There are 10 high-risk vulnerabilities in the Red Hat Linux Kernel

Source: Internet
Author: User
Article Title: there are 10 high-risk vulnerabilities in the Red Hat Linux kernel. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.

According to foreign media reports, red hat, a Linux product publisher, has released 16 security patches to fix Linux operating system kernel security vulnerabilities, ten of the 16 vulnerability patches released by Red Hat professionals of the company are listed as "severe" and six are listed as "moderate ", these vulnerabilities exist in the desktop operating system and Enterprise Linux OS Operating System provided by red hat. It is announced that users of Enterprise Edition Linux 4 should upgrade as soon as possible to avoid possible security attacks. According to the Red Hat Security Bulletin, if the above vulnerabilities are maliciously exploited, the basic functions of the operating system may be affected. The most serious of these vulnerabilities is IPv6-related. Local Users can launch denial-of-service attacks to the system with potential vulnerabilities; other serious security problems include the vulnerabilities caused by ATM conversion mode, NFS client execution programs, and operating system running on certain microprocessors, the above security issues can cause denial-of-service attacks in a specific environment.

Critical Vulnerabilities are also found in products such as product Public Key (keyring), IP routing, SCTP network filtering, virtual memory, thread execution programs, and device drivers, it can also cause denial-of-service attacks. Vulnerabilities listed as "moderate" include directory conversion vulnerabilities in bridge execution programs, Linux security modules, data management components, and file systems. Recent studies show that although the number of viruses targeting open-source software is relatively small, it is more frequent to attack Linux-based systems than in previous years. In April this year, researchers at Kaspersky Lab found that a cross-platform virus had the characteristics of code fishing and could intrude into Windows and Linux systems.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.