-
-
Notifications
You must be signed in to change notification settings - Fork 501
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HyperV security problem #7308
Comments
You, and the creators of this vulnerability check, should inform yourself about how Debian and most Linux distributions patch security fixes into older Linux (any every other software/package) versions, to keep features/compatibility stable, but security none less. You can be sure that an up-to-date Debian kernel in its stable repository is about the safest you are able to find. If at all there are concerns, then is is about outdated vendor kernels for some SBCs, which is why I am never really happy to stick with those for too long, but new or non-famous SBCs simply do not run, or with very limited features, when using a proper mainline Linux build. |
no worries, I was just worried about all the vulnerabilities the tool seemed to detect. It's for running on a HyperV machine. But the tool may be showing me vulnerabilities that have since been resolved, I'm not sure. |
We don't maintain the kernel on x86 |
I'm using an x86-64 architecture, so 64bits. Shouldn't that be good? |
That is all good. But it has to be interpreted with care. No software is 100% secure. Every person can create such security vulnerability reports. Many are disputed, most are of very low severity or can be exploited only in special circumstances. Many tools just check the software version, then see affected versions on a stable Debian, and assume it is vulnerable, which is usually not true, as Debian patches its sources. But I am not sure how this tool works. But in case of x86_64 DietPi systems with use the Debian kernel and repo, as long as you keep it upgraded, following the APT package upgrade notifications, there is usually no reason to be afraid of possible kernel vulnerabilities. Enterprise Linux distributions of course are in a different situations, as paying customers can have a different voice to get any detected vulnerability fixed ASAP, whether reasonable or not, and they have the resources. More important are basic usage and configuration aspects of the system and its software. I wrote up some things: https://github.com/MichaIng/DietPi/wiki/Security-recommendation dietpi-software reinstall 104 APT package upgrades can be automatically done daily by setting |
Okay, thank you very much for all these details. I therefore consider the distribution to be safe. Thank you for answering my questions. |
Hello, I installed dietpi and did a vulnerability scan of the Dietpi VM and it's a very vulnerable machine because the kernel is not up to date I think. Here's the picture. All updates have been done. Sincerely
The text was updated successfully, but these errors were encountered: