[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [hobbit] monitoring patch status?
- To: hobbit (at) hswn.dk
- Subject: Re: [hobbit] monitoring patch status?
- From: "Tracy Di Marco White" <gendalia (at) iastate.edu>
- Date: Sun, 16 Nov 2008 01:17:02 -0600
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:sender :to:subject:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references :x-google-sender-auth; bh=bmndxMlGmzYUWPiAPfWQMfnNjeiuNAcOO76r/UMepHQ=; b=nI07SjZPPFKkImrnFPokcn8niCHCQGha36hjwZxvVvXHF3VrYrjnGLxN2Zwe8nK5uQ 96YMVBoTUr2RMhqqlaUEnxfOUD6lQJhmvJEsq2F7aR74a8fr51eMbbuS9QFlsVHZY6D2 D8mOilDddqKtn16kH2k/deU/aurqyuekcg9bU=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:sender:to:subject:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references:x-google-sender-auth; b=ewtLVhwjEuBXg27l3d3VercyMdLV17t4F141Xwe8vZPAXw2rlJAnzVgSD19Gsu1sBC JlkS+QWx5ALSSUxUcDgvZ0uO3dCQWb1QkADStED9HyMbPS7aRNfOgxcWaQ1OefDd3GiR N/F5OZlsNoScDmiTlx8NsDSSxX5FizHk8pijQ=
- References: <1226702319.11679.13.camel (at) mcdonalddj-dc.austin-energy.net> <a60f25fc0811141624o46092360h5b54ace88ee23686 (at) mail.gmail.com> <BAY138-DS784D2EF4962535869ED8C9F110 (at) phx.gbl> <Pine.LNX.4.64.0811151255200.31457 (at) pal32.desy.de>
On Sat, Nov 15, 2008 at 5:59 AM, Martin Flemming
<martin.flemming (at) desy.de> wrote:
>
> Yep, somedays ago i've "found" pca too,
> and a xymon-module for it will be great !
>
> .. maybe for redhat-clones there will be yum to use,
> has got somebody work for it ? :-)
I had one of our students write a package auditing script for RHEL
5.1, something to match the NetBSD pkgsrc security auditing script we
use on all our NetBSD machines. The RHEL version requires 'yum
install yum-security' and consists of:
yum-audit - checks security status of yum installed packages on RHEL 5.1
and greater
yum-get-audit-script - to be set up as a root cron job to pull the security
statuses from yum
yum-cve.ignore - an example CVE ignore file to tell the script with CVE's
to mark as green
- its location is specified in the yum-audit script
If others are interested, I'll see about making them available.
-Tracy