LWN: Comments on "Fedora security response time" https://lwn.net/Articles/818860/ This is a special feed containing comments posted to the individual LWN article titled "Fedora security response time". en-us Tue, 21 Oct 2025 09:23:16 +0000 Tue, 21 Oct 2025 09:23:16 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Fedora security response time https://lwn.net/Articles/820069/ https://lwn.net/Articles/820069/ zlynx <div class="FormattedComment"> That makes sense. No developers, no bugs.<br> </div> Sat, 09 May 2020 22:58:55 +0000 Fedora security response time https://lwn.net/Articles/820049/ https://lwn.net/Articles/820049/ ghane <div class="FormattedComment"> I am not sure why you smart developers insist on doing things the hard way.<br> <p> Just develop Skynet. The T800 is designed to fix bugs *before* they occur.<br> <p> :-)<br> <p> --<br> Sanjeev<br> </div> Sat, 09 May 2020 06:47:18 +0000 Fedora security response time https://lwn.net/Articles/819657/ https://lwn.net/Articles/819657/ zlynx <div class="FormattedComment"> Sure, why not?<br> <p> Machine learning based unit, integration and fuzz testing to find the bugs, and a machine learning / AI process to fix the bugs.<br> </div> Thu, 07 May 2020 00:25:32 +0000 Fedora security response time https://lwn.net/Articles/819655/ https://lwn.net/Articles/819655/ Cyberax <div class="FormattedComment"> Extrapolating... Subsecond response times by 2030?<br> </div> Thu, 07 May 2020 00:20:15 +0000 Fedora security response time https://lwn.net/Articles/819653/ https://lwn.net/Articles/819653/ KaiRo <div class="FormattedComment"> Man, how the world has changed. In 2007, we were proud in the Mozilla project that we could ship security fixes in "10 f--ing days" (there is a story behind that phrase) after becoming aware of them. In 2020, we are talking about bringing security response times from a day or two down to hours in this case...<br> </div> Thu, 07 May 2020 00:05:46 +0000 Fedora security response time https://lwn.net/Articles/819152/ https://lwn.net/Articles/819152/ abo <div class="FormattedComment"> Updates that break things also tend to cause people to disable them, which is a lot worse than a day's delay.<br> </div> Fri, 01 May 2020 07:31:15 +0000 Fedora security response time https://lwn.net/Articles/819124/ https://lwn.net/Articles/819124/ mcatanzaro <div class="FormattedComment"> <font class="QuotedText">&gt; I've yet to see a Linux exploit developed for a web engine vulnerability and deployed against users in the wild. Are you aware of any instance of this happening, ever?</font><br> <p> I hope I don't come to regret this comment. :D It will happen eventually, but I haven't seen it yet.<br> <p> Another consideration is that web engines are heavily sandboxed. We generally class everything more serious than a null pointer dereference as a remote code execution vulnerability, which is about as serious as it gets, but we also assume that you can't really do *too* much harm if you achieve code execution in the untrusted sandboxed process that has very limited filesystem access. Sandbox escapes are discovered on occasion, but they are rare and generally quite clever. Web engine CVEs are a never-ending stream, and as long as they're fixed in a reasonably timely manner, I think Linux distros will be all right.<br> <p> For an example of not reasonably timely, look at QtWebKit.<br> </div> Thu, 30 Apr 2020 20:23:48 +0000 Fedora security response time https://lwn.net/Articles/819092/ https://lwn.net/Articles/819092/ highvoltage <div class="FormattedComment"> It's been proven in multiple software projects over the years that rushing out updates lead to regular botched updates. This is an area of work that is indeed important to do fast, but above all to do properly.<br> </div> Thu, 30 Apr 2020 16:27:30 +0000 Fedora security response time https://lwn.net/Articles/819087/ https://lwn.net/Articles/819087/ mattdm <div class="FormattedComment"> For some context on the original release engineering request: at that time, a number of us worked overnight to make sure we had a fix for Heartbleed (remember when that was the kind of security vulnerabilities our systems had? oh to simpler times), and then it turned out that it took another whole day just for that update to churn through the mechanical process, and something went wrong at just the wrong time making it even worse than expected. I'm quite confident that process improvements we've made since then make a repeat of that unlikely.<br> </div> Thu, 30 Apr 2020 15:34:21 +0000 Fedora security response time https://lwn.net/Articles/819016/ https://lwn.net/Articles/819016/ idealista <div class="FormattedComment"> For that type of services, having a CDN nowadays it's close to a requirement rather than a feature.<br> </div> Thu, 30 Apr 2020 12:36:11 +0000 Fedora security response time https://lwn.net/Articles/819003/ https://lwn.net/Articles/819003/ mst@redhat.com <div class="FormattedComment"> <font class="QuotedText">&gt; the metadata hashes for the old packages need to invalidated quickly,</font><br> <font class="QuotedText">&gt; throughout the entire update network (i.e. mirrors) "within an hour or less, preferably minutes";</font><br> <font class="QuotedText">&gt; that would mean that the older, vulnerable packages would no longer be installable.</font><br> Looks like this will break my attempts to have a system cache and search/install packages quickly from there: any attempts to use cache will run into everything having been invalidated, unless I am prepared to hit network for updates every minute :(. <br> </div> Thu, 30 Apr 2020 07:04:18 +0000 Fedora security response time https://lwn.net/Articles/818999/ https://lwn.net/Articles/818999/ pabs <div class="FormattedComment"> For the CDNs that Debian deals with (Fastly mostly for mirrors), they don't sync the entire mirror, they just dynamically populate their caches as clients fetch individual files. Debian gets gratis services from Fastly and the other external entities we use.<br> <p> <a href="https://www.debian.org/partners/">https://www.debian.org/partners/</a><br> <a href="https://wiki.debian.org/ExternalEntities">https://wiki.debian.org/ExternalEntities</a><br> </div> Thu, 30 Apr 2020 06:52:36 +0000 Fedora security response time https://lwn.net/Articles/818998/ https://lwn.net/Articles/818998/ pabs <div class="FormattedComment"> Debian has had to place a CDN frontend on that set of servers, as Linux kernel updates were overwhelming them.<br> </div> Thu, 30 Apr 2020 06:48:49 +0000 Fedora security response time https://lwn.net/Articles/818984/ https://lwn.net/Articles/818984/ AdamW <div class="FormattedComment"> "Adam Williamson, who is part of the Fedora QA team, wondered about the "within hours" timeline."<br> <p> Just to clarify this - I was being a bit wilfully gnomic, but my reply was intended to convey that the original mail simply stated "We need to ensure that security updates reach stable within hours of an upstream advisory", but never provided any justification for this assertion. It's not that I necessarily disagree, more a case of "please provide a rationale rather than simply asserting this".<br> </div> Thu, 30 Apr 2020 01:21:58 +0000 Fedora security response time https://lwn.net/Articles/818982/ https://lwn.net/Articles/818982/ Conan_Kudo <p>Push comes to shove, Fedora's <i>tier-0</i> servers and <i>tier-1</i> mirrors can serve content as close to immediately as possible. The MirrorManager system will allow total mirror network invalidation and force users to pull from those servers for that content.</p> <p>However, <i>it is not needed</i>. An argument could be made that we haven't needed it even the couple of times we've used it last year and only needed it once at the beginning of the year before (Spectre/Meltdown was that year...).</p> Thu, 30 Apr 2020 00:44:37 +0000 Fedora security response time https://lwn.net/Articles/818980/ https://lwn.net/Articles/818980/ ballombe <div class="FormattedComment"> I note that Debian distribute security updates from a small set of servers separated from mirrors, so one never have to wait for the mirrors to pull.<br> </div> Wed, 29 Apr 2020 22:57:34 +0000 Fedora security response time https://lwn.net/Articles/818974/ https://lwn.net/Articles/818974/ smoogen <div class="FormattedComment"> One of the problems not covered is that the Fedora mirroring system is a pull system where the downstream mirrors are in control of when they pull and what they pull. There are 4 tier-0 mirrors which we seed 12 tier-1 mirrors at various universities and public orgs like kernel.org. Those 12 feed all the level 2 mirrors. There is no CDN because those cost money in both pushing data into them and pulling data out of them. We have had a couple of offers for CDN data but use it for only limited uses as we found it took more than 24 hours to sync up the amount of data we normally change in a day to the CDN. <br> <p> Finally Fedora does not push updates to clients. A client may check for updates regularly if they are running the standard desktop, or they may only do so when they can afford the cost on a metered line. <br> <p> There are ways around this, but they all come with costs in time, release engineering changes, and tooling in client, server and user expectations. Those all need someone to drive the changes over the long term it will take to implement.<br> </div> Wed, 29 Apr 2020 21:44:22 +0000