LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - General
User Name
Password
Linux - General This Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.

Notices


Reply
  Search this Thread
Old 06-15-2006, 01:42 PM   #1
ErrorBound
Member
 
Registered: Apr 2006
Posts: 280

Rep: Reputation: 31
Question Is automating apt-get upgrade a security risk?


Hi
I'm using Kubuntu Dapper, and have become quite tempted to write a scheduled script (say daily or weekly) to run these:
Code:
apt-get autoclean
apt-get update
apt-get -y dist-upgrade
After looking this up, I have generally read that this can be a security risk because you are blindly installing things. Shouldn't it be alright since all it's doing is upgrading packages that I already have? What am I missing by automating it?

It seems to me that this would be a problem if I did not trust the repositories in my sources.list, but this is not really a concern, as I'm only using the regular Ubuntu + universe/multiverse repositories.
 
Old 06-15-2006, 02:04 PM   #2
brianthegreat
Member
 
Registered: Oct 2005
Posts: 518

Rep: Reputation: 32
Its really not much of a problem because Dapper already does this for security upgrades. Daily would keep you more security considering possible missed updates. Weekly just seems a little too long.
 
Old 06-15-2006, 02:41 PM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
I have generally read that this can be a security risk because you are blindly installing things.
Looking at repo's the only thing that could happen is poisoning, but any (decent) package manager should use signature verification to check package integrity, besides that repo's get checked too (or so I would hope). Looking at the local situation then, except for the poisoning scenario, there's no security risk for home boxen I can see.
 
Old 06-15-2006, 04:31 PM   #4
ErrorBound
Member
 
Registered: Apr 2006
Posts: 280

Original Poster
Rep: Reputation: 31
If this script is simply placed in the /etc/cron.daily directory, will it run with sufficient privileges to run apt? Normally I have to run apt as root or using sudo.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Security Risk computerdude Linux - Security 3 08-31-2005 02:25 PM
Gentoo security risk? mikieboy Linux - Security 1 03-08-2005 07:44 PM
Security Risk? N|k0N Linux - Security 7 10-02-2004 04:52 PM
is this a security risk? shanenin Linux - Security 8 11-02-2003 04:27 PM
security risk? Notfromkansas Linux - Security 12 04-04-2002 10:30 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - General

All times are GMT -5. The time now is 12:35 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration