On Sat, 2015-04-25 at 11:54 +0200, Sylvestre Ledru wrote: 
> > Even when they're still supported by upstream, they simply receive far less
> > scrutiny (in terms of security audits/analysis) than the current versions.
> > Also often security holes are silently fixed, without being identified as 
> > such.
> >
> As Firefox release manager, I can tell you that this statement is incorrect.
> For every security bug, if the information is not present, the question
> "is ESR31 impacted?".
Sure, I but I didn't talk about this at all.
I referred to code that is changed/removed which may contain bugs that
contains perhaps security issues, which are never identified as such,
maybe not even as "normal" bug.


> And if you saw any security holes being silently fixed, this was not on
> purpose and it was a mistake.
No I haven't seen any particular cases, but this has happened to all
different kinds of software, libc (GHOST), the kernel and so on.

I don't think that Mozilla can make extensive security audits of every
line of code that is about to be changed/removed, so it's IMHO naive to
believe that FF would be safe from this situation, whereas mostly all
other software is not

Best wishes,
Chris.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to