Querying Security Updates
Command format: yum updateinfo <command> [option]
- Run the yum updateinfo command to query all available security updates.
[root@localhost ~]# yum updateinfo Last metadata expiration check: 0:03:05 ago on Thu 08 Sep 2022 05:30:23 PM CST. Updates Information Summary: available 12 Security notice(s) 4 Critical Security notice(s) 6 Important Security notice(s) 2 Moderate Security notice(s)
- Major <command> parameters include:
- list: lists the available security updates.
[root@localhost ~]# yum updateinfo list Last metadata expiration check: 0:03:32 ago on Thu 08 Sep 2022 05:30:23 PM CST. HCE2-SA-2022-0006 Critical/Sec. curl-7.79.1-2.h6.hce2.x86_64 HCE2-SA-2022-0011 Moderate/Sec. gnupg2-2.2.32-1.h6.hce2.x86_64 HCE2-SA-2022-0002 Important/Sec. kernel-5.10.0-60.18.0.50.h425_2.hce2.x86_64
- info <SA ID>: queries the security updates of a specific advisory.
[root@localhost ~]# yum updateinfo info HCE2-SA-2022-0029 Last metadata expiration check: 5:09:15 ago on Tue 13 Sep 2022 09:43:13 AM CST. ================================================================= An update for python3 is now available for HCE 2.0 ================================================================= Update ID: HCE2-SA-2022-0029 Type: security Updated: 2022-09-08 22:08:34 CVEs: CVE-2021-28861 Description: Security Fix(es): : Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may lead to information disclosure. (CVE-2021-28861) Severity: Important
- list: lists the available security updates.
- Major [option] parameters include:
- --sec-severity={Critical,Important,Moderate,Low}: queries security updates of a specific level. Values in the brackets can be any combination of security update levels.
In the following example, --sec-severity=Critical is used to query critical security updates.
[root@localhost ~]# yum updateinfo list --sec-severity=Critical Last metadata expiration check: 0:10:15 ago on Thu 08 Sep 2022 05:30:23 PM CST. HCE2-SA-2022-0006 Critical/Sec. curl-7.79.1-2.h6.hce2.x86_64 HCE2-SA-2022-0003 Critical/Sec. libarchive-3.5.2-1.h2.hce2.x86_64 HCE2-SA-2022-0006 Critical/Sec. libcurl-7.79.1-2.h6.hce2.x86_64 ...
In the following example, --sec-severity={Critical,Moderate} is used to query critical and moderate security updates.
[root@localhost ~]# yum updateinfo list --sec-severity={Critical,Moderate} Last metadata expiration check: 0:11:07 ago on Thu 08 Sep 2022 05:30:23 PM CST. HCE2-SA-2022-0006 Critical/Sec. curl-7.79.1-2.h6.hce2.x86_64 HCE2-SA-2022-0011 Moderate/Sec. gnupg2-2.2.32-1.h6.hce2.x86_64 HCE2-SA-2022-0003 Critical/Sec. libarchive-3.5.2-1.h2.hce2.x86_64 ...
- --cve=<CVE ID>: queries security updates of a specific CVE.
[root@localhost ~]# yum updateinfo info --cve=CVE-2021-28861 Last metadata expiration check: 5:10:38 ago on Tue 13 Sep 2022 09:43:13 AM CST. ================================================================= An update for python3 is now available for HCE 2.0 ================================================================= Update ID: HCE2-SA-2022-0029 Type: security Updated: 2022-09-08 22:08:34 CVEs: CVE-2021-28861 Description: Security Fix(es): : Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may lead to information disclosure. (CVE-2021-28861) Severity: Important
- --sec-severity={Critical,Important,Moderate,Low}: queries security updates of a specific level. Values in the brackets can be any combination of security update levels.
Use the yum updateinfo --help command to obtain more information.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot