LINUX

업데이트

2000년도에 시작한 SULinux는 `보안최적화된 서버전용리눅스배포판`입니다. 21년간 2000고객사에서 이미 안전하게 사용하고 계십니다.
클라우드인프라에 최적의 리눅스OS를 경험해보십시요.

홈
LINUX
업데이트

SULinux 2014 kernel 보안 업데이트

웹관리자 2014-12-16 19:28
조회 2,053
1. 내용
    - 무한 재귀에 의한 스택 오버 플로우 결함 패치 등 8가지 항목 패치 
   

2. 업데이트 방법
 
 yum update


3. 관련 패키지

SRPMS:
kernel-2.6.32-504.3.3.el6.src.rpm
 
IA-32:
kernel-2.6.32-504.3.3.el6.i686.rpm
kernel-abi-whitelists-2.6.32-504.3.3.el6.noarch.rpm
kernel-debug-2.6.32-504.3.3.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-504.3.3.el6.i686.rpm
kernel-debug-devel-2.6.32-504.3.3.el6.i686.rpm
kernel-debuginfo-2.6.32-504.3.3.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-504.3.3.el6.i686.rpm
kernel-devel-2.6.32-504.3.3.el6.i686.rpm
kernel-doc-2.6.32-504.3.3.el6.noarch.rpm
kernel-firmware-2.6.32-504.3.3.el6.noarch.rpm
kernel-headers-2.6.32-504.3.3.el6.i686.rpm
perf-2.6.32-504.3.3.el6.i686.rpm
perf-debuginfo-2.6.32-504.3.3.el6.i686.rpm
python-perf-2.6.32-504.3.3.el6.i686.rpm
python-perf-debuginfo-2.6.32-504.3.3.el6.i686.rpm

x86_64:
kernel-2.6.32-504.3.3.el6.x86_64.rpm
kernel-abi-whitelists-2.6.32-504.3.3.el6.noarch.rpm
kernel-debug-2.6.32-504.3.3.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-504.3.3.el6.x86_64.rpm
kernel-debug-devel-2.6.32-504.3.3.el6.x86_64.rpm
kernel-debuginfo-2.6.32-504.3.3.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-504.3.3.el6.x86_64.rpm
kernel-devel-2.6.32-504.3.3.el6.x86_64.rpm
kernel-doc-2.6.32-504.3.3.el6.noarch.rpm
kernel-firmware-2.6.32-504.3.3.el6.noarch.rpm
kernel-headers-2.6.32-504.3.3.el6.x86_64.rpm
perf-2.6.32-504.3.3.el6.x86_64.rpm
perf-debuginfo-2.6.32-504.3.3.el6.x86_64.rpm
python-perf-2.6.32-504.3.3.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-504.3.3.el6.x86_64.rpm

4. 참고 사이트
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322
https://www.sulinux.net/bbs2014/board.php?bo_table=update_2&wr_id=644