On Mon, May 23, 2005 at 07:02:24PM +1000, Rick Welykochy wrote:
> Matthew Hannigan wrote:
> 
> >If you did 'yum update ' regularly (every day, at the very least))
> >you most likely would not have been hit by this exploit.
> >
> >That is the best way/ path of least pain.
> 
> Is it?
> In a production environment?

My short answer would be *especially* in a production
environment, if production means 'being exposed to the internet'.

A fuller answer depends what you perceive the risks
are and what other steps you took to protect yourself.

If you're running an integrity checker, selinux, chrooted
apache, no-exec stack, some lesser known architecture, blah blah blah,
you could afford to give yourself a little more time to try out
updates on a test/qa server for compatibility first.

Were you thinking of compatibility concerns or security of
vendor updates?  If the latter, well, you either trust them
or not really.  Fedora/Redhat gpg sign their updates; you should
enable that checking at least.

Matt
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to