<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Understanding Security Patching in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391102#M35860</link>
    <description>Hi,&lt;BR /&gt;I would like to verify if I understood redhat securiry patching procedure.&lt;BR /&gt;&lt;BR /&gt;1) Is it true that only way to apply security patches on redhat is installing new kernel ?&lt;BR /&gt;&lt;BR /&gt;2) I have to manage about 30 redhat enterprise systems of various releases (4.4, 4.6, 4.7) and I have to align all systems to last securiry patch without changing kernel release; all I have to do is to take last build of a kernel ? For example, a system has a rhel 4.6 (kernel 2.6.9-67), so I have to install last build for that kernel (2.6.9-67.0.22) that includes all security patches released till now. Is it right ?&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;&lt;BR /&gt;Claudio</description>
    <pubDate>Tue, 31 Mar 2009 09:19:34 GMT</pubDate>
    <dc:creator>ClaudioD'Anduono</dc:creator>
    <dc:date>2009-03-31T09:19:34Z</dc:date>
    <item>
      <title>Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391102#M35860</link>
      <description>Hi,&lt;BR /&gt;I would like to verify if I understood redhat securiry patching procedure.&lt;BR /&gt;&lt;BR /&gt;1) Is it true that only way to apply security patches on redhat is installing new kernel ?&lt;BR /&gt;&lt;BR /&gt;2) I have to manage about 30 redhat enterprise systems of various releases (4.4, 4.6, 4.7) and I have to align all systems to last securiry patch without changing kernel release; all I have to do is to take last build of a kernel ? For example, a system has a rhel 4.6 (kernel 2.6.9-67), so I have to install last build for that kernel (2.6.9-67.0.22) that includes all security patches released till now. Is it right ?&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;&lt;BR /&gt;Claudio</description>
      <pubDate>Tue, 31 Mar 2009 09:19:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391102#M35860</guid>
      <dc:creator>ClaudioD'Anduono</dc:creator>
      <dc:date>2009-03-31T09:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391103#M35861</link>
      <description>Hi Claudio,&lt;BR /&gt;&lt;BR /&gt;1. You may have security pathes for sshd daemon for example, not kernel related.&lt;BR /&gt;2. Config up2date to install all needed patches, but exclude kernel. This will move your systems to the same patch level.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;ivan</description>
      <pubDate>Tue, 31 Mar 2009 09:57:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391103#M35861</guid>
      <dc:creator>Ivan Krastev</dc:creator>
      <dc:date>2009-03-31T09:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391104#M35862</link>
      <description>Hi Ivan,&lt;BR /&gt;thank you very much for your answer&lt;BR /&gt;When Redhat releases a new build for a kernel (for example 2.6.9-67.0.1 for kernel 2.6.9-67) it's because there is an update (example: a security update) for this kernel, not an upgrade. So, if it's critical, I have to install new kernel. Right ?&lt;BR /&gt;&lt;BR /&gt;What about security patches ?&lt;BR /&gt;Where can I find rpms to update system packages (only for security purposes) without "jump" to another redhat release (from 4.6 to 4.7) ?&lt;BR /&gt;&lt;BR /&gt;Thank you very much again</description>
      <pubDate>Tue, 31 Mar 2009 11:14:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391104#M35862</guid>
      <dc:creator>ClaudioD'Anduono</dc:creator>
      <dc:date>2009-03-31T11:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391105#M35863</link>
      <description>Ok, I found answer to my question; all errata are available on RHN; now my problem is that systems can't connect to internet and I can't setup a RHN Proxy, so I have to group errata for OS release (4.4, 4.5, 4.6) as I can deploy them on my systems.&lt;BR /&gt;How can I do that ?</description>
      <pubDate>Tue, 31 Mar 2009 11:59:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391105#M35863</guid>
      <dc:creator>ClaudioD'Anduono</dc:creator>
      <dc:date>2009-03-31T11:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391106#M35864</link>
