Do you rely on mailing lists or news articles for security vulnerabilities? Please share.

I only got to know about xz/liblzma [1] and curl [2] [3] vulnerabilities through lemmy (maybe because of high severity?).


  1. 1 ↩︎

  2. 2 ↩︎

  3. 3 ↩︎

  • @[email protected]
    link
    fedilink
    English
    41 year ago

    I don’t. I run software whose maintainers I trust to provide regular security updates.

    Of course there’s some software I have installed that doesn’t fit that criteria. But I also minimize my attack surface by exposing the bare minimum and enabling extra security features where I can.

  • Brunacho
    link
    fedilink
    English
    121 year ago

    My distribution (archlinux) notifies of critical vulnerabilities that require user action. There’s a news mailing list.

    After that I rely on social network (Mastodon mostly) or lemmy for news, as vulnerabilities often get some conversation. Apart from that, software i’m really interested in I also follow through RSS so I get news when they update for their vulnerabilities -that is when the vulnerabilities are not self inflicted as the xz case-.

  • @[email protected]
    link
    fedilink
    11 year ago

    I actually have automated security updates on all my servers. Also in general i run greenbone at home that does daily scans of all the VLANS/networks I have at home.

    • Pika
      link
      fedilink
      English
      21 year ago

      you just made me look for my distros security list, I never even thought of that!

  • slazer2au
    link
    fedilink
    English
    11 year ago

    Lucky I only have to worry about ones from Cisco or FortiNet and both have RSS feeds that I have linked into Slack at work to tell us when a new patch is out or a new psirt is released.

  • @[email protected]
    link
    fedilink
    41 year ago

    i subscribed for fedora mailist a few days ago and their talk awas helpful for me to notice that i was one of the affected, just subscribe to your distro blog/mail/etc

  • Mikelius
    link
    fedilink
    51 year ago

    I tend to find out about vulnerabilities before it hits the news outlets from the rss feed at https://seclists.org/oss-sec/

    Other than that, I’ve got a bunch of other security feeds I follow and also have automated updates with just about everything.

  • Björn Tantau
    link
    fedilink
    421 year ago

    I do regular automated updates. For anything requiring human intervention like the xz thing I trust Lemmy and YouTube to keep me updated. No dedicated news source because if I were to freak out about every new vulnerability found I wouldn’t be able to sleep at night.

      • Björn Tantau
        link
        fedilink
        41 year ago

        If you had it on a computer that is accessible via SSH from the internet you should proceed under the assumption that it was compromised. Which means you should reinstall from a safe medium and change your keys and passwords.

  • @[email protected]
    link
    fedilink
    51 year ago

    Seeing my colleagues, I fear that the answer from them is “That’s the neat part, you don’t!”

    • Last
      link
      fedilink
      31 year ago

      Same here. Our servers are so out of date that we might not have a version of xz with any commits from Jia Tan at all.

      • @[email protected]
        link
        fedilink
        11 year ago

        I don’t think up-to-date Debian stable even got it before it was discovered. No prod servers should be affected

  • @[email protected]
    link
    fedilink
    English
    21 year ago

    Used to follow the RHEL security lists but they recently retired those as well. Could really use a replacement.

  • Last
    link
    fedilink
    61 year ago

    I rely on notifications from glsa-check or my distro’s package manager. I was notified about a problem with xz-utils on Thursday evening, but didn’t see anyone post about it until Friday morning.

    glsa-check is a command-line tool included with the gentoolkit package in Gentoo Linux. Its primary function is to scan your system for installed packages that are vulnerable according to Gentoo Linux Security Advisories (GLSAs). GLSAs are official notifications from the Gentoo security team about security vulnerabilities that affect packages in the Gentoo repository.