ClearOS Documentation

×

Warning

301 error for file:https://clearos.com/dokuwiki2/lib/exe/css.php?t=dokuwiki&tseed=82873f9c9a1f5784b951644363f20ef8

User Tools

Site Tools


Software Updates

Like all operating systems, regular bug and security fixes are provided to ClearOS systems. If you are using a Community Edition, your software updates will come as a result of the ClearOS developer and Open Source communities at large.

Verified Software Updates

If you use ClearOS Business or ClearOS Home, your software updates are the result of testing with the ClearOS Community edition, the Open Source Community, and unit tests and fixes performed by engineers at ClearCenter. Meaning, as part of a paid subscription to ClearOS, these updates go through an additional quality assurance screening and verification by the ClearCenter technical team.

Installation

If your system does not have this app available or enabled, you will need to complete the registration wizard.

You can find this feature in the menu system at the following location:

Cloud|Updates|Software Updates

Configuration

Software updates are provided on a regular basis. We strongly recommend keeping automatic updates enabled for your system.

Software Updates

If you disable automatic updates or install third party software which can interfere with dependency resolution, it is imperative that you review available updates on a very regular basis at command line using commands such as 'yum update'.

Backporting and Security Scanners

Many of the core software packages from ClearOS are derived from source code from an prominent Linux vendor. One of their policies is to maintain a high level of stability for all their Linux releases. This policy is different from some other Linux distributions where the focus is on the releasing a solution with all the latest and greatest features (for example, Fedora Linux).

For various reasons, ClearOS has also adopted the stability first policy.

Backporting - How It Works

So how does the stability first policy impact the software development cycle in ClearOS? Here is a scenario for the fictional Widget software:

  • October 2015 - ClearOS 7.1 released with Widget 2.0.0
  • November 2015 - Widget 2.1.0 released
  • December 2015 - Widget 2.1.1 released - a simple but important security update in this release

For operating systems shipped with the Widget 2.1.0, it is simply a matter of upgrading the software from the Widget software company. With the stability first policy in place, the software engineers did not want to add all the extra features found in Widget 2.1.x, but simply wanted a fix for the security issue. The simple security fix from version 2.1.1 was backported to the 2.0.0 version and released as 2.0.1. With this backporting complete, only a minor change to the ClearOS system was required.

Security Scanning Limitations

Backporting is an important tool for keeping an operating system stable and secure. However, you may run across security scanning tools that report security issues with the versions of software running on a ClearOS system. For example, we receive the following types of messages on a regular basis.

XYZ was identified with an outdated version of OpenSSH according to the banner presented upon connection. They (the security experts) have determined this exploit to be high on the vulnerability matrix and suggest we receive an update from our vendor.

content/en_us/7_ug_software_updates.txt · Last modified: 2018/06/19 06:52 by cjones

https://clearos.com/dokuwiki2/lib/exe/indexer.php?id=content%3Aen_us%3A7_ug_software_updates&1544994287