      <description>if you update you 4.4 with the latest security patches etc, it won't be 4.4 anymore.&lt;BR /&gt;&lt;BR /&gt;anyway, if there is no way to connect your systems to the net (why not? as long as you block incomming you should be fine), you should put the rpm's on a internal server and point your servers to that repository to get their updates from.</description>
      <pubDate>Wed, 01 Apr 2009 07:19:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391106#M35864</guid>
      <dc:creator>dirk dierickx</dc:creator>
      <dc:date>2009-04-01T07:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391107#M35865</link>
      <description>Shalom Claudio,&lt;BR /&gt;&lt;BR /&gt;Sorry for the late response but I'm on the go and am sitting in a mall between appointments.&lt;BR /&gt;&lt;BR /&gt;1) No. Red Hat provides security patches for critical components of the OS in rpm form, which replaces the old binaries. Many of these patches do not require a Kernel upgrade.&lt;BR /&gt;&lt;BR /&gt;Take note that security fix to RHCS, Red Hat Cluster Suite that updates its kernel components often does require a kernel upgrade. Also note that many security issues are with the kernel and DO require a kernel upgrade. If you use GFS or RHCS, take care that any kernel upgrades work with those two packages in the lab.&lt;BR /&gt;&lt;BR /&gt;2) Best thing to do is update them all to 4.7 stable kernel release. There may be application reasons not to do this, but its the way to go most of the time.&lt;BR /&gt;&lt;BR /&gt;You can use yum and set up your own little rpm patch repository to have a central patch server and lower the amount of traffic on the Internet to and from Red Hats servers.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 01 Apr 2009 08:50:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391107#M35865</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2009-04-01T08:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391108#M35866</link>
      <description>Dirk, Steven,&lt;BR /&gt;thank you very much.&lt;BR /&gt;Now it's almost clear.&lt;BR /&gt;I can't connect systems to internet because customer has a very strict firewall policy.&lt;BR /&gt;I have only one other question. If I upgrade 2 systems in cluster 4.4 to 4.7, can I do a rolling upgrade ? Or have I to schedule a stop for both systems ?&lt;BR /&gt;&lt;BR /&gt;Thank you very much again</description>
      <pubDate>Thu, 02 Apr 2009 07:34:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391108#M35866</guid>
      <dc:creator>ClaudioD'Anduono</dc:creator>
      <dc:date>2009-04-02T07:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391109#M35867</link>
      <description>I have another question too.&lt;BR /&gt;I'm tryng to update to 4.7 copying all rpms to a local repository (/var/spool/up2date) and I would like to run up2date reading rpms from that directory, but it fails because it tries to connect to RHN and my system is not connected to internet. How can I disable RHN registration ? I tried to read up2date config file but I found nothing.&lt;BR /&gt;&lt;BR /&gt;Thank you</description>
      <pubDate>Fri, 03 Apr 2009 08:52:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391109#M35867</guid>
      <dc:creator>ClaudioD'Anduono</dc:creator>
      <dc:date>2009-04-03T08:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Security Patching</title>
      <link>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391110#M35868</link>
      <description>Hi,&lt;BR /&gt;For the last questions, perhaps, you could test first with this theads, the up2date to a local directory&lt;BR /&gt;&lt;A href="http://forums13.itrc.hp.com/service/forums/questionanswer.do?threadId=1115567" target="_blank"&gt;http://forums13.itrc.hp.com/service/forums/questionanswer.do?threadId=1115567&lt;/A&gt;&lt;BR /&gt;or automated system updates with /usr/bin/up2date-config for example&lt;BR /&gt;&lt;A href="http://www.yolinux.com/TUTORIALS/LinuxTutorialSysAdmin.html#UP2DATE" target="_blank"&gt;http://www.yolinux.com/TUTORIALS/LinuxTutorialSysAdmin.html#UP2DATE&lt;/A&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Fri, 03 Apr 2009 14:28:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/understanding-security-patching/m-p/4391110#M35868</guid>
      <dc:creator>smatador</dc:creator>
      <dc:date>2009-04-03T14:28:12Z</dc:date>
    </item>
  </channel>
</rss>

