clear. Yet another anti-American slur from yet another European on this board. Maybe you don’t notice but we get it all the time, and I’m thinking maybe you guys need some reminders. It was you you made it a Dutch vs. American thing with your initial comment, and then of course somebody else took it and ran with it. Maybe you ought to be more careful about making comments since you’re often suggesting the same for others.
-
2006-01-04 10:26 pmThom Holwerda
What the…? I only said that because state institutions are usually independant here, I assumed they were in the US too. It were *other* US commenters who suggested it wasn’t, my friend!
You misquoted too, by the way. That middle section (“Well, then you… talk about independance.”) wasn’t written by me. Please make sure you quote properly next time.
95% of Widows users run it as “administrator” or root. 95% of Linux users run it as non-root. A so called vulnerability is a disaster if it is exploited as root but mostly a non-event when exploited as an ordinary user. Just do the math.
These “security” clowns make their money from having an insecure status quo and actually want us to believe they have no vested interest in their endless drumbeat for Windows.
I have a part-tme windows network admin job for a small company. The CEO wanted more security I decided to lock down all the client machines and make everybody run their applications as non-admin but we found out that most of the popular desktop applications that make Windows so popular do not actually work on the workstations when you try to run them without admin privileges. Solution: We are paying a couple of hundred dollars per pc to have up to date security software from different companies….more money to the “security” industry.
Oh please. CERT may be federally funded by the US gov’t (DoD and Homeland Defense) but they’re operated by Carnegie Melon University, a fairly well respected institution. They may be a little more conservative than a place like Berkley, but US universities are not really renowned for pandering to government administrations. Furthermore they’re not like universities in many other countries (my own included) that are funded primarily by the government, they rely on tuitions and grants. I don’t think there’s a conspiracy with CERT trying to undermine *nix by promoting it against Windows. CERT produces un-biased reports of vulnerabilities and validate proof-of-concept execution code. The results are logged and kept. The 2005 “summary” was basically a raw compilation of their database.
Raw numbers of vulnerabilities reports are meaningless as any sort of indicator, particularly when they’re unqualified. It’s the same things as claiming a linux distro is superior to Windows because it has 20,000 applications available in the repo. Means nothing if those applications are of no use to the user.
Similarly, unix could have 10,000 vulnerabilities discovered and Windows only 100. Those numbers mean nothing without some frame of reference, a) what is the severity: application crash, system crash, system takeover? and b) what is risk: exploitable only under the covergence of specific system configurations? exploitable by user interaction? exploitable by external attack?
Perhaps the most important measure is a) how many of those vulnerabilities still exist and b) how long did they take to patch.
No doubt Microsoft and their apologists will hide behind this as evidence of Window’s mythical security focus. They’d find a way to put a positive spin no matter what the results were. And hopefully this may serve as a wakeup call to the *nix community that all applications and platforms have the potential for flaws, and security shouldn’t be taken for granted.
But you can’t really criticize raw data. It’s just a thing. In the absence of proper context, the results are really meaningless. Context provides room for interpretation.
(edit: typo)
Edited 2006-01-05 19:08
If anyone’s interested in the actual list, rather than downloading some random proprietary software (WTF?), here it is: http://www.us-cert.gov/cas/bulletins/SB2005.html
Enjoy.
No vulnerabilities were listed for Apple’s Mac OS X, however several had been disclosed during the year. Also, since OS X is based on Unix, it is vulnerable to some of the flaws associated with its core operating system.
All of the specific Mac OSX related vulnerabilities are included in the Linux/Unix list – and there are quite a lot.
So there 4x more linux/unix vulnerabilities, eh? Sounds great, and it will sure generate lot of publicity, but it is utterly useless. How can you compare Windows + X amount of apps (do we get a list of the apps that was tracked? acrobat reader is there, but how many other windows apps were checked?) and Linux/Solaris/FreeBSD + Y amount of apps, when there is little indication of the comparative number of X and Y.
In other words, after tracking Windows (an OS) AND a number of apps running on that os with Linux/FreeBSD/Solaris/whatnot (these are distinct operating systems) AND another arbitrary number of apps running on each or just one of these OSes reaching the conclusion that Linux/Unix has more bugs is fallacious. More than fallacious… how can they get away with this?
It’s even worse!
Some of the bugs are reported multiple times. Some of the software is mutually exclusive. E.g. you wouldn’t run three different mailservers on the same machine.
There is also no easy way to see the severity of the bug, and for how many days it was left unpatched.
It doesnt tell if the bug fix require reboot or force other unaffected services to be temperarly shut down to be fixed.
