RedHat Linux core Security Vulnerabilities

Source: Internet
Author: User

Affected System setuid Program (Linux, patch) involved program: Red Hat Linux
Description RedHat Linux core security vulnerability affects the system's setuid Program
Details
Versions with vulnerabilities:

Red Hat Linux 6.0 - i386 alpha sparc Red Hat Linux 6.1 - i386 alpha sparc Red Hat Linux 6.2 - i386 alpha sparc 

Drivers added or updated to the core in vulnerability patches:
The AMI MegaRAID driver is updated.
Updated the Acenic Gigabit Ethernet driver.
Updated Adaptec RAID (aacraid) Driver
Updated 3com's latest 3c90x driver
Updated agpgart handling for latest Intel 810 chipset
Update SCSI error handling

Total MD5 package Names
--------------------------------------------------------------------------

6.2/SRPMS/kernel-2.2.16-3.src.rpm 6.2/alpha/kernel-2.2.16-3.alpha.rpm 6.2/alpha/kernel-BOOT-2.2.16-3.alpha.rpm 6.2/alpha/kernel-doc-2.2.16-3.alpha.rpm 6.2/alpha/kernel-headers-2.2.16-3.alpha.rpm 6.2/alpha/kernel-smp-2.2.16-3.alpha.rpm 6.2/alpha/kernel-source-2.2.16-3.alpha.rpm 6.2/alpha/kernel-utils-2.2.16-3.alpha.rpm 6.2/i386/kernel-2.2.16-3.i386.rpm 6.2/i386/kernel-BOOT-2.2.16-3.i386.rpm 6.2/i386/kernel-doc-2.2.16-3.i386.rpm 6.2/i386/kernel-headers-2.2.16-3.i386.rpm 6.2/i386/kernel-ibcs-2.2.16-3.i386.rpm 6.2/i386/kernel-pcmcia-cs-2.2.16-3.i386.rpm 6.2/i386/kernel-smp-2.2.16-3.i386.rpm 6.2/i386/kernel-source-2.2.16-3.i386.rpm 6.2/i386/kernel-utils-2.2.16-3.i386.rpm 6.2/sparc/kernel-2.2.16-3.sparc.rpm 6.2/sparc/kernel-BOOT-2.2.16-3.sparc.rpm 6.2/sparc/kernel-doc-2.2.16-3.sparc.rpm 6.2/sparc/kernel-headers-2.2.16-3.sparc.rpm 6.2/sparc/kernel-smp-2.2.16-3.sparc.rpm 6.2/sparc/kernel-source-2.2.16-3.sparc.rpm 6.2/sparc/kernel-utils-2.2.16-3.sparc.rpm 

These packages have been processed with GPG signatures, and GPG keys can be obtained at http://www.redhat.com/corp/contact.html.
Run the following command to check the packages:
Rpm -- checksig <文件名>
Run the following command to check whether the package has been damaged or modified:
Rpm -- checksig -- nogpg <文件名>
After the solution downloads the patch, run the "rpm-fvl [RPM file name]" command to install it. Then, perform the following steps:
1) Run mkinitrd to create a new ramdisk image file.
2) Update the lilo. conf file
3) run/sbin/lilo

Red Hat Linux 6.2:

intel: ftp://updates.redhat.com/6.2/i386/kernel2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-headers-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-source-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-doc-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-utils-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-smp-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-BOOT-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-pcmcia-cs-2.2.16-3.i386.rpm ftp://updates.redhat.com/6.2/i386/kernel-ibcs-2.2.16-3.i386.rpm 

alpha: ftp://updates.redhat.com/6.2/alpha/kernel-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-headers-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-source-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-doc-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-utils-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-smp-2.2.16-3.alpha.rpm ftp://updates.redhat.com/6.2/alpha/kernel-BOOT-2.2.16-3.alpha.rpm 

Ftp://updates.redhat.com/6.2/sparc/kernel-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-headers-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-source-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-doc-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-utils-2.2.16-3.sparc.rpm ftp://updates.redhat.com/6.2/sparc/kernel-smp-2.2.16-3.sparc.rpm source ftp://updates.redhat.com/6.2/sparc/kernel-BOOT-2.2.16-3.sparc.rpm

Related Articles]

  • RedHat Linux User management experience
  • MXCSR vulnerability in the RedHat Linux Kernel
  • Getting started with firewall configuration in RedHat Linux

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.