JetPatch patches Enterprise Linux at the Errata level — RHSA, RHBA, RHEA — with CVE correlation. Manage local repositories, pre-download patches before the window, and roll back cleanly if anything breaks. The only platform that also patches Windows and Unix (Solaris, AIX) from the same console.
Linux isn’t one OS — it’s eight distributions with four different package managers, two advisory formats, and environments that range from cloud instances to air-gapped data centers. Most patch tools treat Linux as an afterthought.
Cloud-native tools like NinjaOne patch at the package level only — they see “update httpd” but can’t correlate it to RHSA-2024:1234. When your auditor asks “did you remediate this advisory?” NinjaOne can’t answer. ManageEngine users report that “support for 3rd-party repositories for Linux is lacking” — Chrome, Edge, and VS Code aren’t covered. Ivanti added Linux support after launch; user reviews note it “did not support Linux” at time of purchase.
None of them manage your local repositories. None of them pre-download patches before the maintenance window. And none of them can also patch your Solaris and AIX servers from the same console.
RHEL in production, Ubuntu in the cloud, CentOS migrating to Rocky. Each has different repos, different advisory formats, and different package managers.
Air-gapped servers can’t reach vendor repos. Bandwidth-constrained sites need local mirrors. Most tools assume internet connectivity and offer no alternative.
Auditors want to know you remediated RHSA-2024:5678, not that you upgraded a package. Package-level patching doesn’t map to specific advisories.
Production Linux servers have tight windows. Downloading patches during the window wastes time. No competitor pre-downloads packages before the window opens.
When your compliance team asks “did we remediate RHSA-2024:5678?” JetPatch can answer. Package-level tools like NinjaOne can tell you a package was updated — but not which advisory it resolved.
JetPatch is the only patch management platform that manages local Linux repositories — including a Unified Linux Repository that consolidates all distributions on a single Docker host. No competitor offers this.
Full setup guides and automated sync scripts for each distribution. Each repo syncs with the vendor’s global repository on a configurable cron schedule.
Consolidate all distribution repositories on a single Docker host. Each OS runs in its own container with Nginx reverse proxy for HTTPS termination. Reduces hardware and operational overhead.
For environments without internet access, local repositories serve as the sole patch source. Cron-scheduled syncs keep repos current. Endpoints pull packages from the local mirror — no external connectivity required during patching.
Select the Linux distributions you run. See exactly what JetPatch delivers for each one.
This is an interactive guide for illustration purposes. Contact JetPatch for detailed platform compatibility information for your specific environment.
JetPatch downloads all needed patches to each endpoint as part of the Collect Endpoint Updates process — outside the maintenance window. When the window opens, binaries are already local. Installation starts immediately.
This reduces the maintenance window to installation time only — eliminating the download wait that extends every other tool’s window. Disabled by default; enable per policy.
Every JetPatch patch installation on supported distributions stores an OS-level transaction ID. When a rollback is needed, JetPatch uses the transaction ID to revert the specific packages it installed — not a full system restore, just the patches from that cycle. Supported for RHEL, Rocky, AlmaLinux, CentOS, SUSE, and Amazon Linux.
Note: the previous package version must exist in the repository for the rollback to succeed. Rollback is not currently supported for Ubuntu, Debian, or AIX. NinjaOne has no rollback for any Linux distribution.
Tell us which distributions you run. We’ll show you advisory correlation, local repo management, and compliance reporting for your specific environment.
Advisory-level patching means JetPatch patches Enterprise Linux systems at the Errata level — correlating patches to specific Red Hat Security Advisories (RHSA), Bug Advisories (RHBA), and Enhancement Advisories (RHEA) with CVE references. This is critical for compliance teams that need to prove they remediated specific advisories, not just that they updated a package.
RHEL 7–9, Ubuntu LTS, SUSE Linux Enterprise Server 12–15, Debian, Rocky Linux, AlmaLinux, CentOS 7, and Amazon Linux. Each distribution uses its native package manager (YUM, DNF, APT, or Zypper). JetPatch also supports Oracle Solaris and IBM AIX from the same console.
Yes. JetPatch provides full local repository management including per-distribution setup guides and a Unified Linux Repository that uses Docker containers to consolidate all distributions on a single host. Essential for air-gapped environments, bandwidth-constrained sites, and organizations that need package control.
Yes, for Enterprise Linux distributions (RHEL, Rocky, AlmaLinux, CentOS, SUSE) and Amazon Linux. JetPatch stores the OS-level transaction ID for every patch installation. Rollback uses the transaction ID to cleanly revert the specific packages from that cycle. The previous package version must exist in the repository for the rollback to succeed. Rollback is not currently supported for Ubuntu, Debian, or AIX.
Yes. JetPatch can download all needed patches to the endpoint outside the maintenance window as part of the Collect Endpoint Updates process. When the window opens, binaries are already local and installation starts immediately. This option is disabled by default and can be enabled per policy.
Tell us which distributions you run and whether you need local repository management. We’ll show you exactly how JetPatch handles your Linux environment.