I respectfully disagree -- I really do not attempt to distribute the IBM
marketing tactic of "fear, uncertainty, doubt" (adopted by other
entities as well). However, when Ubuntu LTS lists an update as a
security update, I do take notice. SL derived from RHEL did the same if
memory serves.
On Mon, Jan 9, 2023 at 9:09 PM Konstantin Olchanski wrote:
>
> On Mon, Jan 09, 2023 at 03:26:33PM -0800, Yasha Karant wrote:
> >
> > The SL6 issue is a different matter. Not only are various
> > applications vulnerable to compromises from the Internet, but so is
> > the kernel as well as kernel
On Mon, Jan 9, 2023 at 9:03 PM Konstantin Olchanski wrote:
>
> On Mon, Jan 09, 2023 at 08:04:19PM -0500, Nico Kadel-Garcia wrote:
> >
> > ... you can validate the source tarballs and review any patches and the
> > .spec file.
> >
>
> no, I cannot validate and review this. I am not clever enough.
On Mon, Jan 09, 2023 at 03:26:33PM -0800, Yasha Karant wrote:
>
> The SL6 issue is a different matter. Not only are various
> applications vulnerable to compromises from the Internet, but so is
> the kernel as well as kernel systems support software.
>
This is FUD. Which applications, which
On Mon, Jan 09, 2023 at 08:04:19PM -0500, Nico Kadel-Garcia wrote:
>
> ... you can validate the source tarballs and review any patches and the .spec
> file.
>
no, I cannot validate and review this. I am not clever enough. Could never
figure out
even obfuscated C contest puzzles, forget about
On Mon, Jan 9, 2023 at 4:15 PM Konstantin Olchanski wrote:
>
> On Sun, Jan 08, 2023 at 08:48:33AM -0500, Nico Kadel-Garcia wrote:
> >
> > There is a third party SRPM at:
> >
> >
The hardware issue with VME not connected to any external (Internet
accessible) network is a fact of life.
The SL6 issue is a different matter. Not only are various applications
vulnerable to compromises from the Internet, but so is the kernel as
well as kernel systems support software. As
On Sun, Jan 08, 2023 at 08:48:33AM -0500, Nico Kadel-Garcia wrote:
>
> There is a third party SRPM at:
>
>