Redhat linux version 2.6.32-431.1.2.el6 free download

Redhat linux version 2.6.32-431.1.2.el6 free download

redhat linux version 2.6.32-431.1.2.el6 free download

gstreamer-plugins-bad-free-devel-0.10.19-3.el6_5.x86_64.rpm, 2014-08-29 22:​24, 13K kernel-2.6.32-431.1.2.el6.x86_64.rpm, 2013-12-13 12:05, 28M redhat-rpm-config-9.0.3-44.sl6.noarch.rpm, 2015-07-24 23:14, 59K. [DIR], repodata. gstreamer-plugins-bad-free-debuginfo-0.10.19-5.el6_8.x86_64.rpm, 2016-12-21 09:41 kernel-debug-debuginfo-2.6.32-431.1.2.el6.x86_64.rpm, 2017-07-24 12:​40, 260M perl516-perl-Linux-Pid-debuginfo-0.04-19.el6.centos.alt.x86_64.rpm publican-redhat-debuginfo-2.0-1.el6.x86_64.rpm, 2012-11-06 14:53, 6.3K. (OVZ# 2128) * The "free" command had been enhanced to not include the amount of The packages are available for download on the OpenVZ website at new kernel based on the Red Hat Enterprise Linux 6.5 kernel (2.6.32-431.1.2.​el6).

Redhat linux version 2.6.32-431.1.2.el6 free download - with

Linux补丁升级文档-Linux_sack内核漏洞修复V3.0

3. 搭建本地yum源服务器

搭建 yum源可分为在Linux 、 Windows 两种操作系统环境 下搭建, 目的都是为了使客户端方便下载补丁以及解决软件依赖包问题。

3.1. 搭建本地yum源服务器 ( Linux )

红帽补丁解决方案分为几种,根据客户环境条件可以分别使用Red
Hat Satellite或Red Hat Update
Infrastructure(RHUI)或者更为手动方式:通过RHEL上的红帽订阅管理器连接红帽内容传输网络Red Hat Content
Delivery
Network(CDN)进行软件存储库同步,即可获取最新的软件包进行软件安装与补丁修复。但这种方式需要有对应地RHEL服务器授权注册到红帽订阅管理器才可以进行同步。

由于前3种方式需具备一定的前提条件,所以为了更快地解决此次内核补丁依赖包问题我们选择另外一种灵活的方式:

1、 使用内核补丁对应地红帽操作系统最新的发行版本作为依赖包的基础仓库,如修复RHEL7的内核补丁,则用RHEL7当前最新的操作系统ISO镜像RHEL7.6作为基础仓库。

2、 登陆红帽客户网站下载最新漏洞补丁包,再额外搭建一个专门用于此次漏洞修复的补丁包仓库。

下面将介绍相关软件包的下载方法与补丁包仓库搭建方法:

3.1.1. 访问红帽客户网站安全频道,获取漏洞详情

通过红帽客户网站安全频道找到CVE安全公告号对应的漏洞详情页面,查看漏洞描述、漏洞所影响的操作系统版本等信息。

https://access.redhat.com/security/vulnerabilities/tcpsack

https://access.redhat.com/security/cve/cve-2019-11477

https://access.redhat.com/security/cve/cve-2019-11478

https://access.redhat.com/security/cve/cve-2019-11479

3.1.2. 查找漏洞对应的红帽安全公告号(RHSA)

根据CVE安全公告号详情页中的Red Hat Security Errata(红帽安全勘误表)找到红帽对应地安全公告号(RHSA)

例如RHEL6对应的是 https://access.redhat.com/errata/RHSA-2019:1488

例如RHEL7对应的是 https://access.redhat.com/errata/RHSA-2019:1481

点击对应地RHSA链接后,会有RHSA安全公告描述与所涉及更新的软件包。

3.1.3. 下载对应的补丁软件包

点击“更新的软件包”,即可列出此次修复当前RHEL版本所涉及的软件包下载列表。随后根据服务器平台架构将进行相应下载。

在这里选择“X86_64”平台,点击最右侧的“下载”按钮即可直接下载当前软件包最新版本。需要将该RHSA公告号所列出的所有X86_64架构的软件包下载至一个文件夹内。例如RHSA-2019:1488所涉及软件包命名为sack_rhel6,RHSA-2019:1481所涉及软件包命名为sack_rhel7。

如果点击左侧软件的软件包名,如“ kernel-2.6.32-754.15.3.el6.x86_64.rpm ”,则会进入到该软件包下载详情页,可以根据实际情况选择软件包历史版本下载。在这建议直接下载最新的软件包即可。

例如RHEL7已通过 https://access.redhat.com/errata/RHSA-2019:1481

下载X86_64平台的相关软件包存放在sack_rhel7文件夹中。

3.1.4. 使用createrepo创建存储库元数据

重要: 使用createrepo命令必须要与createrepo对应地RHEL主要版本一起运行。这是由于主要版本之间的rpm格式差异。这意味着您需要在RHEL5 上运行createrepo只能用于RHEL5存储库,在RHEL6 上运行createrepo只能用于RHEL6存储库依此类推。

我们提前将下载好的补丁包sack_rhel7文件夹上传到对应的RHEL7服务器中:/root/Desktop/sack_rhel7/

如果没有 createrepo 则需要进行安装:

[root@patch_rhel7 Desktop]# yum install createrepo

对补丁文件夹创建存储库元数据:

[root@patch_rhel7 Desktop]# createrepo -v sack_ rhel7 /

如果更新存储库则使用如下命令:

[root@patch_rhel7 Desktop]#createrepo –update sack_ rhel7 /

随后可以看到sack_rhel7目录中多了一个repodata目录,说明存储库元数据创建完毕。

3.1.5. 手动搭建本地源仓库(Linux)

在此,我们规划搭建两个补丁仓库,分别为sack_rhel7补丁仓库、rhel7.6操作系统镜像仓库。

在安装kernel包的过程中,会遇到软件依赖问题,而根据操作系统最新的发行版本镜像包,基本能解决大部分软件依赖问题。然后再通过手动下载的最新的kernel包组,既包含了最新的更新补丁,也一定程度上解决了软件依赖问题。

一、搭建sack_rhel7补丁仓库:

1. 安装 apache

# yum install httpd

2. 在apache目录下,创建sack补丁包仓库存放目录,如sack_rhel7

# mkdir /var/www/html/ sack_rhel7

3. 拷贝已经创建好元数据的sack_rhel7补丁包到apache目录下,包括repodata。

# cp -R /root/Desktop/sack_rhel7 /* /var/www/html/ sack_rhel7/

4. 修改目录权限

#chmod a+rx -R /var/www/html/ sack_rhel7/

5. 仅当SELinux处于 (enforcing) 强制模式时,才需要chcon命令。

#chcon -R httpd_sys_content_t /var/www/html/ sack_rhel7

6. 通过另外一台Linux使用wget命令测试访问httpd服务器(假设网络与主机防火墙未作限制,网络可直接可达),应该可以下载相关软件包。

[root@rhel7 ~]# wget http://192.168.40.20/sack_rhel7/kernel-3.10.0-957.21.3.el7.x86_64.rpm

–2019-07-10 17:28:41– http://192.168.40.20/sack_rhel7/kernel-3.10.0-957.21.3.el7.x86_64.rpm

Connecting to 192.168.40.20:80… connected.

HTTP request sent, awaiting response… 200 OK

Length: 50600264 (48M) [application/x-rpm]

Saving to: ‘kernel-3.10.0-957.21.3.el7.x86_64.rpm’

100%[================================================================================================================================================>]
50,600,264 81.8MB/s in 0.6s

2019-07-10 17:28:42 (81.8 MB/s) – ‘kernel-3.10.0-957.21.3.el7.x86_64.rpm’ saved [50600264/50600264]

二、搭建rhel7.6操作系统镜像仓库:

1. 在apache目录下,创建rhel7.6操作系统镜像仓库存放目录,如rhel7.6

# mkdir /var/www/html/ rhel7.6

2. 上传操作系统镜像ISO到/mnt目录下,或者使用CD/DVD挂载操作系统镜像。

mount -o loop /mnt/rhel-server-7.6-x86_64-dvd.iso /mnt/RHEL7/u6/RedHatEnterpriseLinuxServer/x86_64

3. 由于rhel7.6操作系统镜像包已经包含软件仓库元数据,所以可以直接拷贝到apache目录下。

# cp -R /mnt/RHEL7/u6/RedHatEnterpriseLinuxServer/x86_64/* /var/www/html/ rhel7.6 /

4. 拷贝已经创建好元数据的sack_rhel7补丁包到apache目录下,包括repodata。

5. 修改目录权限

#chmod a+rx -R /var/www/html/ rhel7.6 /

6. 仅当SELinux处于 (enforcing) 强制模式时,才需要chcon命令。

#chcon -R httpd_sys_content_t /var/www/html/ rhel7.6 /

RHEL6本地源仓库搭建方法与上述方法类同。

3.1.6. 搭建本地源仓库脚本示例

以下脚本请根据实际情况修改。

3.1.6.1. RHEL6使用ISO镜像包搭建http服务器脚本

#/bin/bash

if ! rpm -q httpd > /dev/null

then

echo “httpd service not found. You need to install and configure it before running this script.”

exit 1

fi

if [ ! -d “/var/www/html/” ]; then

echo “The httpd document root /var/www/html/ does not exist. Reconfigure your httpd service and try again.”

exit 1

fi

repoFolder=”/mnt/RHEL6/u7/RedHatEnterpriseLinuxServer/x86_64″

mkdir -p $repoFolder

mkdir -p /var/www/html/RHEL6/u7/RedHatEnterpriseLinuxServer/x86_64/

mount -o loop /data/rhel-server-6.10-x86_64-dvd.iso $repoFolder

shopt -s dotglob

echo “Copying files from $repoFolder/ to /var/www/html/RHEL6/u7/RedHatEnterpriseLinuxServer/x86_64/”

cp -R $repoFolder/* /var/www/html/RHEL6/u7/RedHatEnterpriseLinuxServer/x86_64/

chmod a+rx -R /var/www/html/RHEL6/u7/RedHatEnterpriseLinuxServer/x86_64/

umount $repoFolder

if ! service httpd status > /dev/null

then

service httpd start

fi

chcon -R -t httpd_sys_content_t /var/www/html/RHEL6/u7/RedHatEnterpriseLinuxServer/x86_64/

3.1.6.2. RHEL7使用ISO镜像包搭建http服务器脚本

#/bin/bash

if ! rpm -q httpd > /dev/null

then

echo “httpd service not found. You need to install and configure it before running this script.”

exit 1

fi

if [ ! -d “/var/www/html/” ]; then

echo “The httpd document root /var/www/html/ does not exist. Reconfigure your httpd service and try again.”

exit 1

fi

repoFolder=”/mnt/RHEL7/u6/RedHatEnterpriseLinuxServer/x86_64″

mkdir -p $repoFolder

mkdir -p /var/www/html/rhel7.6/

mount -o loop /mnt/rhel-server-7.6-x86_64-dvd.iso $repoFolder

shopt -s dotglob

echo “Copying files from $repoFolder/ to /var/www/html/rhel7.6/”

cp -R $repoFolder/* /var/www/html/rhel7.6/

chmod a+rx -R /var/www/html/rhel7.6/

umount $repoFolder

if ! service httpd status > /dev/null

then

service httpd start

fi

chcon -R -t httpd_sys_content_t /var/www/html/rhel7.6/

3.2. 搭建本地yum源服务器 ( Windows )

3.2.1. 在windows上安装nginx-1.16

假设windows yum源服务器 IP: 192.168.40.20

3.2.2. 进入conf文件夹,配置nginx.conf文件

(加粗为新增配置)

http {

include mime.types;

default_type application/octet-stream;

autoindex on;

autoindex_exact_size off;

autoindex_localtime on;

……

1. 提前将红帽RHEL6.10与RHEL7.6的操作系统ISO镜像进行解压,将解压后的重命名为rhel6.10、rhel7.6,并拷贝至nginx-1.16.0\html下。

2. 再将sack_linux6、sack_linux7(漏洞补丁包)拷贝至nginx-1.16.0\html下。

3. 记录搭建好的本地yum源主机IP。(本文的yum源主机IP为: 192.168.40.20 )

4. 配置 yum源仓库 客户端

本次测试的操作系统为:

Red Hat Enterprise Linux Server release 7.3 (RHEL7.3)

Red Hat Enterprise Linux Server release 6.5 (RHEL6.5)

注意:需要先确认当前操作系统发行版本,然后再下载对应的yum REPO文件,否则可能造成系统软件安装异常,造成操作系统无法启动。

RHEL7.3:对应rhel7.6.repo(操作系统镜像包)、sack_rhel7.repo (sack补丁包)

RHEL6.5:对应rhel6.10.repo(操作系统镜像包)、sack_rhel6.repo (sack补丁包)

1. 查看操作系统版本(红帽):

[root@localhost ~]# cat /etc/redhat-release

Red Hat Enterprise Linux Server release 7.3 (Maipo)

2. 登录需修复的linux主机,为避免原有的yum配置文件对此次补丁安装的影响,需重命名原来的/etc/yum.repos.d目录中的repo文件,例如

mv redhat.repo redhat.repo.bak

………….

3. 将yum配置文件rhel7.6.repo、sack_rhel7.repo下载至本地/etc/yum.repos.d目录中

RHEL6:

wget -O /etc/yum.repos.d/rhel6.10.repo http:// 192.168.40.20 /rhel6.10.repo

wget -O /etc/yum.repos.d/sack_rhel6.repo http:// 192.168.40.20 /sack_rhel6.repo

RHEL7:

wget -O /etc/yum.repos.d/rhel7.6.repo http:// 192.168.40.20 /rhel7.6.repo

wget -O /etc/yum.repos.d/sack_rhel7.repo http:// 192.168.40.20 /sack_rhel7.repo

内核漏洞检测脚本:

wget http:// 192.168.40.20 /cve-2019-11477–2019-06-17-1629.sh

如果无wget工具可以尝试使用curl下载:

curl -o /etc/yum.repos.d/rhel7.6.repo http:// 192.168.40.20 /rhel7.6.repo

curl -o /etc/yum.repos.d/sack_rhel7.repo http:// 192.168.40.20 /sack_rhel7.repo

4. 或者手工方式在/etc/yum.repos.d目录下新建rhel7.6.repo、sack_rhel7.repo配置文件。 (此次安装补丁的示例为RHEL7.3)

[root@localhost yum.repos.d]# cat rhel7.6.repo

[rhel7.6]

name=rhel7.6

baseurl=http:// 192.168.40.20 /rhel7.6/

gpgcheck=0

enabled=1

[root@localhost yum.repos.d]# cat sack_rhel7.repo

[sack_rhel7]

name=sack_rhel7

baseurl=http:// 192.168.40.20 /sack_linux7/

gpgcheck=0

enabled=1

5. 安装前清理yum源缓存并列出软件仓库列表

yum clean all && yum repolist

[root@localhost yum.repos.d]# yum clean all

Loaded plugins: langpacks, product-id, search-disabled-repos, subscription-

: manager

This system is not registered
to Red Hat Subscription Management. You can use su
bscription-manager to register.

Cleaning repos: rhel7.6 sack_rhel7

Cleaning up everything

[root@localhost yum.repos.d]# yum repolist

Loaded plugins: langpacks, product-id, search-disabled-repos, subscription-

: manager

This system is not registered
to Red Hat Subscription Management. You can use su
bscription-manager to register.

rhel7.6 | 4.3 kB 00:00

sack_rhel7 | 2.9 kB 00:00

(1/3): rhel7.6/group_gz | 146 kB 00:00

(2/3): sack_rhel7/primary_db | 846 kB 00:00

(3/3): rhel7.6/primary_db | 4.2 MB 00:00

repo id repo name status

rhel7.6 rhel7.6 5,152

sack_rhel7 sack_rhel7 19

repolist: 5,171

5. 安装操作系统内核

(重要:安装补丁前需关闭g01 等 安全防护功能、 做好相应的备份措施如: 虚拟机提前打快照)

1. 可以查看当前操作系统内核rpm包版本

[root@localhost yum.repos.d]# rpm -qa|grep kernel

abrt-addon-kerneloops-2.1.11-45.el7.x86_64

kernel-devel-3.10.0-514.el7.x86_64

kernel-tools-libs-3.10.0-514.el7.x86_64

kernel-headers-3.10.0-514.el7.x86_64

kernel-tools-3.10.0-514.el7.x86_64

kernel-3.10.0-514.el7.x86_64

2. 可以查看当前操作系统内核版本

[root@localhost yum.repos.d]# uname -a

Linux localhost 3.10.0-514.el7.x86_64 #1 SMP Wed Oct 19 11:24:13 EDT 2016 x86_64 x86_64 x86_64 GNU/Linux

3. 安装操作系统内核 (重要:强烈建议保留旧内核(使用install命令),防止新内核升级出现问题)

不要加-y参数,不要使用upgrade,update,确认当前所安装的内核是否为对应操作系统版本的内核。

[root@localhost yum.repos.d]# yum install kernel

Loaded plugins: langpacks, product-id, search-disabled-repos, subscription-manager

This system is not registered to Red Hat Subscription Management. You can use subscription-manager to register.

Resolving Dependencies

–> Running transaction check

—> Package kernel.x86_64 0:3.10.0-957.21.3.el7 will be installed

–> Processing Dependency: linux-firmware >= 20180911-68 for package: kernel-3.10.0-957.21.3.el7.x86_64

–> Processing Dependency: dracut >= 033-502 for package: kernel-3.10.0-957.21.3.el7.x86_64

–> Running transaction check

—> Package dracut.x86_64 0:033-463.el7 will be updated

–> Processing Dependency: dracut = 033-463.el7 for package: dracut-network-033-463.el7.x86_64

–> Processing Dependency: dracut = 033-463.el7 for package: dracut-config-rescue-033-463.el7.x86_64

—> Package dracut.x86_64 0:033-554.el7 will be an update

—> Package linux-firmware.noarch 0:20160830-49.git7534e19.el7 will be updated

—> Package linux-firmware.noarch 0:20180911-69.git85c5d90.el7 will be an update

–> Running transaction check

—> Package dracut-config-rescue.x86_64 0:033-463.el7 will be updated

—> Package dracut-config-rescue.x86_64 0:033-554.el7 will be an update

—> Package dracut-network.x86_64 0:033-463.el7 will be updated

—> Package dracut-network.x86_64 0:033-554.el7 will be an update

–> Processing Conflict: kernel-3.10.0-957.21.3.el7.x86_64 conflicts selinux-policy-targeted < 3.13.1-201

–> Restarting Dependency Resolution with new changes.

–> Running transaction check

—> Package selinux-policy-targeted.noarch 0:3.13.1-102.el7 will be updated

—> Package selinux-policy-targeted.noarch 0:3.13.1-229.el7 will be an update

–> Processing Dependency: selinux-policy = 3.13.1-229.el7 for package: selinux-policy-targeted-3.13.1-229.el7.noarch

–> Processing Dependency: selinux-policy = 3.13.1-229.el7 for package: selinux-policy-targeted-3.13.1-229.el7.noarch

–> Processing Dependency: policycoreutils >= 2.5-24 for package: selinux-policy-targeted-3.13.1-229.el7.noarch

–> Running transaction check

—> Package policycoreutils.x86_64 0:2.5-8.el7 will be updated

–> Processing Dependency: policycoreutils = 2.5-8.el7 for package: policycoreutils-python-2.5-8.el7.x86_64

—> Package policycoreutils.x86_64 0:2.5-29.el7 will be an update

–> Processing Dependency: libselinux-utils >= 2.5-14 for package: policycoreutils-2.5-29.el7.x86_64

–> Processing Dependency: libsemanage >= 2.5-14 for package: policycoreutils-2.5-29.el7.x86_64

–> Processing Dependency: libsepol >= 2.5-10 for package: policycoreutils-2.5-29.el7.x86_64

—> Package selinux-policy.noarch 0:3.13.1-102.el7 will be updated

—> Package selinux-policy.noarch 0:3.13.1-229.el7 will be an update

–> Running transaction check

—> Package libselinux-utils.x86_64 0:2.5-6.el7 will be updated

—> Package libselinux-utils.x86_64 0:2.5-14.1.el7 will be an update

–> Processing Dependency: libselinux(x86-64) = 2.5-14.1.el7 for package: libselinux-utils-2.5-14.1.el7.x86_64

—> Package libsemanage.x86_64 0:2.5-4.el7 will be updated

–> Processing Dependency: libsemanage = 2.5-4.el7 for package: libsemanage-python-2.5-4.el7.x86_64

—> Package libsemanage.x86_64 0:2.5-14.el7 will be an update

—> Package libsepol.x86_64 0:2.5-6.el7 will be updated

—> Package libsepol.x86_64 0:2.5-10.el7 will be an update

—> Package policycoreutils-python.x86_64 0:2.5-8.el7 will be updated

—> Package policycoreutils-python.x86_64 0:2.5-29.el7 will be an update

–> Processing Dependency: setools-libs >= 3.3.8-4 for package: policycoreutils-python-2.5-29.el7.x86_64

–> Running transaction check

—> Package libselinux.x86_64 0:2.5-6.el7 will be updated

–> Processing Dependency: libselinux(x86-64) = 2.5-6.el7 for package: libselinux-python-2.5-6.el7.x86_64

—> Package libselinux.x86_64 0:2.5-14.1.el7 will be an update

—> Package libsemanage-python.x86_64 0:2.5-4.el7 will be updated

—> Package libsemanage-python.x86_64 0:2.5-14.el7 will be an update

—> Package setools-libs.x86_64 0:3.3.8-1.1.el7 will be updated

—> Package setools-libs.x86_64 0:3.3.8-4.el7 will be an update

–> Running transaction check

—> Package libselinux-python.x86_64 0:2.5-6.el7 will be updated

—> Package libselinux-python.x86_64 0:2.5-14.1.el7 will be an update

–> Processing Conflict: kernel-3.10.0-957.21.3.el7.x86_64 conflicts kexec-tools < 2.0.14-3

–> Restarting Dependency Resolution with new changes.

–> Running transaction check

—> Package kexec-tools.x86_64 0:2.0.7-50.el7 will be updated

—> Package kexec-tools.x86_64 0:2.0.15-21.el7 will be an update

–> Finished Dependency Resolution

Dependencies Resolved

==============================================================================================================================

Package Arch Version Repository Size

==============================================================================================================================

//确认当前所安装的内核是否为对应操作系统版本的内核包。

//RHEL7对应kernel补丁为kernel-3 .10.0-957.21.3.el7. x86_64.rpm

//RHEL6对应kernel补丁为kernel- 2.6.32-754.15.3.el6. x86_64.rpm

Installing:

kernel x86_64 3.10.0-957.21.3.el7 sack_rhel7 48 M

Updating:

kexec-tools x86_64 2.0.15-21.el7 rhel7.6 343 k

selinux-policy-targeted noarch 3.13.1-229.el7 rhel7.6 6.9 M

Updating for dependencies:

dracut x86_64 033-554.el7 rhel7.6 328 k

dracut-config-rescue x86_64 033-554.el7 rhel7.6 59 k

dracut-network x86_64 033-554.el7 rhel7.6 102 k

libselinux x86_64 2.5-14.1.el7 rhel7.6 162 k

libselinux-python x86_64 2.5-14.1.el7 rhel7.6 236 k

libselinux-utils x86_64 2.5-14.1.el7 rhel7.6 152 k

libsemanage x86_64 2.5-14.el7 rhel7.6 151 k

libsemanage-python x86_64 2.5-14.el7 rhel7.6 113 k

libsepol x86_64 2.5-10.el7 rhel7.6 297 k

linux-firmware noarch 20180911-69.git85c5d90.el7 rhel7.6 49 M

policycoreutils x86_64 2.5-29.el7 rhel7.6 916 k

policycoreutils-python x86_64 2.5-29.el7 rhel7.6 456 k

selinux-policy noarch 3.13.1-229.el7 rhel7.6 482 k

setools-libs x86_64 3.3.8-4.el7 rhel7.6 620 k

Transaction Summary

==============================================================================================================================

Install 1 Package

Upgrade 2 Packages (+14 Dependent packages)

Total download size: 108 M

//确认清楚后输入y回车安装

Is this ok [y/d/N]: y

Downloading packages:

No Presto metadata available for sack_rhel7

No Presto metadata available for rhel7.6

(1/17): dracut-config-rescue-033-554.el7.x86_64.rpm | 59 kB 00:00:00

(2/17): dracut-033-554.el7.x86_64.rpm | 328 kB 00:00:00

(3/17): dracut-network-033-554.el7.x86_64.rpm | 102 kB 00:00:00

(4/17): kexec-tools-2.0.15-21.el7.x86_64.rpm | 343 kB 00:00:00

(5/17): libselinux-python-2.5-14.1.el7.x86_64.rpm | 236 kB 00:00:00

(6/17): libselinux-utils-2.5-14.1.el7.x86_64.rpm | 152 kB 00:00:00

(7/17): libsemanage-2.5-14.el7.x86_64.rpm | 151 kB 00:00:00

(8/17): libsemanage-python-2.5-14.el7.x86_64.rpm | 113 kB 00:00:00

(9/17): libsepol-2.5-10.el7.x86_64.rpm | 297 kB 00:00:00

(10/17): libselinux-2.5-14.1.el7.x86_64.rpm | 162 kB 00:00:00

(11/17): policycoreutils-2.5-29.el7.x86_64.rpm | 916 kB 00:00:00

(12/17): policycoreutils-python-2.5-29.el7.x86_64.rpm | 456 kB 00:00:00

(13/17): selinux-policy-3.13.1-229.el7.noarch.rpm | 482 kB 00:00:00

(14/17): selinux-policy-targeted-3.13.1-229.el7.noarch.rpm | 6.9 MB 00:00:00

(15/17): setools-libs-3.3.8-4.el7.x86_64.rpm | 620 kB 00:00:00

(16/17): linux-firmware-20180911-69.git85c5d90.el7.noarch.rpm | 49 MB 00:00:01

(17/17): kernel-3.10.0-957.21.3.el7.x86_64.rpm | 48 MB 00:00:01

——————————————————————————————————————————

Total 67 MB/s | 108 MB 00:00:01

Running transaction check

Running transaction test

Transaction test succeeded

Running transaction

Warning: RPMDB altered outside of yum.

** Found 3 pre-existing rpmdb problem(s), ‘yum check’ output follows:

git-1.8.3.1-6.el7_2.1.x86_64 has missing requires of openssh-clients

python-meh-0.25.2-1.el7.noarch has missing requires of openssh-clients

systemtap-client-3.0-7.el7.x86_64 has missing requires of openssh-clients

Updating : libsepol-2.5-10.el7.x86_64 1/33

Updating : libselinux-2.5-14.1.el7.x86_64 2/33

Updating : dracut-033-554.el7.x86_64 3/33

Updating : libsemanage-2.5-14.el7.x86_64 4/33

Updating : libsemanage-python-2.5-14.el7.x86_64 5/33

Updating : dracut-network-033-554.el7.x86_64 6/33

Updating : setools-libs-3.3.8-4.el7.x86_64 7/33

Updating : libselinux-python-2.5-14.1.el7.x86_64 8/33

Updating : libselinux-utils-2.5-14.1.el7.x86_64 9/33

Updating : policycoreutils-2.5-29.el7.x86_64 10/33

Updating : selinux-policy-3.13.1-229.el7.noarch 11/33

Updating : linux-firmware-20180911-69.git85c5d90.el7.noarch 12/33

Installing : kernel-3.10.0-957.21.3.el7.x86_64 13/33

Updating : selinux-policy-targeted-3.13.1-229.el7.noarch 14/33

Updating : policycoreutils-python-2.5-29.el7.x86_64 15/33

Updating : kexec-tools-2.0.15-21.el7.x86_64 16/33

Updating : dracut-config-rescue-033-554.el7.x86_64 17/33

Cleanup : selinux-policy-targeted-3.13.1-102.el7.noarch 18/33

Cleanup : selinux-policy-3.13.1-102.el7.noarch 19/33

Cleanup : dracut-config-rescue-033-463.el7.x86_64 20/33

Cleanup : linux-firmware-20160830-49.git7534e19.el7.noarch 21/33

Cleanup : policycoreutils-python-2.5-8.el7.x86_64 22/33

Cleanup : policycoreutils-2.5-8.el7.x86_64 23/33

Cleanup : libselinux-utils-2.5-6.el7.x86_64 24/33

Cleanup : setools-libs-3.3.8-1.1.el7.x86_64 25/33

Cleanup : kexec-tools-2.0.7-50.el7.x86_64 26/33

Cleanup : dracut-network-033-463.el7.x86_64 27/33

Cleanup : libselinux-python-2.5-6.el7.x86_64 28/33

Cleanup : libsemanage-python-2.5-4.el7.x86_64 29/33

Cleanup : libsemanage-2.5-4.el7.x86_64 30/33

Cleanup : libselinux-2.5-6.el7.x86_64 31/33

Cleanup : libsepol-2.5-6.el7.x86_64 32/33

Cleanup : dracut-033-463.el7.x86_64 33/33

Verifying : linux-firmware-20180911-69.git85c5d90.el7.noarch 1/33

Verifying : kernel-3.10.0-957.21.3.el7.x86_64 2/33

Verifying : dracut-033-554.el7.x86_64 3/33

Verifying : selinux-policy-3.13.1-229.el7.noarch 4/33

Verifying : selinux-policy-targeted-3.13.1-229.el7.noarch 5/33

Verifying : setools-libs-3.3.8-4.el7.x86_64 6/33

Verifying : policycoreutils-2.5-29.el7.x86_64 7/33

Verifying : dracut-network-033-554.el7.x86_64 8/33

Verifying : libsemanage-2.5-14.el7.x86_64 9/33

Verifying : libselinux-python-2.5-14.1.el7.x86_64 10/33

Verifying : libsepol-2.5-10.el7.x86_64 11/33

Verifying : libselinux-utils-2.5-14.1.el7.x86_64 12/33

Verifying : kexec-tools-2.0.15-21.el7.x86_64 13/33

Verifying : policycoreutils-python-2.5-29.el7.x86_64 14/33

Verifying : dracut-config-rescue-033-554.el7.x86_64 15/33

Verifying : libsemanage-python-2.5-14.el7.x86_64 16/33

Verifying : libselinux-2.5-14.1.el7.x86_64 17/33

Verifying : policycoreutils-2.5-8.el7.x86_64 18/33

Verifying : libsepol-2.5-6.el7.x86_64 19/33

Verifying : libselinux-python-2.5-6.el7.x86_64 20/33

Verifying : libselinux-utils-2.5-6.el7.x86_64 21/33

Verifying : libsemanage-python-2.5-4.el7.x86_64 22/33

Verifying : dracut-033-463.el7.x86_64 23/33

Verifying : policycoreutils-python-2.5-8.el7.x86_64 24/33

Verifying : dracut-network-033-463.el7.x86_64 25/33

Verifying : selinux-policy-3.13.1-102.el7.noarch 26/33

Verifying : kexec-tools-2.0.7-50.el7.x86_64 27/33

Verifying : dracut-config-rescue-033-463.el7.x86_64 28/33

Verifying : libselinux-2.5-6.el7.x86_64 29/33

Verifying : selinux-policy-targeted-3.13.1-102.el7.noarch 30/33

Verifying : libsemanage-2.5-4.el7.x86_64 31/33

Verifying : linux-firmware-20160830-49.git7534e19.el7.noarch 32/33

Verifying : setools-libs-3.3.8-1.1.el7.x86_64 33/33

Installed:

kernel.x86_64 0:3.10.0-957.21.3.el7

Updated:

kexec-tools.x86_64 0:2.0.15-21.el7 selinux-policy-targeted.noarch 0:3.13.1-229.el7

Dependency Updated:

dracut.x86_64 0:033-554.el7 dracut-config-rescue.x86_64 0:033-554.el7

dracut-network.x86_64 0:033-554.el7 libselinux.x86_64 0:2.5-14.1.el7

libselinux-python.x86_64 0:2.5-14.1.el7 libselinux-utils.x86_64 0:2.5-14.1.el7

libsemanage.x86_64 0:2.5-14.el7 libsemanage-python.x86_64 0:2.5-14.el7

libsepol.x86_64 0:2.5-10.el7 linux-firmware.noarch 0:20180911-69.git85c5d90.el7

policycoreutils.x86_64 0:2.5-29.el7 policycoreutils-python.x86_64 0:2.5-29.el7

selinux-policy.noarch 0:3.13.1-229.el7 setools-libs.x86_64 0:3.3.8-4.el7

Complete!

[root@localhost yum.repos.d]# rpm -qa|grep kernel

abrt-addon-kerneloops-2.1.11-45.el7.x86_64

kernel-devel-3.10.0-514.el7.x86_64

kernel-tools-libs-3.10.0-514.el7.x86_64

kernel-3.10.0-957.21.3.el7.x86_64

kernel-headers-3.10.0-514.el7.x86_64

kernel-tools-3.10.0-514.el7.x86_64

kernel-3.10.0-514.el7.x86_64

6. 重启操作系统

[root@localhost ~]# reboot

7. 检查操作系统安全更新是否生效

//下载检查脚本

[root@localhost ~]# wget http:// 192.168.40.20 /cve-2019-11477–2019-06-17-1629.sh

–2019-06-23 19:48:52– http:// 192.168.40.20 /cve-2019-11477–2019-06-17-1629.sh

Connecting to 192.168.40.20 :80… connected.

HTTP request sent, awaiting response… 200 OK

Length: 28701 (28K) [application/octet-stream]

Saving to: ‘cve-2019-11477–2019-06-17-1629.sh’

100%[======================================================================>] 28,701 –.-K/s in 0.001s

2019-06-23 19:48:52 (22.3 MB/s) – ‘cve-2019-11477–2019-06-17-1629.sh’ saved [28701/28701]

//赋予执行权限

[root@localhost ~]# chmod +x cve-2019-11477–2019-06-17-1629.sh

//执行检查脚本

[root@localhost ~]# ./cve-2019-11477–2019-06-17-1629.sh

This script (v1.0) is primarily designed to detect CVE-2019-11477 on supported

Red Hat Enterprise Linux systems and kernel packages.

Result may be inaccurate for other RPM based systems.

Running kernel: 3.10.0-957.21.3.el7.x86_64

//赋予执行权限

This system is Not affected

//有这个提示说明,安全更新生效。

For more information about this vulnerability, see:

https://access.redhat.com/security/vulnerabilities/tcpsack

[root@localhost ~]# uname -a

Linux localhost 3.10.0-957.21.3.el7.x86_64 #1 SMP Fri Jun 14 02:54:29 EDT 2019 x86_64 x86_64 x86_64 GNU/Linux

8. 内核补丁回退步骤

比如安装新内核遇到异常问题,如安装过程中受到G01影响,导致内核安装失败。

RHEL6:

1、重启操作系统后,在操作系统引导选项读秒阶段,按E,进入选择内核界面,选择旧版本内核进入系统。

2、必须要指定版本号进行卸载,卸载最新升级的内核补丁

yum remove kernel-2.6.32-754.15.3.el6.x86_64.rpm

3、重新安装内核补丁

yum install kernel

4、重启操作系统验证是否生效

RHEL7:

1、重启操作系统后,在操作系统引导选项读秒阶段,进入选择内核界面,选择旧版本内核进入系统。

2、必须要指定版本号进行卸载,卸载最新升级的内核补丁

yum remove kernel-3.10.0-957.21.3.el7.x86_64.rpm

3、重新安装内核补丁

yum install kernel

4、重启操作系统验证是否生效

8.1. 附件一、漏洞检测补丁

cve-2019-11477–2019-06-17-1629.sh

#!/bin/bash

# Copyright (C) 2019 Red Hat, Inc.

#

# This program is free software: you can redistribute it and/or modify

# it under the terms of the GNU General Public License as published by

# the Free Software Foundation, either version 3 of the License, or

# (at your option) any later version.

VERSION=”1.0″

# Warning! Be sure to download the latest version of this script from its primary source:

ARTICLE=”https://access.redhat.com/security/vulnerabilities/tcpsack”

# DO NOT blindly trust any internet sources and NEVER do !

# This script is meant for simple detection of the vulnerability. Feel free to modify it for your

# environment or needs. For more advanced detection, consider Red Hat Insights:

# https://access.redhat.com/products/red-hat-insights#getstarted

# Checking against the list of vulnerable packages is necessary because of the way how features

# are back-ported to older versions of packages in various channels.

VULNERABLE_KERNELS=(

‘2.6.18-8.el5’ ‘2.6.18-8.1.1.el5’ ‘2.6.18-8.1.3.el5’ ‘2.6.18-8.1.4.el5’ ‘2.6.18-8.1.6.el5’

‘2.6.18-8.1.8.el5’ ‘2.6.18-8.1.10.el5’ ‘2.6.18-8.1.14.el5’ ‘2.6.18-8.1.15.el5’ ‘2.6.18-53.el5’

‘2.6.18-53.1.4.el5’ ‘2.6.18-53.1.6.el5’ ‘2.6.18-53.1.13.el5’ ‘2.6.18-53.1.14.el5’ ‘2.6.18-53.1.19.el5’

‘2.6.18-53.1.21.el5’ ‘2.6.18-92.el5’ ‘2.6.18-92.1.1.el5’ ‘2.6.18-92.1.6.el5’ ‘2.6.18-92.1.10.el5’

‘2.6.18-92.1.13.el5’ ‘2.6.18-92.1.17.el5’ ‘2.6.18-92.1.18.el5’ ‘2.6.18-92.1.22.el5’ ‘2.6.18-128.el5’

‘2.6.18-128.1.1.el5’ ‘2.6.18-128.1.6.el5’ ‘2.6.18-128.1.10.el5’ ‘2.6.18-128.1.14.el5’ ‘2.6.18-128.1.16.el5’

‘2.6.18-128.2.1.el5’ ‘2.6.18-128.4.1.el5’ ‘2.6.18-128.7.1.el5’ ‘2.6.18-164.el5’ ‘2.6.18-164.2.1.el5’

‘2.6.18-164.6.1.el5’ ‘2.6.18-164.9.1.el5’ ‘2.6.18-164.10.1.el5’ ‘2.6.18-164.11.1.el5’ ‘2.6.18-164.15.1.el5’

‘2.6.18-194.el5’ ‘2.6.18-194.3.1.el5’ ‘2.6.18-194.8.1.el5’ ‘2.6.18-194.11.1.el5’ ‘2.6.18-194.11.3.el5’

‘2.6.18-194.11.4.el5’ ‘2.6.18-194.17.1.el5’ ‘2.6.18-194.17.4.el5’ ‘2.6.18-194.26.1.el5’ ‘2.6.18-194.32.1.el5’

‘2.6.18-238.el5’ ‘2.6.18-238.1.1.el5’ ‘2.6.18-238.5.1.el5’ ‘2.6.18-238.9.1.el5’ ‘2.6.18-238.12.1.el5’

‘2.6.18-238.19.1.el5’ ‘2.6.18-238.21.1.el5’ ‘2.6.18-238.27.1.el5’ ‘2.6.18-238.28.1.el5’ ‘2.6.18-238.31.1.el5’

‘2.6.18-238.33.1.el5’ ‘2.6.18-238.35.1.el5’ ‘2.6.18-238.37.1.el5’ ‘2.6.18-238.39.1.el5’ ‘2.6.18-238.40.1.el5’

‘2.6.18-238.44.1.el5’ ‘2.6.18-238.45.1.el5’ ‘2.6.18-238.47.1.el5’ ‘2.6.18-238.48.1.el5’ ‘2.6.18-238.49.1.el5’

‘2.6.18-238.50.1.el5’ ‘2.6.18-238.51.1.el5’ ‘2.6.18-238.52.1.el5’ ‘2.6.18-238.53.1.el5’ ‘2.6.18-238.54.1.el5’

‘2.6.18-238.55.1.el5’ ‘2.6.18-238.56.1.el5’ ‘2.6.18-238.57.1.el5’ ‘2.6.18-238.58.1.el5’ ‘2.6.18-274.el5’

‘2.6.18-274.3.1.el5’ ‘2.6.18-274.7.1.el5’ ‘2.6.18-274.12.1.el5’ ‘2.6.18-274.17.1.el5’ ‘2.6.18-274.18.1.el5’

‘2.6.18-308.el5’ ‘2.6.18-308.1.1.el5’ ‘2.6.18-308.4.1.el5’ ‘2.6.18-308.8.1.el5’ ‘2.6.18-308.8.2.el5’

‘2.6.18-308.11.1.el5’ ‘2.6.18-308.13.1.el5’ ‘2.6.18-308.16.1.el5’ ‘2.6.18-308.20.1.el5’ ‘2.6.18-308.24.1.el5’

‘2.6.18-339.el5’ ‘2.6.18-348.el5’ ‘2.6.18-348.1.1.el5’ ‘2.6.18-348.2.1.el5’ ‘2.6.18-348.3.1.el5’

‘2.6.18-348.4.1.el5’ ‘2.6.18-348.6.1.el5’ ‘2.6.18-348.12.1.el5’ ‘2.6.18-348.16.1.el5’ ‘2.6.18-348.18.1.el5’

‘2.6.18-348.19.1.el5’ ‘2.6.18-348.21.1.el5’ ‘2.6.18-348.22.1.el5’ ‘2.6.18-348.23.1.el5’ ‘2.6.18-348.25.1.el5’

‘2.6.18-348.27.1.el5’ ‘2.6.18-348.28.1.el5’ ‘2.6.18-348.29.1.el5’ ‘2.6.18-348.30.1.el5’ ‘2.6.18-348.31.2.el5’

‘2.6.18-348.32.1.el5’ ‘2.6.18-348.33.1.el5’ ‘2.6.18-348.33.2.el5’ ‘2.6.18-348.34.1.el5’ ‘2.6.18-348.34.2.el5’

‘2.6.18-348.35.1.el5’ ‘2.6.18-348.39.1.el5’ ‘2.6.18-348.39.2.el5’ ‘2.6.18-348.40.1.el5’ ‘2.6.18-348.41.1.el5’

‘2.6.18-348.42.1.el5’ ‘2.6.18-348.43.1.el5’ ‘2.6.18-371.el5’ ‘2.6.18-371.1.2.el5’ ‘2.6.18-371.3.1.el5’

‘2.6.18-371.4.1.el5’ ‘2.6.18-371.6.1.el5’ ‘2.6.18-371.8.1.el5’ ‘2.6.18-371.9.1.el5’ ‘2.6.18-371.11.1.el5’

‘2.6.18-371.12.1.el5’ ‘2.6.18-391.el5’ ‘2.6.18-398.el5’ ‘2.6.18-400.el5’ ‘2.6.18-400.1.1.el5’

‘2.6.18-402.el5’ ‘2.6.18-404.el5’ ‘2.6.18-406.el5’ ‘2.6.18-407.el5’ ‘2.6.18-408.el5’

‘2.6.18-409.el5’ ‘2.6.18-410.el5’ ‘2.6.18-411.el5’ ‘2.6.18-412.el5’ ‘2.6.18-416.el5’

‘2.6.18-417.el5’ ‘2.6.18-418.el5’ ‘2.6.18-419.el5’ ‘2.6.18-420.el5’ ‘2.6.18-422.el5’

‘2.6.18-423.el5’ ‘2.6.18-426.el5’ ‘2.6.18-430.el5’ ‘2.6.18-431.el5’ ‘2.6.18-433.el5’

‘2.6.18-434.el5’ ‘2.6.18-436.el5’ ‘2.6.18-437.el5’ ‘2.6.32-71.el6’ ‘2.6.32-71.7.1.el6’

‘2.6.32-71.14.1.el6’ ‘2.6.32-71.18.1.el6’ ‘2.6.32-71.18.2.el6’ ‘2.6.32-71.24.1.el6’ ‘2.6.32-71.29.1.el6’

‘2.6.32-131.0.15.el6’ ‘2.6.32-131.2.1.el6’ ‘2.6.32-131.4.1.el6’ ‘2.6.32-131.6.1.el6’ ‘2.6.32-131.12.1.el6’

‘2.6.32-131.17.1.el6’ ‘2.6.32-131.21.1.el6’ ‘2.6.32-131.22.1.el6’ ‘2.6.32-131.25.1.el6’ ‘2.6.32-131.26.1.el6’

‘2.6.32-131.28.1.el6’ ‘2.6.32-131.29.1.el6’ ‘2.6.32-131.30.1.el6’ ‘2.6.32-131.30.2.el6’ ‘2.6.32-131.33.1.el6’

‘2.6.32-131.35.1.el6’ ‘2.6.32-131.36.1.el6’ ‘2.6.32-131.37.1.el6’ ‘2.6.32-131.38.1.el6’ ‘2.6.32-131.39.1.el6’

‘2.6.32-220.el6’ ‘2.6.32-220.2.1.el6’ ‘2.6.32-220.4.1.el6’ ‘2.6.32-220.4.2.el6’ ‘2.6.32-220.4.4.bgq.el6’

‘2.6.32-220.4.7.bgq.el6’ ‘2.6.32-220.7.1.el6’ ‘2.6.32-220.7.2.p7ih.el6’ ‘2.6.32-220.7.3.p7ih.el6’ ‘2.6.32-220.7.4.p7ih.el6’

‘2.6.32-220.7.6.p7ih.el6’ ‘2.6.32-220.7.7.p7ih.el6’ ‘2.6.32-220.13.1.el6’ ‘2.6.32-220.17.1.el6’ ‘2.6.32-220.23.1.el6’

‘2.6.32-220.24.1.el6’ ‘2.6.32-220.25.1.el6’ ‘2.6.32-220.26.1.el6’ ‘2.6.32-220.28.1.el6’ ‘2.6.32-220.30.1.el6’

‘2.6.32-220.31.1.el6’ ‘2.6.32-220.32.1.el6’ ‘2.6.32-220.34.1.el6’ ‘2.6.32-220.34.2.el6’ ‘2.6.32-220.38.1.el6’

‘2.6.32-220.39.1.el6’ ‘2.6.32-220.41.1.el6’ ‘2.6.32-220.42.1.el6’ ‘2.6.32-220.45.1.el6’ ‘2.6.32-220.46.1.el6’

‘2.6.32-220.48.1.el6’ ‘2.6.32-220.51.1.el6’ ‘2.6.32-220.52.1.el6’ ‘2.6.32-220.53.1.el6’ ‘2.6.32-220.54.1.el6’

‘2.6.32-220.55.1.el6’ ‘2.6.32-220.56.1.el6’ ‘2.6.32-220.57.1.el6’ ‘2.6.32-220.58.1.el6’ ‘2.6.32-220.60.2.el6’

‘2.6.32-220.62.1.el6’ ‘2.6.32-220.63.2.el6’ ‘2.6.32-220.64.1.el6’ ‘2.6.32-220.65.1.el6’ ‘2.6.32-220.66.1.el6’

‘2.6.32-220.67.1.el6’ ‘2.6.32-220.68.1.el6’ ‘2.6.32-220.69.1.el6’ ‘2.6.32-220.70.1.el6’ ‘2.6.32-220.71.1.el6’

‘2.6.32-220.72.2.el6’ ‘2.6.32-220.73.1.el6’ ‘2.6.32-220.75.1.el6’ ‘2.6.32-220.76.1.el6’ ‘2.6.32-220.76.2.el6’

‘2.6.32-220.77.1.el6’ ‘2.6.32-279.el6’ ‘2.6.32-279.1.1.el6’ ‘2.6.32-279.2.1.el6’ ‘2.6.32-279.5.1.el6’

‘2.6.32-279.5.2.el6’ ‘2.6.32-279.9.1.el6’ ‘2.6.32-279.11.1.el6’ ‘2.6.32-279.14.1.bgq.el6’ ‘2.6.32-279.14.1.el6’

‘2.6.32-279.19.1.el6’ ‘2.6.32-279.22.1.el6’ ‘2.6.32-279.23.1.el6’ ‘2.6.32-279.25.1.el6’ ‘2.6.32-279.25.2.el6’

‘2.6.32-279.31.1.el6’ ‘2.6.32-279.33.1.el6’ ‘2.6.32-279.34.1.el6’ ‘2.6.32-279.37.2.el6’ ‘2.6.32-279.39.1.el6’

‘2.6.32-279.41.1.el6’ ‘2.6.32-279.42.1.el6’ ‘2.6.32-279.43.1.el6’ ‘2.6.32-279.43.2.el6’ ‘2.6.32-279.46.1.el6’

‘2.6.32-358.el6’ ‘2.6.32-358.0.1.el6’ ‘2.6.32-358.2.1.el6’ ‘2.6.32-358.6.1.el6’ ‘2.6.32-358.6.2.el6’

‘2.6.32-358.6.3.p7ih.el6’ ‘2.6.32-358.11.1.bgq.el6’ ‘2.6.32-358.11.1.el6’ ‘2.6.32-358.14.1.el6’ ‘2.6.32-358.18.1.el6’

‘2.6.32-358.23.2.el6’ ‘2.6.32-358.28.1.el6’ ‘2.6.32-358.32.3.el6’ ‘2.6.32-358.37.1.el6’ ‘2.6.32-358.41.1.el6’

‘2.6.32-358.44.1.el6’ ‘2.6.32-358.46.1.el6’ ‘2.6.32-358.46.2.el6’ ‘2.6.32-358.48.1.el6’ ‘2.6.32-358.49.1.el6’

‘2.6.32-358.51.1.el6’ ‘2.6.32-358.51.2.el6’ ‘2.6.32-358.55.1.el6’ ‘2.6.32-358.56.1.el6’ ‘2.6.32-358.59.1.el6’

‘2.6.32-358.61.1.el6’ ‘2.6.32-358.62.1.el6’ ‘2.6.32-358.65.1.el6’ ‘2.6.32-358.67.1.el6’ ‘2.6.32-358.68.1.el6’

‘2.6.32-358.69.1.el6’ ‘2.6.32-358.70.1.el6’ ‘2.6.32-358.71.1.el6’ ‘2.6.32-358.72.1.el6’ ‘2.6.32-358.73.1.el6’

‘2.6.32-358.75.1.el6’ ‘2.6.32-358.76.1.el6’ ‘2.6.32-358.77.1.el6’ ‘2.6.32-358.78.1.el6’ ‘2.6.32-358.79.1.el6’

‘2.6.32-358.79.2.el6’ ‘2.6.32-358.81.1.el6’ ‘2.6.32-358.82.1.el6’ ‘2.6.32-358.83.1.el6’ ‘2.6.32-358.84.1.el6’

‘2.6.32-358.84.2.el6’ ‘2.6.32-358.85.1.el6’ ‘2.6.32-358.87.1.el6’ ‘2.6.32-358.88.2.el6’ ‘2.6.32-358.88.4.el6’

‘2.6.32-358.90.1.el6’ ‘2.6.32-358.91.4.el6’ ‘2.6.32-358.93.1.el6’ ‘2.6.32-358.94.1.el6’ ‘2.6.32-358.95.1.el6’

‘2.6.32-358.111.1.openstack.el6’ ‘2.6.32-358.114.1.openstack.el6’
‘2.6.32-358.118.1.openstack.el6’ ‘2.6.32-358.123.4.openstack.el6’
‘2.6.32-431.el6’

‘2.6.32-431.1.1.bgq.el6’ ‘2.6.32-431.1.2.el6’ ‘2.6.32-431.3.1.el6’ ‘2.6.32-431.5.1.el6’ ‘2.6.32-431.11.2.el6’

‘2.6.32-431.17.1.el6’ ‘2.6.32-431.20.3.el6’ ‘2.6.32-431.20.5.el6’ ‘2.6.32-431.23.3.el6’ ‘2.6.32-431.29.2.el6’

‘2.6.32-431.37.1.el6’ ‘2.6.32-431.40.1.el6’ ‘2.6.32-431.40.2.el6’ ‘2.6.32-431.46.2.el6’ ‘2.6.32-431.50.1.el6’

‘2.6.32-431.53.2.el6’ ‘2.6.32-431.56.1.el6’ ‘2.6.32-431.59.1.el6’ ‘2.6.32-431.61.2.el6’ ‘2.6.32-431.64.1.el6’

‘2.6.32-431.66.1.el6’ ‘2.6.32-431.68.1.el6’ ‘2.6.32-431.69.1.el6’ ‘2.6.32-431.70.1.el6’ ‘2.6.32-431.71.1.el6’

‘2.6.32-431.72.1.el6’ ‘2.6.32-431.73.2.el6’ ‘2.6.32-431.74.1.el6’ ‘2.6.32-431.75.1.el6’ ‘2.6.32-431.76.1.el6’

‘2.6.32-431.77.1.el6’ ‘2.6.32-431.78.1.el6’ ‘2.6.32-431.79.1.el6’ ‘2.6.32-431.80.1.el6’ ‘2.6.32-431.80.2.el6’

‘2.6.32-431.81.2.el6’ ‘2.6.32-431.81.3.el6’ ‘2.6.32-431.82.1.el6’ ‘2.6.32-431.84.1.el6’ ‘2.6.32-431.85.1.el6’

Источник: [https://torrent-igruha.org/3551-portal.html]

Redhat linux version 2.6.32-431.1.2.el6 free download

1 thoughts to “Redhat linux version 2.6.32-431.1.2.el6 free download”

Leave a Reply

Your email address will not be published. Required fields are marked *