Re: Pulling in broadwell support for cent6u5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 06/15/2016 05:10 PM, jsl6uy js16uy wrote:
> Thanks much for the the reply!
> Some sec updates/bug fixes have been applied thru the run of 6u5 and after,
> but yes, still firmly in 6u5 land. Guess will have to test.
> Broadwell cpus do run in the OS, but "6u5" is stated as not supporting
> 26XXv4 chipsets.
> 

Theoretically, it should be possible to run the latest kernel with other
older CentOS-6 packages.  It may or may not function correctly.  That
setup would NOT be supported for RHEL (for example).  You would
therefore need to test it to see if it works well enough for you to use.

But theoretically it is also possible to run whatever workload you are
trying to run on the latest '6.7 + updates'.

You would need to test both scenarios to see which one supports your
workload the best.

I would point out that we provide CentOS-6, which is defined as all the
latest updates installed.  Point releases are just a mechanism to create
installable trees and new installers for new hardware at a point in
time. It has never been a tested scenario to only pick and choose
updates while not installing all of them.

There have been more than one CRITICAL update to CentOS since the 6.5
tree and installable media were released, including several updates that
correct security issues which have their own name and website.  Many of
those issues are remotely exploitable .. the actual definition of a
'CRITICAL' update from Red Hat's perspective is:

"This rating is given to flaws that could be easily exploited by a
remote unauthenticated attacker and lead to system compromise (arbitrary
code execution) without requiring user interaction. These are the types
of vulnerabilities that can be exploited by worms. Flaws that require an
authenticated remote user, a local user, or an unlikely configuration
are not classed as Critical impact."

Taken from:
https://access.redhat.com/security/updates/classification

I would think that a customer who had data stolen or was somehow hurt by
an entity who purposely ran servers that came into contact with the
internet and also purposely ran software that had CRITCAL and
correctable security flaws present would be very upset.  I would also
think that they would expect an entity to install every security update
to protect their data .. But what do I know.

Thanks,
Johnny Hughes

> On Wed, Jun 15, 2016 at 4:56 PM, John R Pierce <pierce@xxxxxxxxxxxx> wrote:
> 
>> On 6/15/2016 2:48 PM, jsl6uy js16uy wrote:
>>
>>> Hello, all. Hope all is well
>>> Is it possible to install kernel and support files from 6u7 into a base
>>> 6u5
>>> image to achieve full broadwell support in 6u5?
>>> We are "locked", clearly not fully since willing to up jump kernels, on
>>> 6u5.
>>>
>>
>>
>> "Locked", meaning you're running a ~3 old OS with no security or bugfix
>> updates?    thats not good.
>>
>> All centos 6 systems are the same base version 2.6.32 kernel, with fixes
>> and updates backported.   If you're asking, can you run the 2.6.32-573
>> kernel with a 6u5 everything-else, well, everything else was never tested
>> with that kernel.



Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux