On Thu, 21 Sep 2006, Jeremy C. Reed wrote: > Does anyone know of a tool for checking if installed packages on a CentOS > system have known vulnerabilities? If you are current in updates, the default centos install all have yum configs which apply all security related updates for supported repositories automatically -- run yum; reboot if the glibc, the kernel, libraries or other 'key' packages are updated. all done. running: rpm -q --changelog packagename usually mentions the CVE, etc numbers addressed, if you wish to tick off that they are addressed. There is NO substitute to having and reading a subscription to the centos-announce mailing list, which carries all notifications, in a convenient (to procmail) parsable form; a subscription to the upstream's security announcement mailing lists for your major release level is also a good idea. Our worst case lags since project inception, have been less than 3 days after the upstream, as to security updates. -- Russ Herrold (also herrold@centos.org, who handles the 'security' role account for the project.) --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change you mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss