SCIENTIFIC-LINUX-USERS Archives

August 2017

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Todd Chester <[log in to unmask]>
Reply To:
Todd Chester <[log in to unmask]>
Date:
Fri, 18 Aug 2017 23:39:18 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (101 lines)
On 08/18/2017 01:22 PM, David Sommerseth wrote:
> On 18/08/17 19:36, ToddAndMargo wrote:
>> On 08/17/2017 01:03 PM, David Sommerseth wrote:
>>> On 17/08/17 18:33, ToddAndMargo wrote:
>>>> On 08/17/2017 09:23 AM, ToddAndMargo wrote:
>
> Those version checks are rather pointless, IMO.  

I agree.  It is a paper chase to try to move liability from the card
providers to the merchant.

Don't ever get me started on the changing your passwords
every month thing!


> They just compare
> "what's the latest released version".  It's equally to complain the
> Linux kernel on EL7 is insecure and unmaintained because it is
> kernel-3.10 and the latest Linux kernel is 4.12.  Which is a completely
> misleading statement stupid version checkers provides, since the 3.10
> EL7 kernel actually carries fixes and improvements from way newer
> kernels; backported, been through QA and the complete release machinery
> at Red Hat.
> 
> Those version checkers can work reasonably well for private consumers,
> where running bleeding edge can work without too much risks.  But for
> the enterprise it is a waste of time and energy, as those environments
> wants to have a more controlled and predictable base environment.
> 

> How I see it, this all is quite nonsense.  Read the Firefox ESR FAQ more
> carefully:
> 
>    "Maintenance of each ESR, through point releases, is limited to
>     high-risk/high-impact security vulnerabilities and in rare cases may
>     also include off-schedule releases that address live security
>     vulnerabilities."
> 
> And the current Firefox build in SL7.3 is firefox-52.2.  And it gets
> regular updates, and the ESR major versions also gets updated.
> 
> # grep firefox- /var/log/yum.log*
> Jan 20 14:41:03 Updated: firefox-31.4.0-1.el7_0.x86_64
> Mar 08 18:41:02 Updated: firefox-31.5.0-2.el7_0.x86_64
> Apr 02 22:51:13 Updated: firefox-31.6.0-2.el7_1.x86_64
> May 17 21:42:19 Updated: firefox-38.0-3.el7_1.x86_64
> Jul 06 00:39:29 Updated: firefox-38.1.0-1.el7_1.x86_64
> Aug 13 00:42:56 Updated: firefox-38.2.0-4.el7_1.x86_64
> Sep 03 22:34:38 Updated: firefox-38.2.1-1.el7_1.x86_64
> Sep 30 22:54:04 Updated: firefox-38.3.0-2.el7_1.x86_64
> Nov 06 01:24:16 Updated: firefox-38.4.0-1.el7_1.x86_64
> Dec 25 13:12:56 Updated: firefox-38.5.0-3.el7_2.x86_64
> Jan 28 11:27:12 Updated: firefox-38.6.0-1.el7_2.x86_64
> Feb 19 01:33:19 Updated: firefox-38.6.1-1.el7_2.x86_64
> Mar 10 00:40:33 Updated: firefox-38.7.0-1.el7_2.x86_64
> Apr 29 21:00:54 Updated: firefox-45.1.0-1.el7_2.x86_64
> Jun 17 13:38:47 Updated: firefox-45.2.0-1.el7_2.x86_64
> Nov 22 00:37:17 Updated: firefox-45.5.0-1.el7_3.x86_64
> Jan 31 15:01:19 Updated: firefox-45.7.0-1.el7_3.x86_64
> Mar 06 22:58:39 Updated: firefox-45.7.0-2.el7_3.x86_64
> Mar 10 02:35:16 Updated: firefox-52.0-4.el7_3.x86_64
> Apr 19 01:57:53 Updated: firefox-52.0-5.el7_3.x86_64
> Apr 26 02:11:50 Updated: firefox-52.1.0-2.el7_3.x86_64
> Jun 17 01:34:19 Updated: firefox-52.2.0-1.el7_3.x86_64
> 
> The first "Jan 20" reference is from 2015(!).

Gee wiz.  I didn't say they never did it.  I just said they
were crabby about doing it.  The times I have approached them
on various security issues they had not repaired, they were
CRABBY with me and refused.  So I stop spitting in the wind.


> And that is definitely not necessarily the equivalent of running the
> latest bleeding edge Firefox or Firefox ESR - neither feature wise or
> security patching wise.  AFAIK, Midori is not packaged within SL, so
> you're trading packaging QA for something unknown.
> 

Midori is a stinker, but it will have to do until I firefox
fixed.

>> Maybe I will go to the dark side and install Chromium
> 
> 
> That is probably somewhat saner, even though you'll need Fedora EPEL to
> get a pre-built package - which does not have the same QA process as SL
> packages have implicitly.
> 
>> Do you know anyway to uninstall the recent updates that
>> caused this?
> 
> 
> You need to undo what the tarball you installed did.  I'd take the
> output of 'tar -tzf $tarball' and review that list of file, and remove
> them manually.  Then do a 'yum erase firefox' and reinstall it.

The tar bar is extremely simple to undo.  It is all in the one directory.

But that was not the question.  I wanted to undo the yum update.

ATOM RSS1 RSS2