LWN.net Logo

Survey responses

This survey is now closed

This survey has 388 responses

Security advisories

How useful do you find the daily security advisory summary?

32 8% Couldn't live without it
177 45% Occasionally useful
136 35% I just skip over it
43 11% What daily advisory summary?

What would be the best way for LWN to present security advisories?

138 35% As is done now
162 41% On a separate page with an RSS feed
63 16% Not at all
25 6% Some other way (describe in comments please)

If LWN stopped publishing security advisories I would

11 2% Cancel my subscription
160 41% Grumble for a while then live with it
194 50% Not even notice
23 5% Rejoice

Vulnerability database

How useful is the LWN vulnerability database to you?

11 2% Couldn't live without it
130 33% Occasionally useful
247 63% I never use it

How often do you look at the weekly "new vulnerabilities" section on the Security Page?

56 14% I read it attentively every week
240 61% I glance at it
92 23% I just skip over it

Should LWN continue updating the vulnerability database?

60 15% Yes, and expand it with more information (specify in comments)
165 42% Yes, as it is now
163 42% No, drop it like a hot Windows phone

(Log in to post comments)

A quick survey on security information

Posted Feb 14, 2013 3:11 UTC (Thu) by mstone (subscriber, #58824) [Link]

What are some of the other options that you're considering using to fill the space and time currently being used by vulnerability reporting?

Bikesheds and surveys.

Posted Feb 14, 2013 3:30 UTC (Thu) by neilbrown (subscriber, #359) [Link]

The last question needs a "Don't care" option, probably spelt "Whatever".

A quick survey on security information

Posted Feb 14, 2013 6:26 UTC (Thu) by skissane (subscriber, #38675) [Link]

Personally I rarely read the security alerts themselves; I do sometimes read the articles published in the security section. But, while I don't personally find this service useful, I'm sure some people do; I would not mind it being kept if it was useful to others - those such as myself who are not interested will just skip over it.

A quick survey on security information

Posted Feb 14, 2013 6:28 UTC (Thu) by trentbuck (subscriber, #66356) [Link]

You're right that parsing various distros' security announce lists is a PITA.

That's why I'm glad that you do it once, for all of us, rather than
each of us having to do it ourselves in our heads :-)

I'm subscribed to the distros I use most, but having a single daily
RSS digest is much faster to read, and can alert me about super bad
things that 1) haven't yet been fixed in my distros; or 2) affect
other distros that I don't use much, but some of my customers do.

(Sometimes it also cheers me up by schadenfreude: "har har, RoR is
still a bag of swiss cheese, glad I'm not running it.")

A quick survey on security information

Posted Feb 14, 2013 16:26 UTC (Thu) by nix (subscriber, #2304) [Link]

Quite so. There is nowhere else that logs this sort of thing in a non-insanely-voluminous fashion.

A quick survey on security information

Posted Feb 19, 2013 13:25 UTC (Tue) by ctg (subscriber, #3459) [Link]

Yep. Gives me a single source for the things that matter. Saves me the time of having to read lots of different things myself.

A quick survey on security information

Posted Feb 14, 2013 6:33 UTC (Thu) by dlang (✭ supporter ✭, #313) [Link]

The occasional articles explaining what's happening are worth a LOT, and to generate those you need to be looking at a lot of the vulnerabilities.

But the detailed 'new vulnerabilities' section has grown so large that I no longer do more than skim it as I go down the 'one big page' view.

A quick survey on security information

Posted Feb 14, 2013 7:06 UTC (Thu) by philipstorry (subscriber, #45926) [Link]

I run different distributions - and different sets of apps - between my work, home and hosted machines.

To be honest, that would mean subscribing to a lot of security mailing lists. The LWN daily security summary is therefore a valuable timesaver for me.

Not so valuable that I'd cancel my subscription - but valuable enough that I would grumble a bit.

It's a pity, from what you've said, that there isn't a standard "vulnerability report summary template" that people could be encouraged to use. I suppose many would bicker over what should/could be included - but the LWN summmaries would be a good starting point.

Thank you for providing them, whatever you choose to do.

A quick survey on security information

Posted Feb 14, 2013 7:41 UTC (Thu) by quad (subscriber, #75039) [Link]

Frankly, I love the *reporting* on security vulnerabilities. The background and detail.

The raw listing of "holes in X" is wasted on me. I have automated jobs that handle checking and validating updates.

A quick survey on security information

Posted Feb 14, 2013 8:12 UTC (Thu) by k8to (subscriber, #15413) [Link]

The discussions of issues are useful on several fronts. My understanding of specific significant problems allows me to realize that I should do something more about them sometimes than just update. My understanding of *classes* of security issues grows so that I can better endeavor not to create such bugs myself, and deploy systems that are more robust.

The big list of what's broken recently is too much information for me to reasonably process, and I'm really not very interested. If my distribution can't provide timely updates to these problems there's no way I'm going to succeed in handling the problem myself.

A quick survey on security information

Posted Feb 14, 2013 8:57 UTC (Thu) by wingo (subscriber, #26929) [Link]

Grouping security advisories by package or project rather than by distro would be more helpful to me.

I like the service but I would be OK with it going away, if that were the thing.

A quick survey on security information

Posted Feb 14, 2013 9:09 UTC (Thu) by jezuch (subscriber, #52988) [Link]

Well, I'm basically just a distro "consumer" so I completely rely on my distro's security team to do a good job. If I were an admin, I would probably spend much more thought on this and I guess there are quite some admins among LWN readers who appreciate the work you're doing :)

A quick survey on security information

Posted Feb 14, 2013 9:56 UTC (Thu) by epa (subscriber, #39769) [Link]

It's good that LWN's weekly edition includes security bulletins in such a prominent place. It's a sobering reminder to all of us that we need to do much better in this area.

A quick survey on security information

Posted Feb 14, 2013 10:07 UTC (Thu) by ortalo (subscriber, #4654) [Link]

In all honesty, agreed. However, maybe we could allow the editors to adopt an alternate way of doing this weekly reminder...
Just to throw few ideas: a weekly security drawing, a "best password of the week contest", a graph of CVE statistics with real time updates?

A quick survey on security information

Posted Feb 14, 2013 9:59 UTC (Thu) by ortalo (subscriber, #4654) [Link]

[Alternate way of commenting on advisories suggestion]
Pick the advisories you think are most critical or important. Elaborate on their origin in the source code and teach me (and the developpers) how to avoid them in the future.

(In case you did not understand, I do not believe much in security alerts as a way of improving operational security: too many, too fast, and no way to reboot that important database. But I believe a lot in them as a potential source of information for improving the security of our programs in the long term - and in closed source as a last-resort mean for forcing uncooperative manufacturers to correct their errors.)

A quick survey on security information

Posted Feb 16, 2013 16:50 UTC (Sat) by spender (subscriber, #23067) [Link]

I agree with this. The only real worth of an advisory is to learn from the vulnerability and look for ways to prevent (the exploitation of) future vulnerabilities of that kind. This is what real security is about, not the constant churn of updates.

I skip all the aggregated security information on LWN for this reason. I already have a sense of the most important issues from various other sources, and so only read the more detailed articles.

-Brad

A quick survey on security information

Posted Feb 14, 2013 10:09 UTC (Thu) by DG (subscriber, #16978) [Link]

My 2p -

I have a passing interest in the vulnerability announcements, some are irrelevant to me, others are interesting (Web stuff/perhaps kernel related ones/Java/RoR etc) and some are useful/affect me (e.g. PHP, Apache, MySQL and so on).

What would make it more valuable to me would be e.g. tagging them by product/project and/or language - so I could e.g. visit http://lwn.net/security/something/php or http://lwn.net/security/something/apache

David.

A quick survey on security information

Posted Feb 14, 2013 10:17 UTC (Thu) by dd9jn (subscriber, #4459) [Link]

It would be more useful not to have detailed listings for all distros but a list of distros which fixed the problem. And most important to me, an easier way to get information on the actual problem and fix or a remark "no details published".

Require a specific format for data, perhaps?

Posted Feb 14, 2013 11:14 UTC (Thu) by michaelkjohnson (subscriber, #41438) [Link]

When I was creating the old rPath advisories, I offered to format them to LWN's specification for sending to LWN to make your life easier.

Where you already have a parser, great; but I think you are in a position to post some view of your internal schema and a spec for a representation that you can parse and say, "we're not adding you to this valuable resource unless you provide data to us in this format".

As far as I know, no one else is cross-referencing vulnerabilities this way.

If you are overburdened and need to make changes, I would hope that you would first decide to do less work trying to cross-reference the advisories but still collect and publish the data centrally.

