Red Hat Enterprise Linux 6 and CentOS 6 to receive important kernel security update

Products marked by Red Hat security team as having a "significant" security implications, new Linux kernel security update for repairing memory corruption due to wrong socket cloning and NULL pointer dereference occurs ( CVE-2018-9568 ) ( 2019-11810-CVE ) in drivers / scsi / megaraid / megaraid_sas_base.c found, which could lead to a denial of service.

This update also fixes the influence of Red Hat Enterprise Linux 6 CentOS Linux Linux kernel performance on 6 system bug and two, that is, fragmented packet timeout issues and back-end TCP small buffer of follow-up. If you install a new operating system kernel version, you can correct these errors.

It urged users to update their systems immediately

If you are using Red Hat Enterprise Linux 6 or CentOS Linux 6 operating system family, we recommend 32-bit computer on the Linux kernel package updates to the kernel-2.6.32-754.22.1.el6.i686.rpm or 64 kernel-2.6.32-754.22.1.el6.x86_64.rpm bit on the computer. After installing the new version of the Linux kernel, remember to restart the system, so that all changes take effect.

Linux内核安全更新影响Red Hat Enterprise Linux Server 6(x86_64和i386),Red Hat Enterprise Linux Workstation 6(x86_64和i386),Red Hat Enterprise Linux Desktop 6(x86_64和i386),适用于IBM z Systems的Red Hat Enterprise Linux 6(s390x),Red Hat Enterprise Linux for Power,big endian 6(ppc64),Red Hat Enterprise Linux for Scientific Computing 6(x86_64)和CentOS Linux 6(x86_64和i386)。

 

Guess you like

Origin www.linuxidc.com/Linux/2019-09/160720.htm