在RHEL和CentOS上检查或列出已安装的安全更新的两种方法

发表于:2019-6-12 10:01  作者:Magesh Maruthamuthu   来源:Linux中国

字体: | 上一篇 | 下一篇 |我要投稿 | 推荐标签: Linux 操作系统

  在本文中,我们将向你展示如何检查已安装的安全更新。我会介绍两种方法,你可以选择最适合你的。
  此外,我还添加了一个小的 shell 脚本,它为你提供已安装的安全包计数。
  运行以下命令获取系统上已安装的安全更新的列表。
   # yum updateinfo list security installed
  Loaded plugins: changelog, package_upload, product-id, search-disabled-repos,
  : subscription-manager, verify, versionlock
  RHSA-2015:2315 Moderate/Sec.  ModemManager-glib-1.1.0-8.git20130913.el7.x86_64
  RHSA-2015:2315 Moderate/Sec.  NetworkManager-1:1.0.6-27.el7.x86_64
  RHSA-2016:2581 Low/Sec.       NetworkManager-1:1.4.0-12.el7.x86_64
  RHSA-2017:2299 Moderate/Sec.  NetworkManager-1:1.8.0-9.el7.x86_64
  RHSA-2015:2315 Moderate/Sec.  NetworkManager-adsl-1:1.0.6-27.el7.x86_64
  RHSA-2016:2581 Low/Sec.       NetworkManager-adsl-1:1.4.0-12.el7.x86_64
  RHSA-2017:2299 Moderate/Sec.  NetworkManager-adsl-1:1.8.0-9.el7.x86_64
  RHSA-2015:2315 Moderate/Sec.  NetworkManager-bluetooth-1:1.0.6-27.el7.x86_64
  要计算已安装的安全包的数量,请运行以下命令:
  # yum updateinfo list security installed | wc -l
  1046
  仅打印安装包列表:
  # yum updateinfo list security all | grep -w "i"
  i RHSA-2015:2315 Moderate/Sec.  ModemManager-glib-1.1.0-8.git20130913.el7.x86_64
  i RHSA-2015:2315 Moderate/Sec.  NetworkManager-1:1.0.6-27.el7.x86_64
  i RHSA-2016:2581 Low/Sec.       NetworkManager-1:1.4.0-12.el7.x86_64
  i RHSA-2017:2299 Moderate/Sec.  NetworkManager-1:1.8.0-9.el7.x86_64
  i RHSA-2015:2315 Moderate/Sec.  NetworkManager-adsl-1:1.0.6-27.el7.x86_64
  i RHSA-2016:2581 Low/Sec.       NetworkManager-adsl-1:1.4.0-12.el7.x86_64
  i RHSA-2017:2299 Moderate/Sec.  NetworkManager-adsl-1:1.8.0-9.el7.x86_64
  i RHSA-2015:2315 Moderate/Sec.  NetworkManager-bluetooth-1:1.0.6-27.el7.x86_64
  i RHSA-2016:2581 Low/Sec.       NetworkManager-bluetooth-1:1.4.0-12.el7.x86_64
  i RHSA-2017:2299 Moderate/Sec.  NetworkManager-bluetooth-1:1.8.0-9.el7.x86_64
  i RHSA-2015:2315 Moderate/Sec.  NetworkManager-config-server-1:1.0.6-27.el7.x86_64
  i RHSA-2016:2581 Low/Sec.       NetworkManager-config-server-1:1.4.0-12.el7.x86_64
  i RHSA-2017:2299 Moderate/Sec.  NetworkManager-config-server-1:1.8.0-9.el7.noarch
  要计算已安装的安全包的数量,请运行以下命令:
   # yum updateinfo list security all | grep -w "i" | wc -l
  1043
  或者,你可以检查指定包修复的漏洞列表。
  在此例中,我们将检查 “openssh” 包中已修复的漏洞列表:
   # rpm -q --changelog openssh | grep -i CVE
  - Fix for CVE-2017-15906 (#1517226)
  - CVE-2015-8325: privilege escalation via user's PAM environment and UseLogin=yes (#1329191)
  - CVE-2016-1908: possible fallback from untrusted to trusted X11 forwarding (#1298741)
  - CVE-2016-3115: missing sanitisation of input for X11 forwarding (#1317819)
  - prevents CVE-2016-0777 and CVE-2016-0778
  - Security fixes released with openssh-6.9 (CVE-2015-5352) (#1247864)
  - only query each keyboard-interactive device once (CVE-2015-5600) (#1245971)
  - add new option GSSAPIEnablek5users and disable using ~/.k5users by default CVE-2014-9278
  - prevent a server from skipping SSHFP lookup - CVE-2014-2653 (#1081338)
  - change default value of MaxStartups - CVE-2010-5107 (#908707)
  - CVE-2010-4755
  - merged cve-2007_3102 to audit patch
  - fixed audit log injection problem (CVE-2007-3102)
  - CVE-2006-5794 - properly detect failed key verify in monitor (#214641)
  - CVE-2006-4924 - prevent DoS on deattack detector (#207957)
  - CVE-2006-5051 - don't call cleanups from signal handler (#208459)
  - use fork+exec instead of system in scp - CVE-2006-0225 (#168167)
  同样,你可以通过运行以下命令来检查相应的包中是否修复了指定的漏洞:
  # rpm -q --changelog openssh | grep -i CVE-2016-3115
  - CVE-2016-3115: missing sanitisation of input for X11 forwarding (#1317819)
  如何使用 Shell 脚本计算安装的安全包?
  我添加了一个小的 shell 脚本,它可以帮助你计算已安装的安全包列表。
  # vi /opt/scripts/security-check.sh
  #!/bin/bash
  echo "+-------------------------+"
  echo "|Security Advisories Count|"
  echo "+-------------------------+"
  for i in Important Moderate Low
  do
  sec=$(yum updateinfo list security installed | grep $i | wc -l)
  echo "$i: $sec"
  done | column -t
  echo "+-------------------------+"
  给 security-check.sh 文件执行权限。
 $ chmod +x security-check.sh
  最后执行脚本统计。
   # sh /opt/scripts/security-check.sh
  +-------------------------+
  |Security Advisories Count|
  +-------------------------+
  Important:  480
  Moderate:   410
  Low:        111
  +-------------------------+
  
      上文内容不用于商业目的,如涉及知识产权问题,请权利人联系博为峰小编(021-64471599-8017),我们将立即处理。


【调查报告】你以为的测试行业现状,其实是这样的!

评 论

论坛新帖

顶部 底部


建议使用IE 6.0以上浏览器,800×600以上分辨率,法律顾问:上海瀛东律师事务所 张楠律师
版权所有 上海博为峰软件技术股份有限公司 Copyright©51testing.com 2003-2019, 沪ICP备05003035号
投诉及意见反馈:webmaster@51testing.com; 业务联系:service@51testing.com 021-64471599-8017

沪公网安备 31010102002173号

51Testing官方微信

51Testing官方微博

扫一扫 测试知识全知道