# vim /etc/zypp/zypp.conf将以下内容:
......
multiversion.kernels = latest,latest-1,running
......修改为:
......
multiversion.kernels = latest,latest-1,latest-2,latest-3,running
......(补充:这里以使用 zypper 升级内核时保留内核的数量从 3 个增加到 5 个为例)
# vim /etc/zypp/zypp.conf将以下内容:
......
multiversion.kernels = latest,latest-1,running
......修改为:
......
multiversion.kernels = latest,latest-1,latest-2,latest-3,running
......(补充:这里以使用 zypper 升级内核时保留内核的数量从 3 个增加到 5 个为例)
CVE 全称是:Common Vulnerabilities and Exposures,翻译成中文是:常见脆弱性和暴露,是一个业界统一的脆弱性和暴露
CVE-2016-4658,其中 2016-4658 是编号
用于标签系统和应用的漏洞,并实现了一个漏洞数据库以进行漏洞的查询和管理
https://www.cve.org
https://access.redhat.com/security/security-updates/#/cve
https://access.redhat.com/management/errata
openSUSE CVE 安全补丁官方网站
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/
SUSE CVE 安全补丁官方网站
https://www.suse.com/security/cve/
# rpm -q openssh-clients --changelog | grep -i cve(补充:这里以显示 openssh-clients 软件的 CVE 信息的变更历史为例)
# rpm -qpi --changelog redis-6.0.14-6.8.1.x86_64.rpm |grep -E '32675'
- Fix CVE-2021-32675, Denial Of Service when processing RESP request
  (CVE-2021-32675, bsc#1191303)
  * cve-2021-32675.patch(补充:这里以确认 redis-6.0.14-6.8.1.x86_64.rpm 软件包是否已修复 CVE-2021-32675 为例)
只有 CentOS 8 & RHEL 8 才可以使用 nftables 防火墙
# dnf install nftables# iptables -F# ip6tables -F# systemctl disable firewalld.service# systemctl stop firewalld.service# systemctl enable nftables# systemctl start nftables# vi /etc/sysconfig/nftables.conf添加以下内容:
......
include "/etc/nftables/nftables.rules"# vi /etc/nftables/nftables.rules
flush ruleset
table inet siemens_FW {
    chain siemens_FW_input {
      type filter hook input priority 0; policy accept;
      iif "lo" accept
      ip saddr 127.0.0.0/8 counter packets 0 bytes 0 drop
      ip6 saddr ::1 counter packets 0 bytes 0 drop
      ip saddr 192.168.1.1 tcp dport ssh accept                  
      tcp dport ssh drop
    }
    chain siemens_FW_forward {
      type filter hook forward priority 0; policy accept;
    } 
    chain siemens_FW_output {
      type filter hook output priority 0; policy accept;
    }
}(
补充:
(1)这里以基本的本地巡回路由策略并禁止除 192.168.1.1 的 IP 地址访问本地的 22 端口为例
(2)这里的 /etc/nftables/nftables.rules 是在 2.1 中添加的
)
# systemctl start nftables只有 CentOS 8 & RHEL 8 才可以使用 nftables 防火墙
# dnf install nftables# iptables -F# ip6tables -F# systemctl disable firewalld.service# systemctl stop firewalld.service# systemctl enable nftables# systemctl start nftables# nft create table inet <table># nft create chain inet <table> input { type filter hook input priority 0 \; }# nft create chain inet <table> forward { type filter hook forward priority 0 \; }# nft create chain inet <table> output { type filter hook output priority 0 \; }# nft add rule inet filter input iif lo accept
# nft add rule inet filter input ip saddr 127.0.0.0/8 counter drop
# nft add rule inet filter input ip6 saddr ::1 counter drop# ifconfig -a# ifconfig eth0 192.168.1.1/24(补充:这里以临时给名为 eth0 的网卡添加 192.168.1.1/24 IP 地址为例)