Skip to content

Commit 6ab335e

Browse files
docs: FAQ item covering vulnerability patch notifications (#322)
1 parent 62a2223 commit 6ab335e

1 file changed

Lines changed: 9 additions & 1 deletion

File tree

content/FAQ.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ permalink: /faq
3434
- [Usage](#usage)
3535
- [How do I update the system?](#update)
3636
- [How do I disable automatic updates?](#disable-update)
37+
- [Why am I receiving so many vulnerability patch notifications?](#update-notifications)
3738
- [How do I whitelist a module?](#module-whitelist)
3839
- [How do I install software?](#software)
3940
- [How do I install my VPN?](#vpn)
@@ -208,7 +209,14 @@ If you need to update your system manually, for example after a severe CVE is pa
208209
- `systemctl disable flatpak-system-update.timer` and `systemctl disable --global flatpak-user-update.timer` disable automatic updates for system flatpaks and user flatpaks, respectively. To update manually, run `flatpak update`.
209210
- `systemctl disable brew-upgrade.timer brew-update.timer` disables automatic Homebrew updates. To update manually, run `brew update && brew upgrade`.
210211
- `systemctl disable podman-auto-update.timer` and `systemctl disable --global podman-auto-update.timer` disable automatic Podman container updates for system and user containers, respectively. To update manually, use `podman update` on your containers.
211-
212+
213+
### [Why am I receiving so many vulnerability patch notifications?](#update-notifications)
214+
{: #update-notifications}
215+
216+
Notifications are issued when the system detects kernel updates, Trivalent updates, and any other package updates that fix a [CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures). All kernel updates trigger a notification because all kernel updates contain bugfixes, and [all kernel bugs are security bugs](http://www.kroah.com/log/blog/2026/01/02/linux-kernel-security-work/). All Trivalent updates trigger a notification because Trivalent updates are pushed when Chromium CVEs are patched upstream.
217+
218+
To check which packages triggered a vulnerability patch notification, check `rpm-ostree status --verbose` and `rpm-ostree db diff`. Note that the quantity and frequency of these notifications is not an indication of a higher rate of security issues. On the contrary, these are security issues which would face any desktop linux system. Unlike those systems however, secureblue ensures that the user is promptly informed when any security-relevant patch is available.
219+
212220
### [How do I whitelist a module?](#module-whitelist)
213221
{: #module-whitelist}
214222

0 commit comments

Comments
 (0)