Linux - EnterpriseThis forum is for all items relating to using Linux in the Enterprise.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Greetings. I have got a list of 19 vulnerabilities in one of my server which needs to be patched. Kindly advice how can I go ahead with the same. Looking for an urgent solution.
OS Version: Red Hat Enterprise Linux Server release 6.8 (Santiago)
Kernel Version: 2.6.32-642.el6.x86_64
anyhow, if you don't show us the list, how could we possibly advise?
also, i'm sure a fellow LQ dweller will shortly be along and inform you of the commercial nature of redhat and your entitlement to support from them, not us.
Opss !!! I did not mean the straight forward patching of the packages !!!
Here, please note that I do not have a subscription and I basically need an archive repo location from where we can download them. Tried to a good extend, but was not able to find an appropriate one. But I am sure someone would have already gone through my situation and have found a similar repo.
Opss !!! I did not mean the straight forward patching of the packages !!!
Here, please note that I do not have a subscription and I basically need an archive repo location from where we can download them. Tried to a good extend, but was not able to find an appropriate one. But I am sure someone would have already gone through my situation and have found a similar repo.
Also, just would like to avoid CentOS packages.
I will upload the vulnerability list shortly.
a very confusing post.
not sure i understand any of it.
maybe you should drop this questionable redhat installation and use centos instead.
Hi Ondoho,
Opss !!! I did not mean the straight forward patching of the packages !!!
So what *DO* you mean when you said your server needed to be patched?
Quote:
Here, please note that I do not have a subscription and I basically need an archive repo location from where we can download them. Tried to a good extend, but was not able to find an appropriate one. But I am sure someone would have already gone through my situation and have found a similar repo. Also, just would like to avoid CentOS packages. I will upload the vulnerability list shortly.
No need to upload a list, since (as someone with a 'certification' knows), the only way to get this done is to PAY FOR RHEL. That's it; you pay for support and access to the Red Hat network, which provides packages/updates. That's it.
You've been working with Linux for at least eight years now, and list your occupation as a "Senior Systems Administrator". So you should know to either pay for RHEL, or use something else.
But if the CEO has put solely $min before legal&sensible reasoning,
And thus their CISO just Googles 'RHEL security vunlerabilities'
And gives the first-hit to the SA to implement for $min,
Rather than searching for a quick-fix from an anon untrusted repo,
Explain that security involves all applications (think Equifax).
Or just say "No.", for moral&professional reasons.
The OP, who seemed to try to be nicely helpful here in 2009-10,
Returned a few hours after my harsh post, but not since, I just noticed.
Idk what to do/say about TheWorld's trend toward such $min 'reasoning'.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.