Linux Minimal更新补丁实操指南
一、识别系统与准备
cat /etc/os-release,记录如Ubuntu 22.04、CentOS 7、RHEL 8/9、Fedora、Debian、openSUSE、Arch等,以便选择对应包管理器。ping -c 4 8.8.8.8df -h(建议保留**≥20%**余量)二、按发行版执行更新
| 发行版/系列 | 包管理器 | 更新命令示例 | 仅安全更新 | 自动更新工具 |
|---|---|---|---|---|
| Debian/Ubuntu | APT | sudo apt update && sudo apt upgrade -y;依赖变化用apt full-upgrade |
`sudo apt install --only-upgrade $(apt list --upgradable 2>/dev/null | grep -i security |
| CentOS 7 / RHEL 7 | YUM | sudo yum update -y |
sudo yum update --security -y |
yum-cron |
| RHEL 8+/Fedora | DNF | sudo dnf update -y |
sudo dnf update --security -y |
dnf-automatic |
| openSUSE | Zypper | sudo zypper refresh && sudo zypper update |
sudo zypper patch --cve 或按公告更新 |
zypper patch --auto-agree-with-licenses |
| Arch Linux | Pacman | sudo pacman -Syu |
滚动更新,无单独“仅安全”开关 | pacman-contrib + systemd timer |
apt/yum/dnf/zypper/pacman安装对应工具。三、仅安装安全补丁与自动更新
sudo apt install --only-upgrade $(apt list --upgradable 2>/dev/null | grep -i security | cut -d'/' -f1)sudo apt install unattended-upgradessudo dpkg-reconfigure unattended-upgrades,并在/etc/apt/apt.conf.d/50unattended-upgrades确保包含:
Unattended-Upgrade::Allowed-Origins { "${distro_id}:${distro_codename}-security"; };sudo yum update --security -ysudo yum install yum-cron -y/etc/yum/yum-cron.conf,设置update_cmd = security、apply_updates = yes,然后systemctl enable --now yum-cronsudo dnf update --security -ydnf-automatic(默认策略或按需定制)四、更新后的验证与回滚
uname -r;若更新前后不一致且业务允许,执行reboot。systemctl --failedsystemctl status nginx mysql postgresql(按实际替换)journalctl -xe 或查看/var/log/syslogsudo apt install <pkg>=<version> 或使用apt-mark hold <pkg>阻止升级sudo dnf history undo <transaction-id> 或 sudo yum history undo <id>