The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[linux-security] Forw: 2.2.x kernel vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Fri, 04 Jun 1999 08:56:19 -0500
From: [email protected]
To: [email protected]
Subject: [linux-security] Forw: 2.2.x kernel vulnerability
Cc: [email protected]


below.
Dan
___________________________________________________________________________
Dan Yocum                       | Phone:  (630) 840-8525
Linux/Unix System Administrator | Fax:    (630) 840-6345
Computing Division  OSS/FSS     | email:  [email protected]            .~.   L
Fermi National Accelerator Lab  | WWW:    www-oss.fnal.gov/~yocum/  /V\   I
P.O. Box 500                    |                                  // \\  N
Batavia, IL  60510              |      "TANSTAAFL"                /(   )\ U
________________________________|_________________________________ ^`~'^__X_


------- Forwarded Message

Return-Path: [email protected]
Received: from lists.redhat.com (lists.redhat.com [199.183.24.247])
	by sapphire.fnal.gov (8.8.7/8.8.7) with SMTP id RAA03283
	for <[email protected]>; Wed, 2 Jun 1999 17:46:24 -0500
Received: (qmail 8454 invoked by uid 501); 2 Jun 1999 23:31:15 -0000
Resent-Date: 2 Jun 1999 23:31:15 -0000
Resent-Cc: recipient list not shown: ;
MBOX-Line: From [email protected]  Wed Jun  2 19:31:14 1999
Date: Wed, 2 Jun 1999 16:56:41 -0400
From: Matt Wilson <[email protected]>
To: [email protected]
Cc: [email protected]
Subject: [SECURITY] New kernel packages available
Message-ID: <[email protected]>
Mime-Version: 1.0
Content-Type: multipart/signed; boundary=9amGYk9869ThD9tj; micalg=pgp-md5;
	protocol="application/pgp-signature"
X-Mailer: Mutt 0.95.5i
Approved: [email protected]
Resent-Message-ID: <"zk5vI3.0.U22.2xRLt"@lists.redhat.com>
Resent-From: [email protected]
Reply-To: [email protected]
X-Mailing-List: <[email protected]> archive/latest/28
X-Loop: [email protected]
Precedence: list
Resent-Sender: [email protected]
X-URL: http://www.redhat.com


- --9amGYk9869ThD9tj
Content-Type: text/plain; charset=us-ascii

New packages that correct a vulnerability in the kernels that shipped
with Red Hat Linux 6.0 are now available.  When exploited this
vulnerability allows remote users to crash machines running 2.2.x
kernels.  Thanks to Piotr Wilkin for reporting the problem and to Alan
Cox for the fix.

Red Hat Software recommends that all users with networked machines
upgrade to this release.

The procedure for upgrading the kernel is documented at
http://www.redhat.com/corp/support/docs/kernel-upgrade/kernel-upgrade.html

Please read the entire section for your architecture before upgrading.

Red Hat Linux 6.0
=================

Intel
- -----
rpm -ivh ftp://updates.redhat.com/6.0/i386/kernel-2.2.5-22.i386.rpm
rpm -ivh ftp://updates.redhat.com/6.0/i386/kernel-2.2.5-22.i586.rpm
rpm -ivh ftp://updates.redhat.com/6.0/i386/kernel-smp-2.2.5-22.i586.rpm
rpm -ivh ftp://updates.redhat.com/6.0/i386/kernel-2.2.5-22.i686.rpm
rpm -ivh ftp://updates.redhat.com/6.0/i386/kernel-smp-2.2.5-22.i686.rpm

Alpha
- -----
rpm -ivh ftp://updates.redhat.com/6.0/alpha/kernel-2.2.5-22.alpha.rpm
rpm -ivh ftp://updates.redhat.com/6.0/alpha/kernel-smp-2.2.5-22.alpha.rpm

SPARC/UltraSPARC
- ----------------
Note: These packages obsolete the earlier kernel-2.2.5-21 release
      for SPARC.  The problems fixed by the 2.2.5-21 release are also
      fixed in 2.2.5-22.

rpm -ivh ftp://updates.redhat.com/6.0/sparc/kernel-2.2.5-22.sparc.rpm
rpm -ivh ftp://updates.redhat.com/6.0/sparc/kernel-smp-2.2.5-22.sparc.rpm
rpm -ivh ftp://updates.redhat.com/6.0/sparc/kernel-2.2.5-22.sparc64.rpm
rpm -ivh ftp://updates.redhat.com/6.0/sparc/kernel-smp-2.2.5-22.sparc64.rpm

Source RPM
- ----------
rpm -Uvh ftp://updates.redhat.com/6.0/SRPMS/kernel-2.2.5-22.src.rpm


Matt Wilson PGP public key: http://charlotte.redhat.com/~msw/pgp_public_key.asc - --9amGYk9869ThD9tj Content-Type: application/pgp-signature - -----BEGIN PGP SIGNATURE----- Version: 2.6.3a iQCVAwUBN1Wag1K2dzf8iSNpAQEB8AP/eBi3zLaICOmM1Bi1GW78GrtuIL1q5Kk6 K3Ehbdj0nb7NoHDTRCiIhLGUgCD8MtHZEEWeArAygSyw4tzL3jGaRdUUNfnHtKOl RvmtBex4NRqblqS1DtSWT3GhwBWQUG3uIqNtHyq3yozmU4rdeV6ujNdjp66FmnLa IFFRV6X94N0= =cFQB - -----END PGP SIGNATURE----- - --9amGYk9869ThD9tj-- - -- To unsubscribe: mail [email protected] with "unsubscribe" as the Subject. ------- End of Forwarded Message -- ---------------------------------------------------------------------- Please refer to the information about this list as well as general information about Linux security at http://www.aoy.com/Linux/Security. ---------------------------------------------------------------------- To unsubscribe: mail -s unsubscribe [email protected] < /dev/null

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру