Important: Linux kernel vulnerabilities affect all versions of RHEL5

Source: Internet
Author: User
An important Linux kernel security vulnerability was discovered. Now RHEL5 kernel patch has been released, which can cause DoS caused by unauthorized user operations. Both the server version and the desktop version of RHEL5 are affected, and almost all architectures are affected, such as i386, x86_64, PPC, and IBMs390x. AimportantkernelsecurityandbugfixupdatewasreleasedforRedHa

An important Linux kernel security vulnerability was discovered. Now RHEL5 kernel patch has been released, which can cause DoS caused by unauthorized user operations.

Both the server version and the desktop version of RHEL5 are affected, and almost all architectures are affected, such as i386, x86_64, PPC, and IBM s390x.

A important kernel security and bug fix update was releasedfor Red Hat Enterprise Linux 5, repairing some issues that cocould allow an unprivileged user to cause a denial of service.

Red Hat Enterprise Linux 5 (both Desktop and Server editions) were affected by these issues. almost all ubuntures cocould have had problems because of this security hole, including i386, x86_64, PPC, s390x and a few others.

The Linux kernel process-trace ability was tested on AMD64 ubuntures, discovering the possibility of a kernel crash that cocould allow a local unprivileged user to cause a denial of service.

Due to improper handling of fragmented ESP packets, a possibility of a kernel crash was discovered in the Linux kernel IPsec protocol implementation. if these packages were fragmented in very small chunks, a kernel crash might have occurred during the packet reassembly on the processing ing node.

A denial of service cocould have been caused on 64-bit ubuntures if a local unprivileged user setup a large interval value for hrtimer, forcing the time expiry value to become negative.

Another problem that cocould cause a denial of service was found in the Linux kernel pwc usb video driver. the kernel USB subsystem cocould be brought into the busy-waiting mode by a normal user and cause a DoS.

The updated packages will resolve some other issues as well, like the continual "softlockup" messages that kept occurring on the guest's console after successfully saving and restoring a Red Hat Enterprise Linux 5 para-receivalized guest. sometimes, a kernel hung and panic occurred when the cpufreq daemon was disabled. because of this, some system reboots did not complete successfully.

If you intend to apply the updated packages-and this is the advisable thing to do-, first make sure that you 've installed all the previusly-released updates.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.