Maybe I misunderstood the plans for Stream, but I thought it was
meant to be an upstream of a specific RHEL major release (ie
RHEL8), unlike Fedora which is an upstream of RHEL "next". So,
since RHEL8 is tied to php7.2, Stream would remain php7.2 as well,
while Fedora would get php7.3/7.4/7.5/7.6 until they decided to
lock it in for the RHEL 9 alpha release. Reading the FAQ at
https://wiki.centos.org/FAQ/CentOSStream seems to indicate that:
"Its content
is what Red Hat intends to be in the next update of a stable
RHEL release."
"At a future milestone, users can expect CentOS Stream content will include content intended for inclusion in the next RHEL minor release."
"Around the time the RHEL 9 Public Beta is issued, an additional set of CentOS Stream repositories and ISOs will be available."
-spp
--
This list provided by the League of Professional System Administrators
http://lopsa.org/
---
You received this message because you are subscribed to the Google Groups "LOPSA Tech Discussion list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tech+uns...@lopsa.org.
To view this discussion on the web visit https://groups.google.com/a/lopsa.org/d/msgid/tech/2002d736-5ea6-16fe-af21-ea00e99ea637%40unixsa.net.
--
Patrick Landry Director, University Computing Support Services University of Louisiana at Lafayette P.O. Box 43621 Lafayette, LA 70504 (337) 482-6402 patrick...@louisiana.edu ––––––––––––––––––––––––– Université des Acadiens
To some degree this is acceptable since if the bug is not exploitable on the platform it really doesn't matter.
In other cases it can be considered death by 1000 cuts. If you pair hole 1 with hole 2, can you get root?
Others require that you made no changes from the default configs for the RH statements to be true.
These levels of support put a much bigger load on the IT and Security teams that are managing the systems as well.
You'll need to be digging into every new vuln that comes up and doing eval on it. In some cases RH provides
enough detail on why they are not touching it, but others are kind of vague.
In once case we looked at the report indicated this was not significant since the config files for the
software package had the vuln feature disabled by default. If you changed the config file, your
system was now had a crit vuln on it that RH wasn't going to fix. Back to the source tree for the app and compile on your own.
If you deal with a vuln scanner, kali, tenable, ..., many work off of banner grabs. Since the banners are
coming up as EOL or vuln versions, you'll need to dig into them to prove the patch is backported and have
docs for any auditor to prove it. Then if you accept the risk of the system, what happens when someone
rebuilds that server? Did the patch get rolled back in, or are you working from bad info?
--Gene