[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: CrowdStrike and drivers (was Re: why reliable linux hasn't gained more market share?)



Stefan Monnier wrote: 
> >   - software updates that run as root (including Debian updates)
> >     can run anything else as root
> 
> So, maybe a more relevant discussion is: what will happen when a Debian
> stable security update comes with a "big blunder" that crashes the most
> machines in early boot?
> 
> Admittedly, the wider variety of Debian installs might make the "most"
> above much less likely, but it's still something that can
> definitely happen.
> 
> What does Debian do to try and avoid that, and what do *we* (Debian
> users) do to try and mitigate that?


Testing is necessary but not sufficient. If you can afford to have a
spare machine or a spare VM that gets upgraded a few days before your
other machines do, and test the heck out of that.

At sufficient scale -- a scale which is within the reach of increasingly
many people as storage costs continue to reduce -- we can keep our own
mirrors of upstream.

-dsr-


Reply to: