Red Hat's Security policy for Production 3 Phase of the Life Cycle for EL5 is that they will only release "Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available. Other errata advisories may be delivered as appropriate." https://access.redhat.com/support/policy/updates/errata/#Production_3_Phase In practice, what that means so far is this: All Important and Critical security updates have been released for EL5, but some moderate and below security updates have not been, and are not going to be released by Red Hat for EL5. I do not agree with this policy, but it is not one that the CentOS Project (or I) have any say about. These updates will not be released for RHEL-5 ... therefore they will also not be released for CentOS-5. Due to this security policy, I highly recommend moving CentOS-5 based workloads to CentOS-6 and that every user stop using CentOS-5 as soon as possible. Here is a list of updates that are not done on RHEL-5 and are not planned to be done at this time by Red Hat for RHEL-5 (and therefore CentOS-5): > ruby Moderate https://access.redhat.com/security/cve/CVE-2014-8080 > python Low https://access.redhat.com/security/cve/CVE-2014-7185 > libgcrypt Moderate https://access.redhat.com/security/cve/CVE-2014-5270 > wget Moderate https://access.redhat.com/security/cve/CVE-2014-4877 > perl-Data-Dumper Low https://access.redhat.com/security/cve/CVE-2014-4330 > cups Moderate https://access.redhat.com/security/cve/CVE-2014-3537 > dbus Moderate https://access.redhat.com/security/cve/CVE-2014-3477 > dovecot Moderate https://access.redhat.com/security/cve/CVE-2014-3430 > exim Low https://access.redhat.com/security/cve/CVE-2014-2972 > cups Moderate https://access.redhat.com/security/cve/CVE-2014-2856 > openssh Moderate https://access.redhat.com/security/cve/CVE-2014-2653 > libxml2 Moderate https://access.redhat.com/security/cve/CVE-2014-0191 > qemu Moderate https://access.redhat.com/security/cve/CVE-2013-6458 > squid Moderate https://access.redhat.com/security/cve/CVE-2012-5643 > openssh Low https://access.redhat.com/security/cve/CVE-2014-2532 > libX11 Moderate https://access.redhat.com/security/cve/CVE-2013-1997 > libFS Moderate https://access.redhat.com/security/cve/CVE-2013-1996 > libXext Moderate https://access.redhat.com/security/cve/CVE-2013-1982 > I wish there was another option, but I just don't see any others .. I know I would not use packages with moderate security issues unfixed in production on purpose. I think this is a ridiculous policy, but it is what it is. Thanks, Johnny Hughes
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos