LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Enterprise Linux Forums > Linux - Enterprise
User Name
Password
Linux - Enterprise This forum is for all items relating to using Linux in the Enterprise.

Notices


Reply
  Search this Thread
Old 02-19-2021, 12:30 AM   #1
roffeboffe
LQ Newbie
 
Registered: Nov 2020
Location: Fredrikstad, Norway
Distribution: Ubuntu/Debian/CentOS/RedHat
Posts: 13

Rep: Reputation: Disabled
Safe to patch security only?


Hi

I am managing 300+ linux servers and use Ansible/AWX for patching. We are patching all servers monthly.

One division have had one ore two bad experiences with patching everything. Particularly postgres has broken (once or twice) and one time a new kernel broke their software. So they have asked us to apply security patches only.

I have the final say in this and I think it is wiser to patch everything every month and rather fix problems when (if) they happen. We are doing snapshots before patching and removes snapshots 48 hours after patching.

What do you think is best? What are the possible implications of security only patches?

If the security updates are sufficient to keep systems secure I am willing to grant their wish.

Running CentOS and Ubuntu on the servers. We are in the process of migrating to Ubuntu/debian only.
 
Old 02-19-2021, 07:18 AM   #2
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,616

Rep: Reputation: 2554Reputation: 2554Reputation: 2554Reputation: 2554Reputation: 2554Reputation: 2554Reputation: 2554Reputation: 2554Reputation: 2554Reputation: 2554Reputation: 2554
Quote:
Originally Posted by roffeboffe View Post
What do you think is best? What are the possible implications of security only patches?

If the security updates are sufficient to keep systems secure I am willing to grant their wish.
I think the best thing is to only make the changes that keep the systems secure without breaking the software.

Lots of other people agree, and hence there often these things called "security updates" which will keep software secure, but will not change behaviour unless it's absolutely necessary...

Quote:
Originally Posted by https://www.debian.org/security/faq#oldversion
Q: Why are you fiddling with an old version of that package?

The most important guideline when making a new package that fixes a security problem is to make as few changes as possible. Our users and developers are relying on the exact behaviour of a release once it is made, so any change we make can possibly break someone's system. This is especially true in case of libraries: make sure you never change the Application Program Interface (API) or Application Binary Interface (ABI), no matter how small the change is.

This means that moving to a new upstream version is not a good solution, instead the relevant changes should be backported. Generally upstream maintainers are willing to help if needed, if not the Debian security team might be able to help.

In some cases it is not possible to backport a security fix, for example when large amounts of source code need to be modified or rewritten. If that happens it might be necessary to move to a new upstream version, but this has to be coordinated with the security team beforehand.
 
Old 02-19-2021, 07:30 AM   #3
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,923

Rep: Reputation: 7319Reputation: 7319Reputation: 7319Reputation: 7319Reputation: 7319Reputation: 7319Reputation: 7319Reputation: 7319Reputation: 7319Reputation: 7319Reputation: 7319
I would say: try to apply those (or any) patches on one server and test it. In general you can apply every patch within a release, that should not harm anything (but obviously it is not true, there are cases .....)
From the other hand the installed/needed patches may depend on other software and other requirements. For production servers we always try to avoid any changes, therefore we install only the recommended security patches.
 
Old 04-20-2021, 06:13 PM   #4
scottieH
Member
 
Registered: Mar 2021
Posts: 58

Rep: Reputation: Disabled
I have a similar issue. 300+ Linux machines. I am on a closed network. I DO NOT apply updates!
Let me explain:
We have a development environment. We develop custom software (and build the hardware to run it). Each software release is assigned a RedHat OS Version. Our software is then developed on this OS. We patch & upgrade on the development system. Until code cut-off. Then the baseline is fixed. We keep this fixed baseline until EOL of the software. All told, Start of Development to End OF Life is about 2 years.

When CVE's come out, most of them do not apply to us -> no action is required -> no patches.
If a CVE appears that _may_ affect us, we look at the risk and the mitigation strategy. Often, no action is required. Sometimes, we can mitigate the risk.
In 20 years, we've actually had to patch ONCE.

You CANNOT just push the updates. If there is a kernel change, and you choose to upgrade to the new kernel, you MUST upgrade the kernel (this may require a re-installation or re-build of some drivers like nVidia). Then REBOOT. Validate everything still works. Then and ONLY THEN can you upgrade all the other packages. Otherwise, you have a descent chance of breaking the machine.

When the new software release comes, a new OS comes with it, which is already patched and hardened.

If at all possible, we DO NOT UPGRADE the computers. We kickstart them. Some of our servers are upgraded. We have a lot of crap on these machines that doesn't need to be there anymore, but no one knows for sure if any of the dependencies are still in use. So we leave them until the hardware is EOL'd. *YUCK*

When we do push updates, patches, new software (in our development environment), we do it piece meal. A few workstations. Then a bit more workstations. Then a few servers -- not all the same type of servers.
Ex: We won't do all of our webserver. Just one or two. On the same day, we might do one /home server, 2 database servers, etc.
This way, if something creates a SNAFU, it is a minimal impact. We can work it out before continuing.
With out 300+ hosts, we might make changes every 2 weeks. It could take 3 months to push our updates to all of the machines.

Having a cron that updates all of the packages once a week will cause headaches and frustrations and unnecessary down time.

Do it smartly. Only do what you need, when you need it.
If you are on a closed network, you most likely don't need it all.

/rant
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Android 10 Gets Its First Security Patch, 49 Security Vulnerabilities Fixed LXer Syndicated Linux News 0 09-12-2019 04:21 AM
LXer: Google Releases Android Security Patch for May 2019, Includes 30 Security Fixes LXer Syndicated Linux News 0 05-07-2019 04:32 AM
Patch testing - glibc with the posted patch in security thread hua Slackware 2 01-28-2015 03:29 PM
How do i patch 2.4.21-37 kernel with antidote2 security patch suchi Linux - Kernel 4 09-05-2006 02:29 AM
How to Apply patch for Mass Storage device to work? (uss725-2.4.20-rc2.patch) cevjr Linux - Hardware 3 04-20-2004 11:14 PM

LinuxQuestions.org > Forums > Enterprise Linux Forums > Linux - Enterprise

All times are GMT -5. The time now is 10:03 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration