Scanning offline RHEL6 for missing security updates
Linux - EnterpriseThis forum is for all items relating to using Linux in the Enterprise.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Scanning offline RHEL6 for missing security updates
Greetings,
I have an offline RHEL6 server, and I need to scan it for missing updates. What is the best method for determining which security relevant updates I need to apply? Thanks in advance for your help.
I am renewing my RHN (RHSN) this week, so I'll have paid support, but in the meantime I'd like to be able to determine which security relevant updates my offline system needs, if possible. I have to provide documentation to the government regarding which updates I plan to install, and when I install them. If I can't determine what updates I need before my subscription is renewed, then so be it, but I didn't realize that was the case.
More context: I just inherited this out of date system, so my priority is to bring it current asap.
I am renewing my RHN (RHSN) this week, so I'll have paid support, but in the meantime I'd like to be able to determine which security relevant updates my offline system needs, if possible. I have to provide documentation to the government regarding which updates I plan to install, and when I install them. If I can't determine what updates I need before my subscription is renewed, then so be it, but I didn't realize that was the case.
More context: I just inherited this out of date system, so my priority is to bring it current asap.
"yum list available" is a good thing to run. Also, you need to be aware that just pretty much ANY update is 'security relevant'...an old package may have vulnerabilities that you don't think about. Getting things current is your best bet.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.