Re: CrowdStrike and drivers (was Re: why reliable linux hasn't gained more market share?)
Stefan Monnier wrote:
> > - software updates that run as root (including Debian updates)
> > can run anything else as root
>
> So, maybe a more relevant discussion is: what will happen when a Debian
> stable security update comes with a "big blunder" that crashes the most
> machines in early boot?
>
> Admittedly, the wider variety of Debian installs might make the "most"
> above much less likely, but it's still something that can
> definitely happen.
>
> What does Debian do to try and avoid that, and what do *we* (Debian
> users) do to try and mitigate that?
Testing is necessary but not sufficient. If you can afford to have a
spare machine or a spare VM that gets upgraded a few days before your
other machines do, and test the heck out of that.
At sufficient scale -- a scale which is within the reach of increasingly
many people as storage costs continue to reduce -- we can keep our own
mirrors of upstream.
-dsr-
Reply to: