LINUX

업데이트

2000년도에 시작한 SULinux는 `보안최적화된 서버전용리눅스배포판`입니다. 21년간 2000고객사에서 이미 안전하게 사용하고 계십니다.
클라우드인프라에 최적의 리눅스OS를 경험해보십시요.

홈
LINUX
업데이트

SULinux 2014 kernel 보안 업데이트 및 버그 수정

웹관리자 2014-07-09 15:43
조회 2,975
1. 내용
   kernel의 잠재적인 충돌및 보안문제 가능성이있는 
    8개의 버그 픽
   

2. 업데이트 방법
 
 yum update


3. 관련 패키지

IA-32:
kernel-2.6.32-431.20.3.el6.i686.rpm
kernel-abi-whitelists-2.6.32-431.20.3.el6.noarch.rpm
kernel-debug-2.6.32-431.20.3.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-431.20.3.el6.i686.rpm
kernel-debug-devel-2.6.32-431.20.3.el6.i686.rpm
kernel-debuginfo-2.6.32-431.20.3.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-431.20.3.el6.i686.rpm
kernel-devel-2.6.32-431.20.3.el6.i686.rpm
kernel-doc-2.6.32-431.20.3.el6.noarch.rpm
kernel-firmware-2.6.32-431.20.3.el6.noarch.rpm
kernel-headers-2.6.32-431.20.3.el6.i686.rpm
perf-2.6.32-431.20.3.el6.i686.rpm
perf-debuginfo-2.6.32-431.20.3.el6.i686.rpm
python-perf-2.6.32-431.20.3.el6.i686.rpm
python-perf-debuginfo-2.6.32-431.20.3.el6.i686.rpm
 
x86_64:
kernel-2.6.32-431.20.3.el6.x86_64.rpm
kernel-abi-whitelists-2.6.32-431.20.3.el6.noarch.rpm
kernel-debug-2.6.32-431.20.3.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-431.20.3.el6.x86_64.rpm
kernel-debug-devel-2.6.32-431.20.3.el6.x86_64.rpm
kernel-debuginfo-2.6.32-431.20.3.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-431.20.3.el6.x86_64.rpm
kernel-devel-2.6.32-431.20.3.el6.x86_64.rpm
kernel-doc-2.6.32-431.20.3.el6.noarch.rpm
kernel-firmware-2.6.32-431.20.3.el6.noarch.rpm
kernel-headers-2.6.32-431.20.3.el6.x86_64.rpm
perf-2.6.32-431.20.3.el6.x86_64.rpm
perf-debuginfo-2.6.32-431.20.3.el6.x86_64.rpm
python-perf-2.6.32-431.20.3.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-431.20.3.el6.x86_64.rpm

 
4. 참고 사이트
https://www.sulinux.net/bbs2014/board.php?bo_table=update_2&wr_id=603
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0203
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153