AnNyung Official Homepage Home > Update [ 1.1 ]  

HOME
What is AnNyung
Documents
Packages System
White Paper
Download
Update
  . 3.x [RSS]
  . 2.x [RSS]
  . 1.3 [RSS]
  . 1.2 [RSS]
  . 1.1 [RSS]
  . 1.0 [RSS]
FAQ
Hardware
RoadMap
Gallery

  Go oops.org
  AnNyung banner 88x31

  AnNyung 1 banner 80x15
  AnNyung 2 banner 80x15
  AnNyung 3 banner 80x15
  AnNyung banner 80x15
  AnNyung banner 80x15



커널 보안버그 수정
Web Browser 로는 FTP 접속이 불가능 합니다.

문서번호 : 1106822707
업데이트 : 2005.01.27


상세내용

커널의 보안 버그가 발표되었습니다. 올해 발표된 uselib() 함수의 보안버그와
i386 SMP page fault handler privilege escalation 관련 버그는 안녕 리눅스의
커널에는 해당 사항이 없지만 해당 픽스 코드 역시 들어간 상태이며, 작년 11월
이후에 나온 Local DOS 공격에 대한 버그가 픽스 되었습니다.

CAN-2004-0565 Information leak on Linux/ia64
CAN-2004-0565 Information leak on Linux/ia64
CAN-2004-1017 io_edgeport driver overflows
CAN-2004-1016 CMSG validation checks
20041208 ip_options_get memory leak
CAN-2004-1137 IGMP flaws
CAN-2004-1144 x86-64 privilege escalation
CAN-2004-1234 kernel denial of service vulnerability and exploit
CAN-2004-1237 Kernel panic when stopping Lotus Domino 6.52
CAN-2004-1237 instant kernel panic from one line perl program - BAD
CAN-2004-1237 kernel oops captured, system hangs
CAN-2004-1237 kernel panic ( __audit_get_target)
CAN-2004-1237 kernel panic caused by auditd
LTC13264-Kernel errata from Dec 23 results in a DB2 shutdown.
CAN-2004-1237 kernel panic when Oracle agentctl is run
CAN-2004-1235 isec.pl uselib() privilege escalation
CAN-2005-0003 huge vma-in-executable bug


Autoupdate 지원 :
Packages system 이용
http://annyung.oops.org/?m=pkgadm&p=pkgkernel 참조

update 패키지

  RPMS :

    . kernel-2.4.22-5.i686.rpm
    . kernel-bigmem-2.4.22-5.i686.rpm
    . kernel-PIII-2.4.22-5.i686.rpm
    . kernel-PIV-2.4.22-5.i686.rpm
    . kernel-source-2.4.22-5.i386.rpm
    . kernel-header-2.4.22-5.i386.rpm


  SRPMS :

    . kernel-2.4.22-5.src.rpm

참고 :
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1016
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1017
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1234
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1335
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1235
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0003
http://marc.theaimsgroup.com/?m=109503896031720
http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt
http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt 



    



 Home > Update [ 1.1 ]

Copyright 2024 OOPS Development Organization 
LAST MODIFIED: 2018/04/10