all messages for Emacs-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
From: Jean Louis <bugs@gnu.support>
To: Troy Hinckley <comms@dabrev.com>
Cc: emacs-devel@gnu.org, Eli Zaretskii <eliz@gnu.org>,
	Stefan Kangas <stefankangas@gmail.com>
Subject: Re: Emacs 28.3 Release
Date: Tue, 11 Apr 2023 11:14:14 +0300	[thread overview]
Message-ID: <ZDUW1rbdcjwi6CA2@protected.localdomain> (raw)
In-Reply-To: <9ea47b22-f2d8-4225-b5f2-966ca0d797f9@Spark>

* Troy Hinckley <comms@dabrev.com> [2023-04-10 16:21]:
> Hi Emacs devs,
> I am asking again what we can do to complete the Emacs 28.3 release. My concern is that we have a narrow window in which this version will be viable. As it currently stands the latest stable release has a high severity CVE that prevents Emacs from being installed in security sensitive domains. 28.3 will resolve that and make the latest stable release usable. However, someone will inevitably find another CVE against Emacs. At that point 28.3 will no longer be useful. Given how hard it has been to get this release, I doubt there would be resources to add another security patch to Emacs 28.

Emacs has built-in programming language. Programming languages are not
secure by default. Their purpose is freedom to programmer to do what
programmers wants.

If people on this mailing list would decide, they could file X number
of (not so) common vulnerabilities, though developers are constantly
improving Emacs, not making their reputation by "discovering security
holes". As if focus would be on common vulnerabilities reporting then
those reports would be as great as GNU Emacs bug reports

This means that handling those one or few CVE reports related to Emacs
is only there for cosmetics purposes. It is for the fake image.

Handling few of those CVEs, or removing reports, or closing those
reports, doesn't make Emacs secure for "secure domains" as you
mentioned it.

It is as secure as people who are working with it.

-- 
Jean

Take action in Free Software Foundation campaigns:
https://www.fsf.org/campaigns

In support of Richard M. Stallman
https://stallmansupport.org/



  parent reply	other threads:[~2023-04-11  8:14 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <f4b95933-46bd-4bcb-b9ca-ceed72b1c6ee@Spark>
2023-04-10 13:05 ` Emacs 28.3 Release Troy Hinckley
2023-04-10 13:20   ` Eli Zaretskii
2023-04-10 14:33     ` lux
2023-04-10 14:44       ` Ulrich Mueller
2023-04-10 14:46         ` lux
2023-04-10 13:50   ` Po Lu
2023-04-11  8:14   ` Jean Louis [this message]
2023-04-12 15:37     ` Troy Hinckley
2023-04-12 16:31       ` lux
2023-04-12 16:56         ` Corwin Brust

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ZDUW1rbdcjwi6CA2@protected.localdomain \
    --to=bugs@gnu.support \
    --cc=comms@dabrev.com \
    --cc=eliz@gnu.org \
    --cc=emacs-devel@gnu.org \
    --cc=stefankangas@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/emacs.git
	https://git.savannah.gnu.org/cgit/emacs/org-mode.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.