LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   Keeping Slackware 12.0 patched with security updates (https://www.linuxquestions.org/questions/slackware-14/keeping-slackware-12-0-patched-with-security-updates-607701/)

pwc101 12-18-2007 04:36 PM

Keeping Slackware 12.0 patched with security updates
 
Ok, I know this has probably been discussed a thousand times, but I can't seem to find information on how to keep my Slackware 12.0 install updated with all the relevant security updates.

I've browsed through my local friendly Slackware mirror, and read the Changelog.txt, and I see that since I installed Slackware there's a few patches that have been issued to fix various security issues. Is it a simple case of downloading the /patches/packages packages, and then upgradepkg'ing the lot? I presume not, as this will likely break some things, but a pointer in the right direction would be very much appreciated :)

Alien Bob 12-18-2007 05:01 PM

It is really as simple as that.
There was the exceptional case once where there was a package added to Slackware as a "patch" because it was needed by another program which was updated, but that will likely not happen again anytime soon.
So, the "upgrade *.tgz" is basically all you need to do... in runlevel 3 or even better, in runlevel 1.

Eric

pwc101 12-18-2007 05:18 PM

Should have known, this is Slackware after all :)

allend 12-18-2007 07:03 PM

Have a look at slackpkg. Once you have setup your /etc/slackpkg/mirrors and /etc/slackpkg/blacklist files then (as root):
#slackpkg update
#slackpkg upgrade-all

Works great for keeping a stable Slack install up to date.

rworkman 12-18-2007 09:41 PM

Quote:

Originally Posted by allend (Post 2995243)
Have a look at slackpkg. Once you have setup your /etc/slackpkg/mirrors and /etc/slackpkg/blacklist files then (as root):
#slackpkg update
#slackpkg upgrade-all

Works great for keeping a stable Slack install up to date.

Indeed, but I think you're after:
Code:

# slackpkg install patches
# slackpkg upgrade-all

The first will install any packages that might happen to be *added* to /patches (such as the *rare* case that Eric mentioned), and the second will upgrade everything to the version in /patches.

Linux For Ever 12-18-2007 10:40 PM

This is the way i use:

Code:

wget -c -t 0 -T 10 ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/*
Now just type
Code:

upgradepkg *.tgz
and enjoy.

gilead 12-18-2007 10:40 PM

Quote:

Originally Posted by rworkman (Post 2995346)
Indeed, but I think you're after:
Code:

# slackpkg install patches
# slackpkg upgrade-all

The first will install any packages that might happen to be *added* to /patches (such as the *rare* case that Eric mentioned), and the second will upgrade everything to the version in /patches.

Just so I understand this properly... Does that mean the full process would be:
Code:

# slackpkg update
# slackpkg install patches
# slackpkg upgrade-all

The man page recommends running the update step first to get the latest package lists.

pwc101 12-19-2007 05:27 AM

Quote:

Originally Posted by allend (Post 2995243)
Once you have setup your /etc/slackpkg/mirrors and /etc/slackpkg/blacklist files then (as root):
#slackpkg update
#slackpkg upgrade-all

I've had a look at slackpkg, and I uncommented the lines in /etc/slackpkg/blacklist for kernel-ide, kernel-modules, kernel-source, kernel-headers, aaa_elflibs and /extra/udev-alternate-versions - is there anything else I need to blacklist? I don't run any proprietary video drivers and most software I've compiled from slackbuilds.

In the mean time, I'll download the patches and upgradepkg them.

rworkman 12-19-2007 08:04 AM

Quote:

Originally Posted by gilead (Post 2995379)
Just so I understand this properly... Does that mean the full process would be:
Code:

# slackpkg update
# slackpkg install patches
# slackpkg upgrade-all

The man page recommends running the update step first to get the latest package lists.

Yes, that's correct.

rworkman 12-19-2007 08:15 AM

Quote:

Originally Posted by pwc101 (Post 2995641)
I've had a look at slackpkg, and I uncommented the lines in /etc/slackpkg/blacklist for kernel-ide, kernel-modules, kernel-source, kernel-headers, aaa_elflibs and /extra/udev-alternate-versions - is there anything else I need to blacklist? I don't run any proprietary video drivers and most software I've compiled from slackbuilds.

In the mean time, I'll download the patches and upgradepkg them.

If you've upgraded any of the stock Slackware packages with new versions *not* in /patches, then you'll need to blacklist those packages. Slackpkg's goal is to sync your installed packages with those in the official tree, so it will "upgrade" those custom packages to the versions in the official tree.

simcox1 12-19-2007 02:04 PM

Quote:

Is it a simple case of downloading the /patches/packages packages, and then upgradepkg'ing the lot?
Surely this is the easiest method? Instead of using slackpkg etc, just create a directory called patches, and subscribe to the slackware security mailing list. Whenever there's an update, go to a mirror and download it. Easy.

adriv 12-19-2007 04:03 PM

My favorite: Kslackcheck.

pwc101 12-19-2007 04:25 PM

I received a message from a user here at LQ (pyllyukko) who's written a fairly impressive script, available here: http://null.maimed.org/~pyllyukko/files/swsp.sh

I've not used it yet, but it seems to do a *lot* of stuff with verifying GPG signatures, md5sums and generally automating the process of fetching the security patches.

I haven't tested it, as I'm just going to go down the init 3 and updatepkg route, but thought someone might need it if they ever stumble across this thread in the future...

pwc101 12-19-2007 05:20 PM

I did the update (init 1 followed by upgradepkg *.tgz), and all seems to be working well :)

Phew!

adriv 12-20-2007 01:36 PM

Quote:

Originally Posted by pwc101 (Post 2996254)
I've not used it yet, but it seems to do a *lot* of stuff with verifying GPG signatures, md5sums and generally automating the process of fetching the security patches.

Which is exactly what Kslackcheck does for you automagically. ;)


All times are GMT -5. The time now is 10:33 AM.