A quick survey on security information

Posted Feb 14, 2013 11:36 UTC (Thu) by dan_a (subscriber, #5325) [Link]

As with the rest of LWN, the (considerable) value I get is in the analysis you do. If I need to know what vulnerabilities have just been fixed I get that from the distro's announcement list.

On the other hand, the deeper understanding of what happened to cause a vulnerability, or a class of vulnerabilities which your longer articles provide is excellent.

A quick survey on security information

Posted Feb 14, 2013 14:14 UTC (Thu) by tshow (subscriber, #6411) [Link]

The commentary and articles on security are interesting, and I'd like to see them stay as they are. With the list of advisories, I'd be just as happy if there was a one-per-row table of them with links to a separate RSS'd page with details.

Usually, all I care about is package, platforms, severity, and whether there's a fix. My usual reading pattern for the security page is to scan down it seeing if there's anything in the list that potentially affects me, and if nothing twigs I move on.

Since my sysadmin duties are lightweight and mostly self-inflicted (and mostly not internet-facing), the list of vulnerabilities that can cause me grief is relatively short. Practically speaking, if openssh/openssl, openvpn, firefox and nginx aren't on the list, I can usually just move on.

I do like having the details there when I want or need them, though.

A quick survey on security information

Posted Feb 14, 2013 14:39 UTC (Thu) by gerv (subscriber, #3376) [Link]

Descriptions of vulnerabilities, how they got there, and how they can be exploited, is really interesting. Don't throw the possibility of that baby out with the "X has a bug and N different distributions have fixed it" bathwater.

Gerv

A quick survey on security information

Posted Feb 14, 2013 16:28 UTC (Thu) by nix (subscriber, #2304) [Link]

Quite. I am damn interested in the fact that 'X has a bug and at least one distribution has fixed it', though, since there are so many Xes that it would otherwise be almost impossible to collect this information. (We can't all subscribe to the millions of disparate lists where this stuff is communicated, and the only other places where it is brought together is distro-maintainer-only closed lists. I think. Have those lists died now? vendor-sec at al?)

A quick survey on security information

Posted Feb 14, 2013 17:32 UTC (Thu) by geuder (subscriber, #62854) [Link]

I read the (work) daily Security Advisories article nearly every day. I maintain systems running 3 different distros and I prefer to understand a bit what the updates are all about before applying them.

The deep analysis articles are the most useful ones, but I understand that it is not feasible to write an ever growing amount of them (nor would it be feasible to read all of them)

Rationally thinking I could probably just subscribe to the security lists of those 3 distros. But in reality I subscribe to too many lists already, don't enjoy to read email and don't do it very well, also my RSS reading could be organized better. However, I like to check out lwn (nearly) every day and just do it much better than those other channels. Admittedly not the best argument to waste resources, but then I also pay for lwn and not for mailing lists.

I'm not sure whether I have used the security database before. Google tends to give good hits on lwn (at least in my personal search bubble), so I might have without being really aware of it. Now that I learned about it I might occasionally use it also in future. But on the other side I guess all distro security mailing lists are archived and Google will find it if you search for something particular.

I guess your own DB allows you to make cross distro analysis e.g. about response (=fix) times (I remember one such article in the past). But if maintaining the DB requires substantial manual labor (don't know how assuming that you publish the daily article anyway), personally I could live without the DB.

A quick survey on security information

Posted Feb 14, 2013 17:39 UTC (Thu) by raven667 (subscriber, #5198) [Link]

The vulnerability database would be more useful if it were indexed by package as well and more arbitrarily searchable. Maybe a matrix view of versions of a software with which CVEs are fixed in which version and which are outstanding along with which are backported and which are missing from the distros repositories. Or maybe a tool to import a CSV of a machines software inventory and output a list of what's patched and what isn't. Maybe a table of which CVEs are outstanding for each distribution on every date.

Or maybe this all would be better handled by some separate tool or separate organization outside of LWN, if it is taking too much time and not providing enough value.

A quick survey on security information

Posted Feb 14, 2013 20:18 UTC (Thu) by josh (subscriber, #17465) [Link]

I do typically skim the vulnerability reports to see the actual underlying security holes, because I occasionally find the description of the security problem itself interesting. However, I don't see much value in the aggregation of cross-distro vulnerability information; if I want to know about security issues in my distro of choice, I'll subscribe to their security announcement list, and do regular updates from their security repository. If it saves time to drop the aggregation and correlation, and just keep the bits about security holes in the underlying software, that seems like a feature.

