Multiple security vulnerabilities in Linux2.2Kernel
Source: Internet
Author: User
Article Title: Linux2.2Kernel has multiple security vulnerabilities. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Affected Systems:
Linux kernel 2.2.9
Linux kernel 2.2.8
Linux kernel 2.2.7
Linux kernel 2.2.6
Linux kernel 2.2.5
Linux kernel 2.2.4
Linux kernel 2.2.3
Linux kernel 2.2.21
Linux kernel 2.2.20
Linux kernel 2.2.2
Linux kernel 2.2.18
Linux kernel 2.2.17
Linux kernel 2.2.16
Linux kernel 2.2.15
Linux kernel 2.2.14
Linux kernel 2.2.13
Linux kernel 2.2.12
Linux kernel 2.2.11
Linux kernel 2.2.10
Linux kernel 2.2.1
Linux kernel 2.2.19
-Mandrake Linux 8.1
-Mandrake Linux 8.0
-SuSE Linux 7.0
-SuSE Linux 6.4
-SuSE Linux 6.3
-Trustix-Secure Linux 1.5
-Trustix-Secure Linux 1.2
-Trustix-Secure Linux 1.1
Description:
--------------------------------------------------------------------------------
Bugtraq id: 5984
Linux Kernel is an open-source Linux Kernel system.
RedHat reports that there are multiple problems in the Linux 2.2 kernel. Local attackers can exploit these vulnerabilities to initiate privilege escalation attacks.
Multiple vulnerabilities in the Linux 2.2 kernel can lead to Elevation of Privilege. These vulnerabilities are related to signal processing, mathematical buffer overflow, and multicast errors. No detailed vulnerability description is provided.
RedHat
------
For this reason, RedHat has released a Security Bulletin (RHSA-2002: 210-06) and patches:
RHSA-2002: 210-06: New kernel 2.2 packages fix local vulnerabilities
Link: https://www.redhat.com/support/errata/RHSA-2002-210.html
Before using this update, make sure that the patch has been used in all previously released error tables.
You can obtain the manual kernel upgrade documentation from the following address:
Before upgrading the kernel, Please carefully read the operation guide related to your structure.
You can also use the following RedHat Upgrade Code to upgrade through the network:
Up2date
This command will start the interaction process to install and upgrade the relevant RPM.
Patch download:
SRPMS:
Ftp://updates.redhat.com/6.2/en/ OS /SRPMS/kernel-2.2.22-6.2.2.src.rpm
Alpha:
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-enterprise-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-smp-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-BOOT-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-utils-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-doc-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-headers-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-source-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-jensen-2.2.22-6.2.2.alpha.rpm
I386:
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-smp-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-BOOT-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-ibcs-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-utils-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-pcmcia-cs-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-doc-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-headers-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-source-2.2.22-6.2.2.i386.rpm
I586:
Ftp://updates.redhat.com/6.2/en/ OS /i586/kernel-smp-2.2.22-6.2.2.i586.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i586/kernel-2.2.22-6.2.2.i586.rpm
I686:
Ftp://updates.redhat.com/6.2/en/ OS /i686/kernel-enterprise-2.2.22-6.2.2.i686.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i686/kernel-smp-2.2.22-6.2.2.i686.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i686/kernel-2.2.22-6.2.2.i686.rpm
Red Hat Linux 7.0:
SRPMS:
Ftp://updates.redhat.com/7.0/en/ OS /SRPMS/kernel-2.2.22-7.0.2.src.rpm
Alpha:
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-enterprise-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-smp-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-BOOT-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-utils-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-doc-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-source-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-jensen-2.2.22-7.0.2.alpha.rpm
I386:
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-smp-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-BOOT-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-ibcs-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-utils-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-pcmcia-cs-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-doc-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-source-2.2.22-7.0.2.i386.rpm
I586:
Ftp://updates.redhat.com/7.0/en/ OS /i586/kernel-smp-2.2.22-7.0.2.i586.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i586/kernel-2.2.22-7.0.2.i586.rpm
I686:
Ftp://updates.redhat.com/7.0/en/ OS /i686/kernel-enterprise-2.2.22-7.0.2.i686.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i686/kernel-smp-2.2.22-7.0.2.i686.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i686/kernel-2.2.22-7.0.2.i686.rpm
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.