Affected System setuid Program (Linux, patch) involved program: Red Hat Linux
Description RedHat Linux core security vulnerability affects the system's setuid Program
Details
Versions with vulnerabilities:
Red Hat Linux 6.0 - i386 alpha sparc Red Hat Linux 6.1 - i386 alpha sparc Red Hat Linux 6.2 - i386 alpha sparc |
Drivers added or updated to the core in vulnerability patches:
The AMI MegaRAID driver is updated.
Updated the Acenic Gigabit Ethernet driver.
Updated Adaptec RAID (aacraid) Driver
Updated 3com's latest 3c90x driver
Updated agpgart handling for latest Intel 810 chipset
Update SCSI error handling
Total MD5 package Names
--------------------------------------------------------------------------
6.2/SRPMS/kernel-2.2.16-3.src.rpm 6.2/alpha/kernel-2.2.16-3.alpha.rpm 6.2/alpha/kernel-BOOT-2.2.16-3.alpha.rpm 6.2/alpha/kernel-doc-2.2.16-3.alpha.rpm 6.2/alpha/kernel-headers-2.2.16-3.alpha.rpm 6.2/alpha/kernel-smp-2.2.16-3.alpha.rpm 6.2/alpha/kernel-source-2.2.16-3.alpha.rpm 6.2/alpha/kernel-utils-2.2.16-3.alpha.rpm 6.2/i386/kernel-2.2.16-3.i386.rpm 6.2/i386/kernel-BOOT-2.2.16-3.i386.rpm 6.2/i386/kernel-doc-2.2.16-3.i386.rpm 6.2/i386/kernel-headers-2.2.16-3.i386.rpm 6.2/i386/kernel-ibcs-2.2.16-3.i386.rpm 6.2/i386/kernel-pcmcia-cs-2.2.16-3.i386.rpm 6.2/i386/kernel-smp-2.2.16-3.i386.rpm 6.2/i386/kernel-source-2.2.16-3.i386.rpm 6.2/i386/kernel-utils-2.2.16-3.i386.rpm 6.2/sparc/kernel-2.2.16-3.sparc.rpm 6.2/sparc/kernel-BOOT-2.2.16-3.sparc.rpm 6.2/sparc/kernel-doc-2.2.16-3.sparc.rpm 6.2/sparc/kernel-headers-2.2.16-3.sparc.rpm 6.2/sparc/kernel-smp-2.2.16-3.sparc.rpm 6.2/sparc/kernel-source-2.2.16-3.sparc.rpm 6.2/sparc/kernel-utils-2.2.16-3.sparc.rpm |
These packages have been processed with GPG signatures, and GPG keys can be obtained at http://www.redhat.com/corp/contact.html.
Run the following command to check the packages:
Rpm -- checksig <文件名>
Run the following command to check whether the package has been damaged or modified:
Rpm -- checksig -- nogpg <文件名>
After the solution downloads the patch, run the "rpm-fvl [RPM file name]" command to install it. Then, perform the following steps:
1) Run mkinitrd to create a new ramdisk image file.
2) Update the lilo. conf file
3) run/sbin/lilo
Red Hat Linux 6.2:
intel: ftp://updates.redhat.com/6.2/i386/kernel2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-headers-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-source-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-doc-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-utils-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-smp-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-BOOT-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-pcmcia-cs-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-ibcs-2.2.16-3.i386.rpm |
alpha: ftp://updates.redhat.com/6.2/alpha/kernel-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-headers-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-source-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-doc-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-utils-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-smp-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-BOOT-2.2.16-3.alpha.rpm |
Ftp://updates.redhat.com/6.2/sparc/kernel-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-headers-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-source-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-doc-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-utils-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-smp-2.2.16-3.sparc.rpm source ftp://updates.redhat.com/6.2/sparc/kernel-BOOT-2.2.16-3.sparc.rpm |
Related Articles]
- RedHat Linux User management experience
- MXCSR vulnerability in the RedHat Linux Kernel
- Getting started with firewall configuration in RedHat Linux