unhinge@programming.dev to Linux@lemmy.mlEnglish · 8 months agoHow do you track security vulnerabilities?message-squaremessage-square34fedilinkarrow-up181arrow-down16file-text
arrow-up175arrow-down1message-squareHow do you track security vulnerabilities?unhinge@programming.dev to Linux@lemmy.mlEnglish · 8 months agomessage-square34fedilinkfile-text
Do you rely on mailing lists or news articles for security vulnerabilities? Please share. I only got to know about xz/liblzma [1] and curl [2] [3] vulnerabilities through lemmy (maybe because of high severity?). 1 ↩︎ 2 ↩︎ 3 ↩︎
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up4·8 months agoI just use unattended-upgrades and forget about it
minus-squarecorsicanguppylinkfedilinkarrow-up5·edit-28 months agoSame for the RPM ecosystem: yum-cron and walk away. Been that way for almost 25 years. Having been involved with OS Security in the middle of my career, I also still watch feeds like I used to; just, different ones, now.
I just use
unattended-upgrades
and forget about itSame for the RPM ecosystem: yum-cron and walk away. Been that way for almost 25 years.
Having been involved with OS Security in the middle of my career, I also still watch feeds like I used to; just, different ones, now.