This statistics is utterly useless.
Is there also a list that shows what vulnerabilities have been pachted by now?
I normally look at http://www.secunia.com for security stuff about products.
I normally look at http://www.packetstormsecurity.org for exploit code to test if my systems are vulnerable
Yes, but it would be interesting to see how many of the problems on this list ar already pached in later versions of the software, and then compare what OS has the most patches. Also: how fast was i patched…
Well, the rest is already said: this is just a load of crap
of those listed, how many are critical? Linux being much more modular I’m not really surprised there are more flaws.
If there are more critical flaws for linux than windows, now I’m surprised. Are there?
unix is not one OS…
Let me translate. There are substantially more bugs found in at least 9 distinct operating systems – Solaris, SuSe, Cisco, SCO Unixware, RedHat Linux, OpenBSD, FreeBSD, NetBSD, and for some reason they count Safari bugs there as well, even though they don’t count OS X bugs separately + an arbitrary number of applications (including KDE and GNOME, that in itself has more apps that are counted for Windows) than in Windows + an arbitrary number of apps running on Windows. Yeah, this is a really useful comparison.
Windows 95 is more secure. I have used it for years and I haven’t cought any virus. I recommend it over Linux.
Windows 95 is more secure. I have used it for years and I haven’t cought any virus. I recommend it over Linux.
That’s the most ridiculous and naive statement I have heard in a long time.
“that’s the most ridiculous and naive statement I have heard in a long time.”
Yes but probably partially true. At work one of my colleagues came to me with his problem. For years he had been running Win 98 happily at home, then a couple of month’s before he installed XP, then his system began to slow down until it was totally bjorked with malware and he found he could neither reinstall XP or 98.
I gave him a set of Ubuntu disks and over the weekend he ran the Ubuntu live disk to surf the web, but he was too chicken to install it on his hard drive. He managed to find someone who could get XP to reinstall on his system. As advised, he had the good sense to install a hardware firewall/router and has been running OK since
Edited 2006-01-04 14:14
Maybe it’s not connected to the internet.
Then again, I don’t think I’ve gotten a virus in Windows since… 2002, running Windows ME. I’ve only had a computer of my own since 2000.
Actually, Win95 OSR2 behind a Linux firewall can be quite a secure desktop OS. It simply doesn’t support many of the common Windows exploit vectors.
To clarify, though, I wouldn’t recommend such a setup to anyone unless they had some specific need for it, and I wouldn’t connect such a machine DIRECTLY to the net. 🙂
Thom, sorry but your credibility is instant zero to me on this one.
This reads just like a FUD trollfest introduction, everything is BS in what you say :
While Windows is regarded as the most insecure operating system, the US-CERT found four times as many vulnerabilities specifically related to Unix and Linux
This is BS, scanning the Unix/Linux list, I see apps like Apache/MySQL/Vim (no kidding) which are not Unix/Linux specific, I see lots of different OS (Mac OS, Linux, Solaris, …), I see lots of “(updated)” entries (some have 10+).
So why this stupid trollish comment ?
Especially when the CERT warns :
“Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information”.
So from a 30 second analysis of the same informations that where given to you, I deduce that :
– More vulnerabilities are detected on open-source and Unix platforms (sth about more eyes and shallow bugs becomes all too true)
– One OS, Windows, has so much holes that it has its own section !!! Compared to other OS that are all grouped together so that Windows does not look like shit (no credibility on CERT on this one).
– This list does not list exploit, but discovered vulnerabilities, so it does not say much about the OS security state
Others have already noted the wrong in all the other things you say.
For example, Mac OS X vulnerabilities are listed, but due to what I said earlier, you won’t see it immediately. A good example is that “Apple Mac OS X AirPort Card Automatic Network Association” is cited in Unix/Linux vulnerabilities !!!! And I think everyone will agree that it is a Mac OS X specific vulnerability that have nothing to do in Unix/Linux vulnerabilities.
Thom, sorry but your credibility is instant zero to me on this one.
This reads just like a FUD trollfest introduction, everything is BS in what you say
Those are not my words. At OSNews we *link* to articles, mostly. Think before you post, please.
Those are not my words. At OSNews we *link* to articles, mostly. Think before you post, please
I’m sorry then, but it is not a problem of thinking on my part, it’s just that the link was broken at the time I read the list by the mean of another link, so I did not see anyone other than you as the author.
Why don’t you just link straight up to the CERT page? The author of the summary you linked to is obviously a babbling idiot.
I don’t see any reason to post a link to a short summary like that.
Why don’t you just link straight up to the CERT page? The author of the summary you linked to is obviously a babbling idiot.
I don’t see any reason to post a link to a short summary like that.
Because I found this via that website. Seems only fair practice to give credit where credit’s due.
Thom,
Maybe it’s *you* that should think before blowing out sensationalistic drivel. If you had paused to *think* before linking that garbage you might have realized that most of the “OS flaws” are really APPLICATION issues!
Then you might *think* that some idiot at CERT hasn’t the first clue how to differentiate OS flaws from APPLICATION flaws. (Hm, maybe there’s an interesting story…)
And that makes this “summary of computer vulnerabilities” utter trash, unless you’re just looking for another quick-hit sensationalistic hit of misinformation.
…and maybe instead posted something actually *thoughtful* like “Hey, over at CERT there’s this pseudo-list of supposed OS vulnerabilities that are mostly application-level problems – read it for a bit of insight as to how useless CERT really is.” But, maybe that would require too much *thought*, eh?
“Think before you post”, indeed!
Most of the flaws in Linux and compatible systems are duplicates counted 3-4 and 5 times, some even more than that.
Several windows flaws are duplicates as well, so the list in unusable until someone clears it out and removes all duplicates.
Eric Raymonds “Fetchmail POP3 Client Buffer Overflow” is counted 5 times in the “Linux and *BSDs” group. And the list is unusable for Windows as well.
Read more here: http://www.groklaw.net/article.php?story=20051231142317870
@ Thom: Please don’t link to articles which are so lame. It might generate some more traffic and some ads revenue, but puhlease… it reduces the credibility of OSNews. And we don’t want that.
Thom: Please don’t link to articles which are so lame. It might generate some more traffic and some ads revenue, but puhlease… it reduces the credibility of OSNews. And we don’t want that.
This is a completely off-topic statement, but here at OSNews the world doesn’t evolve around ad revenues. We have stated that numerous times: the little money OSNews gets from ads goes directly to hosting costs, and that’s it.
We as editors and maintainers get NOTHING, and do everything on a voluntary basis. I strongly FIGHT against statements like yours because they somehow imply I only post news for money. Which pisses me off, and let this be a serious warning on your end.
This news got posted because I know people are interested in knowing things like this. Of course these comparisons are always skewed and full of errors– but what if this exact same report said that UNIX had less flaws then Windows? Would you also complained in the same way you just did?
Exactly.
Edit: removed the don’t reply crap. Shouldn’t be nescesary anymore after disabling anon. posting .
Edited 2006-01-04 14:09
Exactly. Those visitors are “information consumers” and don’t have a clue that behind OSNews there are volunteers who work for pleasure, but definately not for money. However, it’s a lot of work.
This also pisses me off. If you don’t like OSNews, go to Slashdot or Newsforge. Or better yet, gather the articles you want on the web yourself.
But respect the work of volunteers who work for you for free.
Sorry this is offtopic. Joe User are you really Justin Sane of Anti-Flag. If so I just want to say the Terror State CD was really great.
I love your twisted “logic”, Thom:
“This news got posted because I know people are interested in knowing things like this. Of course these comparisons are always skewed and full of errors– but what if this exact same report said that UNIX had less flaws then Windows? Would you also complained in the same way you just did?”
First off, the wording makes it sensationalist bullsh-t, not objective news. Secondly, what does your hypothetizing have to do with anything? The hypothetical reaction to an equally hypothetical UNIX-positive sensationalist bullsh-t has nothing to do with the fact that, quite frankly, you’ve just f-cked up as an editor by linking deceivingly-worded low-quality sensationalist bullsh-t masquerading as news.
Stop avoiding responsibility by appealing to hypothetical situations; it makes you look unprofessional in this real situation.
Yeah, people are very interested in reading BS, poor quality articles. Way to go Thom! And it’s interesting BS that people are “interested” in too! Whoop dee doo.
This news got posted because I know people are interested in knowing things like this. Of course these comparisons are always skewed and full of errors– but what if this exact same report said that UNIX had less flaws then Windows? Would you also complained in the same way you just did?
I already knew about the list from CERT. And if you look in my post, you can see I’m also writing that the list is screwed up for Windows as well. I actually write this several times.
So the answer is: If you had said Windows had more flaws than Linux I would complain, yes (because I knew about the list already). And then I’d have asked you for a list with all duplicates removed
But it still beats me how you can link to such a lousy article. We both know you can do better
Indeed, this announcement has got a lot hidden behind it.