RHEL/CentOS:yum列出/仅安装安全更新
时间:2020-01-09 10:43:10 来源:igfitidea点击:
如何仅列出或者安装RHEL 5.x或者CentOS Linux服务器下的安全更新?
如何找到每个补丁的安全更新描述,例如CVE,错误,发布日期和类型?
您可以使用yum-security插件轻松找到与安全补丁相关的信息。
该插件将选项security,cve,bz和advisory标志添加到yum以及list-security和info-security命令。
这些选项可以将软件包的列表/升级限制为特定于安全性的软件包。
这些命令为您提供安全信息。
安装插件
执行以下命令:
# yum install yum-security
如何显示可用的安全更新?
执行以下命令:
# yum list-security
输出示例:
Loaded plugins: rhnplugin, security RHSA-2009:1148-1 security httpd-2.2.3-22.el5_3.2.x86_64 RHSA-2009:1148-1 security httpd-devel-2.2.3-22.el5_3.2.i386 RHSA-2009:1148-1 security httpd-manual-2.2.3-22.el5_3.2.x86_64 RHSA-2009:1148-1 security mod_ssl-1:2.2.3-22.el5_3.2.x86_64 list-security done
要列出所有与安全性相关的更新,并获取有关是否存在安全性更新的代码,请使用:
# yum --security check-update
要获取已安装软件包固定的所有BZ的列表,请使用:
# yum list-security bugzillas
要获取有关RHSA-2009:1148-1咨询的信息,请使用:
# yum info-security RHSA-2009:1148-1
输出示例:
Loaded plugins: rhnplugin, security =============================================================================== RHSA-2009:1148 =============================================================================== Update ID : RHSA-2009:1148-1 Release : Type : security Status : final Issued : 2009-07-08 23:00:00 Bugs : 509125 - None : 509375 - None CVEs : CVE-2009-1890 : CVE-2009-1891 Description : Important: httpd security update \The Apache HTTP Server is a : popular Web server. A denial of service flaw was : found in the Apache mod_proxy module when it was : used as a reverse proxy. A remote attacker could : use this flaw to force a proxy process to consume : large amounts of CPU time. (CVE-2009-1890) A : denial of service flaw was found in the Apache : mod_deflate module. This module continued to : compress large files until compression was : complete, even if the network connection that : requested the content was closed before : compression completed. This would cause : mod_deflate to consume large amounts of CPU if : mod_deflate was enabled for a large file. : (CVE-2009-1891) All httpd users should upgrade to : these updated packages, which contain backported : patches to correct these issues. After installing : the updated packages, the httpd daemon must be : restarted for the update to take effect. Files : mod_ssl-2.2.3-22.el5_3.2.x86_64.rpm : httpd-devel-2.2.3-22.el5_3.2.i386.rpm : httpd-2.2.3-22.el5_3.2.x86_64.rpm : httpd-devel-2.2.3-22.el5_3.2.x86_64.rpm : httpd-manual-2.2.3-22.el5_3.2.x86_64.rpm : mod_ssl-2.2.3-22.el5_3.2.i386.rpm : httpd-2.2.3-22.el5_3.2.i386.rpm : httpd-manual-2.2.3-22.el5_3.2.i386.rpm info-security done
获取包含Bugzilla 3595修复程序的最新软件包的信息列表; CVE CVE-2009-1890和通报RHSA-2009:1148-1,使用:
# yum --bz 3595 --cve CVE-2009-1890 --advisory RHSA-2009:1148-1 info updates
如何仅安装所有安全更新?
执行以下命令以下载并安装所有可用的安全更新:
# yum update --security