> The security related flaws are typically in > subsystems that are not part of a minimalist kernel.
A reboot is an attackers best friend and potentially an attackers enemy too. However whilst your practice is right. I hope you are reviewing all bugs as the kernel devs simply label them as bugs which should be fixed occasionally with hints and often only external eyes like debian ones label them as security bugs some what later too and as I have said if you really wanted to be thorough you would also need to review the commits to code areas you deploy as Linus himself has stated they can't keep up but you may be able to on a minimalist kernel. Perhaps a minimalist/server kernel project starting base rather than LTS might be an idea if it doesn't exist already. -- _______________________________________________________________________ 'Write programs that do one thing and do it well. Write programs to work together. Write programs to handle text streams, because that is a universal interface' (Doug McIlroy) _______________________________________________________________________ -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/907020.49342...@smtp128.mail.ir2.yahoo.com