As a user of VyOS, how should we defend ourselves against all these types of vulnerabilities on the VyOS platform when the updates themselves are pretty sporadic.
When I did attempt to patch update the OS on 1.1.0beta1 a while back, dozens of errors were reported.
I just wonder what the strategy is for VyOS to stay on top of these sorts of things because if its not heartbleed or bash vulnerabilities, it will be something else.
I’ve been through about 15 Vyatta CE instances (all virtual) that were on 6.4/6.5/6.6 and migrated them all to VyOS 1.0.5 without issues.
The only problem I had was a single VM running Vyatta 6.4, that when it went through the upgrade process, for some reason created 2xadditional NICs which needed manual deletion in the /config/config.boot fille.
I also had a minor issue in that the radius configuration on one of the VMs that hooks into our corporate radius server, wasn’t carried across during the update but luckily I had build notes so was easily able to rectify.
Your best bet is to migrate all your Vyatta CE instances to VyOS 1.0.5 (or later).