Multiple security vulnerabilities in Linux2.2Kernel

Source: Internet
Author: User
Article Title: Linux2.2Kernel has multiple security vulnerabilities. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Affected Systems:
Linux kernel 2.2.9
Linux kernel 2.2.8
Linux kernel 2.2.7
Linux kernel 2.2.6
Linux kernel 2.2.5
Linux kernel 2.2.4
Linux kernel 2.2.3
Linux kernel 2.2.21
Linux kernel 2.2.20
Linux kernel 2.2.2
Linux kernel 2.2.18
Linux kernel 2.2.17
Linux kernel 2.2.16
Linux kernel 2.2.15
Linux kernel 2.2.14
Linux kernel 2.2.13
Linux kernel 2.2.12
Linux kernel 2.2.11
Linux kernel 2.2.10
Linux kernel 2.2.1
Linux kernel 2.2.19
-Mandrake Linux 8.1
-Mandrake Linux 8.0
-SuSE Linux 7.0
-SuSE Linux 6.4
-SuSE Linux 6.3
-Trustix-Secure Linux 1.5
-Trustix-Secure Linux 1.2
-Trustix-Secure Linux 1.1
Description:
--------------------------------------------------------------------------------
Bugtraq id: 5984
  
Linux Kernel is an open-source Linux Kernel system.
  
RedHat reports that there are multiple problems in the Linux 2.2 kernel. Local attackers can exploit these vulnerabilities to initiate privilege escalation attacks.
  
Multiple vulnerabilities in the Linux 2.2 kernel can lead to Elevation of Privilege. These vulnerabilities are related to signal processing, mathematical buffer overflow, and multicast errors. No detailed vulnerability description is provided.
  
<* Source: Silvio Cesare (silvio@qualys.com)
  
Link: https://www.redhat.com/support/errata/RHSA-2002-210.html
*>
  
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
  
RedHat
------
For this reason, RedHat has released a Security Bulletin (RHSA-2002: 210-06) and patches:
RHSA-2002: 210-06: New kernel 2.2 packages fix local vulnerabilities
Link: https://www.redhat.com/support/errata/RHSA-2002-210.html
  
Before using this update, make sure that the patch has been used in all previously released error tables.
  
You can obtain the manual kernel upgrade documentation from the following address:
  
Http://www.redhat.com/support/docs/howto/kernel-upgrade/
  
Before upgrading the kernel, Please carefully read the operation guide related to your structure.
  
You can also use the following RedHat Upgrade Code to upgrade through the network:
  
Up2date
  
This command will start the interaction process to install and upgrade the relevant RPM.
  
Patch download:
  
SRPMS:
Ftp://updates.redhat.com/6.2/en/ OS /SRPMS/kernel-2.2.22-6.2.2.src.rpm
  
Alpha:
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-enterprise-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-smp-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-BOOT-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-utils-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-doc-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-headers-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-source-2.2.22-6.2.2.alpha.rpm
Ftp://updates.redhat.com/6.2/en/ OS /alpha/kernel-jensen-2.2.22-6.2.2.alpha.rpm
  
I386:
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-smp-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-BOOT-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-ibcs-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-utils-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-pcmcia-cs-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-doc-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-headers-2.2.22-6.2.2.i386.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i386/kernel-source-2.2.22-6.2.2.i386.rpm
  
I586:
Ftp://updates.redhat.com/6.2/en/ OS /i586/kernel-smp-2.2.22-6.2.2.i586.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i586/kernel-2.2.22-6.2.2.i586.rpm
  
I686:
Ftp://updates.redhat.com/6.2/en/ OS /i686/kernel-enterprise-2.2.22-6.2.2.i686.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i686/kernel-smp-2.2.22-6.2.2.i686.rpm
Ftp://updates.redhat.com/6.2/en/ OS /i686/kernel-2.2.22-6.2.2.i686.rpm
  
Red Hat Linux 7.0:
  
SRPMS:
Ftp://updates.redhat.com/7.0/en/ OS /SRPMS/kernel-2.2.22-7.0.2.src.rpm
  
Alpha:
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-enterprise-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-smp-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-BOOT-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-utils-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-doc-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-source-2.2.22-7.0.2.alpha.rpm
Ftp://updates.redhat.com/7.0/en/ OS /alpha/kernel-jensen-2.2.22-7.0.2.alpha.rpm
  
I386:
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-smp-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-BOOT-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-ibcs-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-utils-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-pcmcia-cs-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-doc-2.2.22-7.0.2.i386.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i386/kernel-source-2.2.22-7.0.2.i386.rpm
  
I586:
Ftp://updates.redhat.com/7.0/en/ OS /i586/kernel-smp-2.2.22-7.0.2.i586.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i586/kernel-2.2.22-7.0.2.i586.rpm
  
I686:
Ftp://updates.redhat.com/7.0/en/ OS /i686/kernel-enterprise-2.2.22-7.0.2.i686.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i686/kernel-smp-2.2.22-7.0.2.i686.rpm
Ftp://updates.redhat.com/7.0/en/ OS /i686/kernel-2.2.22-7.0.2.i686.rpm
  
Verification:
  
MD5 sum Package Name
--------------------------------------------------------------------------
17d2896d2f7fb9b6fb63128593e44cf7 6.2/en/OS/SRPMS/kernel-2.2.22-6.2.2.src.rpm
934a473b6149c31aab29ffeb55d1bb33 6.2/en/OS/alpha/kernel-2.2.22-6.2.2.alpha.rpm
3078540160bbcb03a9b087b8d3f02797 6.2/en/OS/alpha/kernel-BOOT-2.2.22-6.2.2.alpha.rpm
78ad15c3d6e79f40906f660f337a41cf 6.2/en/OS/alpha/kernel-doc-2.2.22-6.2.2.alpha.rpm
Df17f26a164abb1cc432a1601553c32c 6.2/en/OS/alpha/kernel-enterprise-2.2.22-6.2.2.alpha.rpm
87d00fcd2b047605c3e6b2fcb2ed3550 6.2/en/OS/alpha/kernel-headers-2.2.22-6.2.2.alpha.rpm
F1357fd71e421012e86d57f5b8403b49 6.2/en/OS/alpha/kernel-jensen-2.2.22-6.2.2.alpha.rpm
D9848588d5b399e2e46dabef9dfa56a2 6.2/en/OS/alpha/kernel-smp-2.2.22-6.2.2.alpha.rpm
2492a5eafc3a5jwee021f31acddc161 6.2/en/OS/alpha/kernel-source-2.2.22-6.2.2.alpha.rpm
F7866cc49775c8cc041a99630a8ccd8f 6.2/en/OS/alpha/kernel-utils-2.2.22-6.2.2.alpha.rpm
A8ed8ef5a2ab223ae2136b6c9332979d 6.2/en/OS/i386/kernel-2.2.22-6.2.2.i386.rpm
415ee4e472766ff19818aa8f93959e06 6.2/en/OS/i386/kernel-BOOT-2.2.22-6.2.2.i386.rpm
F08d05768682829b67a96837135f5b3e 6.2/en/OS/i386/kernel-doc-2.2.22-6.2.2.i386.rpm
E0e5f8eaaa90337287056ecdf61a1b85 6.2/en/OS/i386/kernel-headers-2.2.22-6.2.2.i386.rpm
6f1c7eee03bdce33b41c45882786a90c 6.2/en/OS/i386/kernel-ibcs-2.2.22-6.2.2.i386.rpm
7fbb23912a

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.