Suchen

Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 2. Installing security updates

download PDF

In RHEL, you can install a specific security advisory and all available security updates. You can also configure the system to download and install security updates automatically.

2.1. Installing all available security updates

To keep the security of your system up to date, you can install all currently available security updates using the yum utility.

Prerequisites

  • A Red Hat subscription is attached to the host.

Procedure

  1. Install security updates using yum utility:

    # yum update --security

    Without the --security parameter, yum update installs all updates, including bug fixes and enhancements.

  2. Confirm and start the installation by pressing y:

    …
    Transaction Summary
    ===========================================
    Upgrade  … Packages
    
    Total download size: … M
    Is this ok [y/d/N]: y
  3. Optional: List processes that require a manual restart of the system after installing the updated packages:

    # yum needs-restarting
    1107 : /usr/sbin/rsyslogd -n
    1199 : -bash

    The previous command lists only processes that require a restart, and not services. That is, you cannot restart processes listed using the systemctl utility. For example, the bash process in the output is terminated when the user that owns this process logs out.

2.2. Installing a security update provided by a specific advisory

In certain situations, you might want to install only specific updates. For example, if a specific service can be updated without scheduling a downtime, you can install security updates for only this service, and install the remaining security updates later.

Prerequisites

Procedure

  1. Install a specific advisory, for example:

    # yum update --advisory=RHSA-2019:0997
  2. Alternatively, update to apply a specific advisory with a minimal version change by using the yum upgrade-minimal command, for example:

    # yum upgrade-minimal --advisory=RHSA-2019:0997
  3. Confirm and start the installation by pressing y:

    …
    Transaction Summary
    ===========================================
    Upgrade  … Packages
    
    Total download size: … M
    Is this ok [y/d/N]: y
  4. Optional: List the processes that require a manual restart of the system after installing the updated packages:

    # yum needs-restarting
    1107 : /usr/sbin/rsyslogd -n
    1199 : -bash

    The previous command lists only processes that require a restart, and not services. This means that you cannot restart all processes listed by using the systemctl utility. For example, the bash process in the output is terminated when the user that owns this process logs out.

2.3. Installing security updates automatically

You can configure your system so that it automatically downloads and installs all security updates.

Prerequisites

  • A Red Hat subscription is attached to the host.
  • The dnf-automatic package is installed.

Procedure

  1. In the /etc/dnf/automatic.conf file, in the [commands] section, make sure the upgrade_type option is set to either default or security:

    [commands]
    #  What kind of upgrade to perform:
    # default                            = all available upgrades
    # security                           = only the security upgrades
    upgrade_type = security
  2. Enable and start the systemd timer unit:

    # systemctl enable --now dnf-automatic-install.timer

Verification

  1. Verify that the timer is enabled:

    # systemctl status dnf-automatic-install.timer

Additional resources

  • dnf-automatic(8) man page on your system
Red Hat logoGithubRedditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

© 2024 Red Hat, Inc.