A quick survey on security information

Posted Feb 14, 2013 21:36 UTC (Thu) by 2NZb42fVtpOEyCBv (subscriber, #86247) [Link]

For the security updates, I'd prefer that you highlighted upstream problems/fixes, rather than each of six or seven distros' interpretation of essentially then same thing. (That's probably because I don't use one of those 6-7 distros, and just care about whether I need to worry about my installed version of such-and-such a package.)

I wonder whether something like:

Foo: buffer overflow in XYZ parsing [RHEL5, RHEL6, SLES10, ...]

where the things in brackets are links to the relevant distro advisories might be clearer?

A quick survey on security information

Posted Feb 15, 2013 9:19 UTC (Fri) by mgedmin (subscriber, #34497) [Link]

"How useful is the LWN vulnerability database to you?" is missing an option for "What vulnerability database?"

A quick survey on security information

Posted Feb 15, 2013 17:14 UTC (Fri) by serzan (subscriber, #8155) [Link]

Exactly my reaction too.

A quick survey on security information

Posted Feb 15, 2013 9:39 UTC (Fri) by mjw (subscriber, #16740) [Link]

The daily security advisories are certainly useful. But they could be a little more concise, group families of distos together, or at least don't repeat rebuild distros (like CentOS, Scientific Linux, Oracle, etc.) if the upstream Red Hat distro already did an advisory earlier that week. It might even be more informative to only mention if the rebuilds don't follow upstream or have a long delay providing the same fixes.

A quick survey on security information

Posted Feb 15, 2013 14:36 UTC (Fri) by imitev (subscriber, #60045) [Link]

+1 for grouping distros, since RHEL clones take most of the space and they often publish fixes on the same day. However tracking when rebuilds take too much time to provide the fix is going to be time consuming.

WRT vulnerabilities, it would be nice to have a list of all the vulnerabilities. Eg.

New vulnerabilities:
android-tools: temporary file vulnerability
curl: code execution
dnsmasq: access restriction bypass
...

and then the details of each vulnerability as it's done now. That way it will be much easier to visually "grep" interesting packages than scrolling through hundreds of lines.

Needing to know

Posted Feb 15, 2013 19:02 UTC (Fri) by southey (subscriber, #9466) [Link]

For most users, they will get the distribution notification if they are running an automatic updates in some form. So repeating that here is pointless for them. The only use of this information are people that probably should already know about the issue from another source. What I do appreciate are those reports that have a story not just saying it is fixed.

A quick survey on security information

Posted Feb 16, 2013 12:16 UTC (Sat) by jimbo (subscriber, #6689) [Link]

If you are going to publish security information separately, it would be helpful to provide a link to the page on your Weekly Edition, and of course to headline any serious bug or vulnerability as a matter of urgency in your principal content.

Please resist any pressure that you might receive from vendors to not publish security issues as you hear of them.

Many thanks for providing a readable and informative source of linux news (weekly or otherwise!)

--
Jimbo

Pressure

Posted Feb 18, 2013 14:45 UTC (Mon) by corbet (editor, #1) [Link]

Just for the record, nobody has ever pressured us not to publish security issues. Needless to say, we're not on the usual distribution list for pre-disclosure vulnerability information, but nobody has ever asked us not to publish something we had learned about independently.

Re: Pressure

Posted Feb 19, 2013 8:02 UTC (Tue) by jimbo (subscriber, #6689) [Link]

corbet wrote :-
Just for the record, nobody has ever pressured us not to publish security issues. Needless to say, we're not on the usual distribution list for pre-disclosure vulnerability information, but nobody has ever asked us not to publish something we had learned about independently.

I'm glad to hear this. My remarks in para no. 3 of my original post still apply :) Keep up the good work!

--
Jimbo

A quick survey on security information

Posted Feb 17, 2013 8:01 UTC (Sun) by gilbert (subscriber, #81446) [Link]

A direct copy and paste of the various -security-announce mailing list subjects (with links to the announcements themselves) would be quite sufficient. You wouldn't have to do hardly any work and yet it would still be quite informative.

A quick survey on security information

Posted Feb 17, 2013 15:25 UTC (Sun) by sergi (subscriber, #117) [Link]

Rather than the detailed list of new vulnerabilities, I'd rather you'd post a little editorial summary in a paragraph of two. Like: "Watch out for this vulnerability in apache if you use the stock config from Debian, other than that there are a few kernel local privilege scalation vulns. worth keeping an eye on. As for the latest round of Java vulnerabilities, most major distributors already have updates available". Kinda like a weather report.

I nevertheless find the reporting and analysys on the security page to be very good and it would be great if it could be even expanded now that you wouldn't need to dedicate so much time to listing all the vulns. and advisories in detail.

Sometimes an advisory contains no useful information

Posted Feb 18, 2013 12:16 UTC (Mon) by guus (subscriber, #41608) [Link]

My only complaint is that sometimes advisories contain no useful information that one can act upon. In fact, sometimes the vulnerability description is literally "unspecified vulnerability", and often the CVE links only point to a page mentioning that a CVE number has been reserved. Must I panic and immediately delete the affected software from my computers with prejudice? Or should I just ignore it and hope it is not something that affects me? I don't know if such advisories are useful for some people, but I would rather not see them until they contain information I can act upon.

A quick survey on security information

Posted Feb 18, 2013 14:21 UTC (Mon) by mirabilos (subscriber, #84359) [Link]

To me, it’s often more important to see what software has vulnerabilities, than, what distro has updated their software.

So, the current form is somewhat useless (too hard to filter out the really – to me – important information) but still better as nothing because it’s all in one place, somewhat.

(Background: vulnerabilities in software X usually stretch across distros, they might just not have noticed yet. Most environments are heterogenous, anyway. I’m able to patch and recompile myself, if needed.)

A quick survey on security information

Posted Feb 18, 2013 15:09 UTC (Mon) by Seegras (subscriber, #20463) [Link]

I like the terse overviews: Redhat has patched this and that, Debian something else, and Ubuntu those other somethings.

And I also like the security reporting, like the article on Recent Java vulnerabilities.

But the list of advisories is IMHO useless. Because there are now so many that even CVE had to change to more than 4 digits per year.

A quick survey on security information

Posted Feb 18, 2013 16:57 UTC (Mon) by boklm (subscriber, #34568) [Link]

It could be interesting maybe to have the vulnerability database published as json or yaml. And maybe suggest distributions to publish their advisories in the same format so that import can be more automated.

With such a database someone could create tools to do things like sending an email for each advisory for a software he has installed on his computer, or for software available in his custom packages repository.

A quick survey on security information

Posted Feb 21, 2013 21:52 UTC (Thu) by Jorgen.Fjeld (subscriber, #1038) [Link]

I currently use the security page to check if there are any vulnerabilities that affect any of the systems I am responsible for, and this is one of the main reasons we have an enterprise subscription.

I would like to have some way of more efficiently getting the security and vulnerability information that is relevant, and maybe a more efficient way than is currently possible.

For the "security alerts database" I would have liked:
* Possibility of date search, to list all vulnerabilites for a selected date range, or from a certain date up to current date.
* In the case of a search I would like to see the whole result list, without having to use a next link.
* Possibility of listing with a oneliner description of the fix/vulnerability, but that is probably too much work to extract.
* The possibility to limit the security listing to certain packages, or to exclude certain packages, to make the listing more relevant for my installations.

For the "security vulnerabilities database" I would have liked:
* Possibility of date search, to list all vulnerabilites for a selected date range, or from a certain date up to current date.
* In the case of a search I would like to see the whole result list, without having to use a next link.
* The possibility to limit the security listing to certain packages, or to exclude certain packages, to make the listing more relevant for my installations.
* The possibility to list all vulnerabilities where a chosen distribution has not provided any fixes yet.

A quick survey on security information

Posted Feb 21, 2013 21:56 UTC (Thu) by raven667 (subscriber, #5198) [Link]

When you get down to it, what might be nice is a list of the unpatched vulnerabilities for a particular OS at a particular time, FooOS 1.3 fully updated as of today has CVE-xxx and CVE-yyy outstanding in package bar-server.

A quick survey on security information

Posted Feb 22, 2013 21:58 UTC (Fri) by phd (subscriber, #952) [Link]

What I miss in the security is a cumulative total. 2-3 times a year I'd very much like to see a text like this:

"There are 256 vulnerabilities in our DB for the report period (that's 18 more than in the previous period). The major bug in Iroquois web server has hit most sites. BlueCap distribution was the first to fix it.

Overall Bruceian distribution was the most active in fixing security bugs — they fixed all 256 vulnerabilities and the mean time to react to a vulnerability report is only 18 hours. The second best was MarchHare — their numbers are 248 and 27.5 hours, respectively."

Hope I explained my wishes.

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds