FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Redhat > Enterprise Watch List

 
 
LinkBack Thread Tools
 
Old 11-03-2009, 06:54 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2009:1548-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1548.html
Issue date: 2009-11-03
CVE Names: CVE-2009-2695 CVE-2009-2908 CVE-2009-3228
CVE-2009-3286 CVE-2009-3547 CVE-2009-3613
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* a system with SELinux enforced was more permissive in allowing local
users in the unconfined_t domain to map low memory areas even if the
mmap_min_addr restriction was enabled. This could aid in the local
exploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)

* a NULL pointer dereference flaw was found in the eCryptfs implementation
in the Linux kernel. A local attacker could use this flaw to cause a local
denial of service or escalate their privileges. (CVE-2009-2908, Important)

* a flaw was found in the NFSv4 implementation. The kernel would do an
unnecessary permission check after creating a file. This check would
usually fail and leave the file with the permission bits set to random
values. Note: This is a server-side only issue. (CVE-2009-3286, Important)

* a NULL pointer dereference flaw was found in each of the following
functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
be released by other processes before it is used to update the pipe's
reader and writer counters. This could lead to a local denial of service or
privilege escalation. (CVE-2009-3547, Important)

* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
abuse this flaw by using jumbo frames for large amounts of network traffic.
(CVE-2009-3613, Important)

* missing initialization flaws were found in the Linux kernel. Padding data
in several core network structures was not initialized properly before
being sent to user-space. These flaws could lead to information leaks.
(CVE-2009-3228, Moderate)

Bug fixes:

* with network bonding in the "balance-tlb" or "balance-alb" mode, the
primary setting for the primary slave device was lost when said device was
brought down. Bringing the slave back up did not restore the primary
setting. (BZ#517971)

* some faulty serial device hardware caused systems running the kernel-xen
kernel to take a very long time to boot. (BZ#524153)

* a caching bug in nfs_readdir() may have caused NFS clients to see
duplicate files or not see all files in a directory. (BZ#526960)

* the RHSA-2009:1243 update removed the mpt_msi_enable option, preventing
certain scripts from running. This update adds the option back. (BZ#526963)

* an iptables rule with the recent module and a hit count value greater
than the ip_pkt_list_tot parameter (the default is 20), did not have any
effect over packets, as the hit count could not be reached. (BZ#527434)

* a check has been added to the IPv4 code to make sure that rt is not NULL,
to help prevent future bugs in functions that call ip_append_data() from
being exploitable. (BZ#527436)

* a kernel panic occurred in certain conditions after reconfiguring a tape
drive's block size. (BZ#528133)

* when using the Linux Virtual Server (LVS) in a master and backup
configuration, and propagating active connections on the master to the
backup, the connection timeout value on the backup was hard-coded to 180
seconds, meaning connection information on the backup was soon lost. This
could prevent the successful failover of connections. The timeout value
can now be set via "ipvsadm --set". (BZ#528645)

* a bug in nfs4_do_open_expired() could have caused the reclaimer thread on
an NFSv4 client to enter an infinite loop. (BZ#529162)

* MSI interrupts may not have been delivered for r8169 based network cards
that have MSI interrupts enabled. This bug only affected certain systems.
(BZ#529366)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

517830 - CVE-2009-2695 kernel: SELinux and mmap_min_addr
517971 - A bond's preferred primary setting is lost after bringing down and up of the primary slave. [rhel-5.4.z]
520990 - CVE-2009-3228 kernel: tc: uninitialised kernel memory leak
524153 - dom0 freeze during kernel startup [rhel-5.4.z]
524520 - CVE-2009-3286 kernel: O_EXCL creates on NFSv4 are broken
526960 - [NetApp 5.5 bug] nfs_readdir() may fail to return all the files in the directory [rhel-5.4.z]
526963 - [RFE] Re-enable "mpt_msi_enable" option in RHEL5 [rhel-5.4.z]
527434 - kernel: ipt_recent: sanity check hit count [rhel-5.4.z]
527436 - kernel: ipv4: make ip_append_data() handle NULL routing table [rhel-5.4.z]
527534 - CVE-2009-2908 kernel ecryptfs NULL pointer dereference
528133 - kernel panics from list corruption when using a tape drive connected through cciss adapter [rhel-5.4.z]
528645 - LVS master and backup director - Synchronised connections on backup director have unsuitable timeout value [rhel-5.4.z]
529137 - CVE-2009-3613 kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500
529162 - NFSv4 reclaimer thread in an infinite loop [rhel-5.4.z]
529366 - r8169 stopping all activity until the link is reset [rhel-5.4.z]
530490 - CVE-2009-3547 kernel: fs: pipe.c null pointer dereference

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-164.6.1.el5.src.rpm

i386:
kernel-2.6.18-164.6.1.el5.i686.rpm
kernel-PAE-2.6.18-164.6.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-164.6.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.6.1.el5.i686.rpm
kernel-debug-2.6.18-164.6.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-164.6.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.6.1.el5.i686.rpm
kernel-debuginfo-2.6.18-164.6.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-164.6.1.el5.i686.rpm
kernel-devel-2.6.18-164.6.1.el5.i686.rpm
kernel-headers-2.6.18-164.6.1.el5.i386.rpm
kernel-xen-2.6.18-164.6.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-164.6.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.6.1.el5.i686.rpm

noarch:
kernel-doc-2.6.18-164.6.1.el5.noarch.rpm

x86_64:
kernel-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-164.6.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.6.1.el5.x86_64.rpm
kernel-headers-2.6.18-164.6.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.6.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-164.6.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.6.1.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-164.6.1.el5.src.rpm

i386:
kernel-2.6.18-164.6.1.el5.i686.rpm
kernel-PAE-2.6.18-164.6.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-164.6.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.6.1.el5.i686.rpm
kernel-debug-2.6.18-164.6.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-164.6.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.6.1.el5.i686.rpm
kernel-debuginfo-2.6.18-164.6.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-164.6.1.el5.i686.rpm
kernel-devel-2.6.18-164.6.1.el5.i686.rpm
kernel-headers-2.6.18-164.6.1.el5.i386.rpm
kernel-xen-2.6.18-164.6.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-164.6.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.6.1.el5.i686.rpm

ia64:
kernel-2.6.18-164.6.1.el5.ia64.rpm
kernel-debug-2.6.18-164.6.1.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-164.6.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-164.6.1.el5.ia64.rpm
kernel-debuginfo-2.6.18-164.6.1.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-164.6.1.el5.ia64.rpm
kernel-devel-2.6.18-164.6.1.el5.ia64.rpm
kernel-headers-2.6.18-164.6.1.el5.ia64.rpm
kernel-xen-2.6.18-164.6.1.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-164.6.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-164.6.1.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-164.6.1.el5.noarch.rpm

ppc:
kernel-2.6.18-164.6.1.el5.ppc64.rpm
kernel-debug-2.6.18-164.6.1.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-164.6.1.el5.ppc64.rpm
kernel-debug-devel-2.6.18-164.6.1.el5.ppc64.rpm
kernel-debuginfo-2.6.18-164.6.1.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-164.6.1.el5.ppc64.rpm
kernel-devel-2.6.18-164.6.1.el5.ppc64.rpm
kernel-headers-2.6.18-164.6.1.el5.ppc.rpm
kernel-headers-2.6.18-164.6.1.el5.ppc64.rpm
kernel-kdump-2.6.18-164.6.1.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-164.6.1.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-164.6.1.el5.ppc64.rpm

s390x:
kernel-2.6.18-164.6.1.el5.s390x.rpm
kernel-debug-2.6.18-164.6.1.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-164.6.1.el5.s390x.rpm
kernel-debug-devel-2.6.18-164.6.1.el5.s390x.rpm
kernel-debuginfo-2.6.18-164.6.1.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-164.6.1.el5.s390x.rpm
kernel-devel-2.6.18-164.6.1.el5.s390x.rpm
kernel-headers-2.6.18-164.6.1.el5.s390x.rpm
kernel-kdump-2.6.18-164.6.1.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-164.6.1.el5.s390x.rpm
kernel-kdump-devel-2.6.18-164.6.1.el5.s390x.rpm

x86_64:
kernel-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-164.6.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-164.6.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.6.1.el5.x86_64.rpm
kernel-headers-2.6.18-164.6.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.6.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-164.6.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.6.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2695
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2908
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3613
http://www.redhat.com/security/updates/classification/#important
http://kbase.redhat.com/faq/docs/DOC-18042

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFK8IpWXlSAg2UNWIIRAorwAJ94I3XDKIjWTcPPmd6hz0 tpmGgGGACeOfy5
6YsSrDhfRfXghrgxCwLGySg=
=T+fA
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 11-03-2009, 09:21 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2009:1550-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1550.html
Issue date: 2009-11-03
CVE Names: CVE-2008-5029 CVE-2008-5300 CVE-2009-1337
CVE-2009-1385 CVE-2009-1895 CVE-2009-2848
CVE-2009-3002 CVE-2009-3547
================================================== ===================

1. Summary:

Updated kernel packages that fix several security issues and multiple bugs
are now available for Red Hat Enterprise Linux 3.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* when fput() was called to close a socket, the __scm_destroy() function in
the Linux kernel could make indirect recursive calls to itself. This could,
potentially, lead to a denial of service issue. (CVE-2008-5029, Important)

* the sendmsg() function in the Linux kernel did not block during UNIX
socket garbage collection. This could, potentially, lead to a local denial
of service. (CVE-2008-5300, Important)

* the exit_notify() function in the Linux kernel did not properly reset the
exit signal if a process executed a set user ID (setuid) application before
exiting. This could allow a local, unprivileged user to elevate their
privileges. (CVE-2009-1337, Important)

* a flaw was found in the Intel PRO/1000 network driver in the Linux
kernel. Frames with sizes near the MTU of an interface may be split across
multiple hardware receive descriptors. Receipt of such a frame could leak
through a validation check, leading to a corruption of the length check. A
remote attacker could use this flaw to send a specially-crafted packet that
would cause a denial of service or code execution. (CVE-2009-1385,
Important)

* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a
setuid or setgid program was executed. A local, unprivileged user could use
this flaw to bypass the mmap_min_addr protection mechanism and perform a
NULL pointer dereference attack, or bypass the Address Space Layout
Randomization (ASLR) security feature. (CVE-2009-1895, Important)

* it was discovered that, when executing a new process, the clear_child_tid
pointer in the Linux kernel is not cleared. If this pointer points to a
writable portion of the memory of the new program, the kernel could corrupt
four bytes of memory, possibly leading to a local denial of service or
privilege escalation. (CVE-2009-2848, Important)

* missing initialization flaws were found in getname() implementations in
the IrDA sockets, AppleTalk DDP protocol, NET/ROM protocol, and ROSE
protocol implementations in the Linux kernel. Certain data structures in
these getname() implementations were not initialized properly before being
copied to user-space. These flaws could lead to an information leak.
(CVE-2009-3002, Important)

* a NULL pointer dereference flaw was found in each of the following
functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
be released by other processes before it is used to update the pipe's
reader and writer counters. This could lead to a local denial of service or
privilege escalation. (CVE-2009-3547, Important)

Bug fixes:

* this update adds the mmap_min_addr tunable and restriction checks to help
prevent unprivileged users from creating new memory mappings below the
minimum address. This can help prevent the exploitation of NULL pointer
dereference bugs. Note that mmap_min_addr is set to zero (disabled) by
default for backwards compatibility. (BZ#512642)

* a bridge reference count problem in IPv6 has been fixed. (BZ#457010)

* enforce null-termination of user-supplied arguments to setsockopt().
(BZ#505514)

* the gcc flag "-fno-delete-null-pointer-checks" was added to the kernel
build options. This prevents gcc from optimizing out NULL pointer checks
after the first use of a pointer. NULL pointer bugs are often exploited by
attackers. Keeping these checks is a safety measure. (BZ#511185)

* a check has been added to the IPv4 code to make sure that rt is not NULL,
to help prevent future bugs in functions that call ip_append_data() from
being exploitable. (BZ#520300)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

457010 - ipv6: use timer pending to fix bridge reference count problem [rhel-3.9]
470201 - CVE-2008-5029 kernel: Unix sockets kernel panic
473259 - CVE-2008-5300 kernel: fix soft lockups/OOM issues with unix socket garbage collector
493771 - CVE-2009-1337 kernel: exit_notify: kill the wrong capable(CAP_KILL) check
502981 - CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
505514 - kernel: ensure devname passed to SO_BINDTODEVICE is NULL-terminated [rhel-3]
511171 - CVE-2009-1895 kernel: personality: fix PER_CLEAR_ON_SETID
511185 - kernel: build with -fno-delete-null-pointer-checks [rhel-3]
512642 - kernel: security: implement mmap_min_addr infrastructure [rhel-3]
515423 - CVE-2009-2848 kernel: execve: must clear current->clear_child_tid
519305 - CVE-2009-3001, CVE-2009-3002 kernel: numerous getname() infoleaks
520300 - kernel: ipv4: make ip_append_data() handle NULL routing table [rhel-3]
530490 - CVE-2009-3547 kernel: fs: pipe.c null pointer dereference

6. Package List:

Red Hat Enterprise Linux AS version 3:

Source:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-63.EL.src.rpm

i386:
kernel-2.4.21-63.EL.athlon.rpm
kernel-2.4.21-63.EL.i686.rpm
kernel-BOOT-2.4.21-63.EL.i386.rpm
kernel-debuginfo-2.4.21-63.EL.athlon.rpm
kernel-debuginfo-2.4.21-63.EL.i386.rpm
kernel-debuginfo-2.4.21-63.EL.i686.rpm
kernel-doc-2.4.21-63.EL.i386.rpm
kernel-hugemem-2.4.21-63.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-63.EL.i686.rpm
kernel-smp-2.4.21-63.EL.athlon.rpm
kernel-smp-2.4.21-63.EL.i686.rpm
kernel-smp-unsupported-2.4.21-63.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-63.EL.i686.rpm
kernel-source-2.4.21-63.EL.i386.rpm
kernel-unsupported-2.4.21-63.EL.athlon.rpm
kernel-unsupported-2.4.21-63.EL.i686.rpm

ia64:
kernel-2.4.21-63.EL.ia64.rpm
kernel-debuginfo-2.4.21-63.EL.ia64.rpm
kernel-doc-2.4.21-63.EL.ia64.rpm
kernel-source-2.4.21-63.EL.ia64.rpm
kernel-unsupported-2.4.21-63.EL.ia64.rpm

ppc:
kernel-2.4.21-63.EL.ppc64iseries.rpm
kernel-2.4.21-63.EL.ppc64pseries.rpm
kernel-debuginfo-2.4.21-63.EL.ppc64.rpm
kernel-debuginfo-2.4.21-63.EL.ppc64iseries.rpm
kernel-debuginfo-2.4.21-63.EL.ppc64pseries.rpm
kernel-doc-2.4.21-63.EL.ppc64.rpm
kernel-source-2.4.21-63.EL.ppc64.rpm
kernel-unsupported-2.4.21-63.EL.ppc64iseries.rpm
kernel-unsupported-2.4.21-63.EL.ppc64pseries.rpm

s390:
kernel-2.4.21-63.EL.s390.rpm
kernel-debuginfo-2.4.21-63.EL.s390.rpm
kernel-doc-2.4.21-63.EL.s390.rpm
kernel-source-2.4.21-63.EL.s390.rpm
kernel-unsupported-2.4.21-63.EL.s390.rpm

s390x:
kernel-2.4.21-63.EL.s390x.rpm
kernel-debuginfo-2.4.21-63.EL.s390x.rpm
kernel-doc-2.4.21-63.EL.s390x.rpm
kernel-source-2.4.21-63.EL.s390x.rpm
kernel-unsupported-2.4.21-63.EL.s390x.rpm

x86_64:
kernel-2.4.21-63.EL.ia32e.rpm
kernel-2.4.21-63.EL.x86_64.rpm
kernel-debuginfo-2.4.21-63.EL.ia32e.rpm
kernel-debuginfo-2.4.21-63.EL.x86_64.rpm
kernel-doc-2.4.21-63.EL.x86_64.rpm
kernel-smp-2.4.21-63.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-63.EL.x86_64.rpm
kernel-source-2.4.21-63.EL.x86_64.rpm
kernel-unsupported-2.4.21-63.EL.ia32e.rpm
kernel-unsupported-2.4.21-63.EL.x86_64.rpm

Red Hat Desktop version 3:

Source:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-63.EL.src.rpm

i386:
kernel-2.4.21-63.EL.athlon.rpm
kernel-2.4.21-63.EL.i686.rpm
kernel-BOOT-2.4.21-63.EL.i386.rpm
kernel-debuginfo-2.4.21-63.EL.athlon.rpm
kernel-debuginfo-2.4.21-63.EL.i386.rpm
kernel-debuginfo-2.4.21-63.EL.i686.rpm
kernel-doc-2.4.21-63.EL.i386.rpm
kernel-hugemem-2.4.21-63.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-63.EL.i686.rpm
kernel-smp-2.4.21-63.EL.athlon.rpm
kernel-smp-2.4.21-63.EL.i686.rpm
kernel-smp-unsupported-2.4.21-63.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-63.EL.i686.rpm
kernel-source-2.4.21-63.EL.i386.rpm
kernel-unsupported-2.4.21-63.EL.athlon.rpm
kernel-unsupported-2.4.21-63.EL.i686.rpm

x86_64:
kernel-2.4.21-63.EL.ia32e.rpm
kernel-2.4.21-63.EL.x86_64.rpm
kernel-debuginfo-2.4.21-63.EL.ia32e.rpm
kernel-debuginfo-2.4.21-63.EL.x86_64.rpm
kernel-doc-2.4.21-63.EL.x86_64.rpm
kernel-smp-2.4.21-63.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-63.EL.x86_64.rpm
kernel-source-2.4.21-63.EL.x86_64.rpm
kernel-unsupported-2.4.21-63.EL.ia32e.rpm
kernel-unsupported-2.4.21-63.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

Source:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-63.EL.src.rpm

i386:
kernel-2.4.21-63.EL.athlon.rpm
kernel-2.4.21-63.EL.i686.rpm
kernel-BOOT-2.4.21-63.EL.i386.rpm
kernel-debuginfo-2.4.21-63.EL.athlon.rpm
kernel-debuginfo-2.4.21-63.EL.i386.rpm
kernel-debuginfo-2.4.21-63.EL.i686.rpm
kernel-doc-2.4.21-63.EL.i386.rpm
kernel-hugemem-2.4.21-63.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-63.EL.i686.rpm
kernel-smp-2.4.21-63.EL.athlon.rpm
kernel-smp-2.4.21-63.EL.i686.rpm
kernel-smp-unsupported-2.4.21-63.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-63.EL.i686.rpm
kernel-source-2.4.21-63.EL.i386.rpm
kernel-unsupported-2.4.21-63.EL.athlon.rpm
kernel-unsupported-2.4.21-63.EL.i686.rpm

ia64:
kernel-2.4.21-63.EL.ia64.rpm
kernel-debuginfo-2.4.21-63.EL.ia64.rpm
kernel-doc-2.4.21-63.EL.ia64.rpm
kernel-source-2.4.21-63.EL.ia64.rpm
kernel-unsupported-2.4.21-63.EL.ia64.rpm

x86_64:
kernel-2.4.21-63.EL.ia32e.rpm
kernel-2.4.21-63.EL.x86_64.rpm
kernel-debuginfo-2.4.21-63.EL.ia32e.rpm
kernel-debuginfo-2.4.21-63.EL.x86_64.rpm
kernel-doc-2.4.21-63.EL.x86_64.rpm
kernel-smp-2.4.21-63.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-63.EL.x86_64.rpm
kernel-source-2.4.21-63.EL.x86_64.rpm
kernel-unsupported-2.4.21-63.EL.ia32e.rpm
kernel-unsupported-2.4.21-63.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

Source:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-63.EL.src.rpm

i386:
kernel-2.4.21-63.EL.athlon.rpm
kernel-2.4.21-63.EL.i686.rpm
kernel-BOOT-2.4.21-63.EL.i386.rpm
kernel-debuginfo-2.4.21-63.EL.athlon.rpm
kernel-debuginfo-2.4.21-63.EL.i386.rpm
kernel-debuginfo-2.4.21-63.EL.i686.rpm
kernel-doc-2.4.21-63.EL.i386.rpm
kernel-hugemem-2.4.21-63.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-63.EL.i686.rpm
kernel-smp-2.4.21-63.EL.athlon.rpm
kernel-smp-2.4.21-63.EL.i686.rpm
kernel-smp-unsupported-2.4.21-63.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-63.EL.i686.rpm
kernel-source-2.4.21-63.EL.i386.rpm
kernel-unsupported-2.4.21-63.EL.athlon.rpm
kernel-unsupported-2.4.21-63.EL.i686.rpm

ia64:
kernel-2.4.21-63.EL.ia64.rpm
kernel-debuginfo-2.4.21-63.EL.ia64.rpm
kernel-doc-2.4.21-63.EL.ia64.rpm
kernel-source-2.4.21-63.EL.ia64.rpm
kernel-unsupported-2.4.21-63.EL.ia64.rpm

x86_64:
kernel-2.4.21-63.EL.ia32e.rpm
kernel-2.4.21-63.EL.x86_64.rpm
kernel-debuginfo-2.4.21-63.EL.ia32e.rpm
kernel-debuginfo-2.4.21-63.EL.x86_64.rpm
kernel-doc-2.4.21-63.EL.x86_64.rpm
kernel-smp-2.4.21-63.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-63.EL.x86_64.rpm
kernel-source-2.4.21-63.EL.x86_64.rpm
kernel-unsupported-2.4.21-63.EL.ia32e.rpm
kernel-unsupported-2.4.21-63.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5300
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3002
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547
http://www.redhat.com/security/updates/classification/#important
http://kbase.redhat.com/faq/docs/DOC-17866

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFK8KzSXlSAg2UNWIIRArWtAJ92slWmSRS3oiyIP72ioK 2CImFXuQCfQd/v
xKcJ+uoh5n3q0tv76k8JjhU=
=opMk
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 11-17-2009, 02:30 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2009:1587-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1587.html
Issue date: 2009-11-17
CVE Names: CVE-2009-2695 CVE-2009-3547
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and various bugs
are now available for Red Hat Enterprise Linux 5.3 Extended Update Support.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5.3.z server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a system with SELinux enforced was more permissive in allowing local
users in the unconfined_t domain to map low memory areas even if the
mmap_min_addr restriction was enabled. This could aid in the local
exploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)

* a NULL pointer dereference flaw was found in each of the following
functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
be released by other processes before it is used to update the pipe's
reader and writer counters. This could lead to a local denial of service or
privilege escalation. (CVE-2009-3547, Important)

This update also fixes the following bugs:

* a caching bug in nfs_readdir() has been resolved. This may have caused
parts of directory listings to become stale, as they came from cached data
when they should not have, possibly causing NFS clients to see duplicate
files or not see all files in a directory. (BZ#526959)

* a bug prevented the pciehp driver from detecting PCI Express hot plug
slots on some systems. (BZ#530381)

* when a process attempted to read from a page that had first been accessed
by writing to part of it (via write(2)), the NFS client needed to flush the
modified portion of the page out to the server, and then read the entire
page back in. This flush caused performance issues. (BZ#521243)

* a deadlock was found in the cciss driver. In rare cases, this caused an
NMI lockup during boot. Messages such as "cciss: controller cciss[x]
failed, stopping." and "cciss[x]: controller not responding." may have been
displayed on the console. (BZ#525728)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

517830 - CVE-2009-2695 kernel: SELinux and mmap_min_addr
521243 - Read/Write NFS I/O performance degraded by FLUSH_STABLE page flushing [rhel-5.3.z]
525728 - cciss: spinlock deadlock causes NMI on HP systems [rhel-5.3.z]
526959 - [NetApp 5.5 bug] nfs_readdir() may fail to return all the files in the directory [rhel-5.3.z]
530381 - [5.3] PCIe hotplug slot detection failure [rhel-5.3.z]
530490 - CVE-2009-3547 kernel: fs: pipe.c null pointer dereference

6. Package List:

Red Hat Enterprise Linux (v. 5.3.z server):

Source:
kernel-2.6.18-128.11.1.el5.src.rpm

i386:
kernel-2.6.18-128.11.1.el5.i686.rpm
kernel-PAE-2.6.18-128.11.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-128.11.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-128.11.1.el5.i686.rpm
kernel-debug-2.6.18-128.11.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-128.11.1.el5.i686.rpm
kernel-debug-devel-2.6.18-128.11.1.el5.i686.rpm
kernel-debuginfo-2.6.18-128.11.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-128.11.1.el5.i686.rpm
kernel-devel-2.6.18-128.11.1.el5.i686.rpm
kernel-headers-2.6.18-128.11.1.el5.i386.rpm
kernel-xen-2.6.18-128.11.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-128.11.1.el5.i686.rpm
kernel-xen-devel-2.6.18-128.11.1.el5.i686.rpm

ia64:
kernel-2.6.18-128.11.1.el5.ia64.rpm
kernel-debug-2.6.18-128.11.1.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-128.11.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-128.11.1.el5.ia64.rpm
kernel-debuginfo-2.6.18-128.11.1.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-128.11.1.el5.ia64.rpm
kernel-devel-2.6.18-128.11.1.el5.ia64.rpm
kernel-headers-2.6.18-128.11.1.el5.ia64.rpm
kernel-xen-2.6.18-128.11.1.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-128.11.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-128.11.1.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-128.11.1.el5.noarch.rpm

ppc:
kernel-2.6.18-128.11.1.el5.ppc64.rpm
kernel-debug-2.6.18-128.11.1.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-128.11.1.el5.ppc64.rpm
kernel-debug-devel-2.6.18-128.11.1.el5.ppc64.rpm
kernel-debuginfo-2.6.18-128.11.1.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-128.11.1.el5.ppc64.rpm
kernel-devel-2.6.18-128.11.1.el5.ppc64.rpm
kernel-headers-2.6.18-128.11.1.el5.ppc.rpm
kernel-headers-2.6.18-128.11.1.el5.ppc64.rpm
kernel-kdump-2.6.18-128.11.1.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-128.11.1.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-128.11.1.el5.ppc64.rpm

s390x:
kernel-2.6.18-128.11.1.el5.s390x.rpm
kernel-debug-2.6.18-128.11.1.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-128.11.1.el5.s390x.rpm
kernel-debug-devel-2.6.18-128.11.1.el5.s390x.rpm
kernel-debuginfo-2.6.18-128.11.1.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-128.11.1.el5.s390x.rpm
kernel-devel-2.6.18-128.11.1.el5.s390x.rpm
kernel-headers-2.6.18-128.11.1.el5.s390x.rpm
kernel-kdump-2.6.18-128.11.1.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-128.11.1.el5.s390x.rpm
kernel-kdump-devel-2.6.18-128.11.1.el5.s390x.rpm

x86_64:
kernel-2.6.18-128.11.1.el5.x86_64.rpm
kernel-debug-2.6.18-128.11.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-128.11.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-128.11.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-128.11.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-128.11.1.el5.x86_64.rpm
kernel-devel-2.6.18-128.11.1.el5.x86_64.rpm
kernel-headers-2.6.18-128.11.1.el5.x86_64.rpm
kernel-xen-2.6.18-128.11.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-128.11.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-128.11.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2695
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547
http://www.redhat.com/security/updates/classification/#important
http://kbase.redhat.com/faq/docs/DOC-18042
http://kbase.redhat.com/faq/docs/DOC-20481

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLAsF1XlSAg2UNWIIRAn+QAJ9q1QgWep6/0FTG7iUtndIobPJ4JQCfQc5Y
w5sHJL3QjRPyUPl6yzMMs08=
=EUzh
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 12-15-2009, 04:39 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2009:1670-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1670.html
Issue date: 2009-12-15
CVE Names: CVE-2009-3612 CVE-2009-3620 CVE-2009-3621
CVE-2009-3726
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* NULL pointer dereference flaws in the r128 driver. Checks to test if the
Concurrent Command Engine state was initialized were missing in private
IOCTL functions. An attacker could use these flaws to cause a local denial
of service or escalate their privileges. (CVE-2009-3620, Important)

* a NULL pointer dereference flaw in the NFSv4 implementation. Several
NFSv4 file locking functions failed to check whether a file had been opened
on the server before performing locking operations on it. A local user on a
system with an NFSv4 share mounted could possibly use this flaw to cause a
denial of service or escalate their privileges. (CVE-2009-3726, Important)

* a flaw in tcf_fill_node(). A certain data structure in this function was
not initialized properly before being copied to user-space. This could lead
to an information leak. (CVE-2009-3612, Moderate)

* unix_stream_connect() did not check if a UNIX domain socket was in the
shutdown state. This could lead to a deadlock. A local, unprivileged user
could use this flaw to cause a denial of service. (CVE-2009-3621, Moderate)

Knowledgebase DOC-20536 has steps to mitigate NULL pointer dereference
flaws.

Bug fixes:

* frequently changing a CPU between online and offline caused a kernel
panic on some systems. (BZ#545583)

* for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent
could receive incorrect data, preventing correct data transfer. (BZ#529308)

* pciehp could not detect PCI Express hot plug slots on some systems.
(BZ#530383)

* soft lockups: inotify race and contention on dcache_lock. (BZ#533822,
BZ#537019)

* priority ordered lists are now used for threads waiting for a given
mutex. (BZ#533858)

* a deadlock in DLM could cause GFS2 file systems to lock up. (BZ#533859)

* use-after-free bug in the audit subsystem crashed certain systems when
running usermod. (BZ#533861)

* on certain hardware configurations, a kernel panic when the Broadcom
iSCSI offload driver (bnx2i.ko and cnic.ko) was loaded. (BZ#537014)

* qla2xxx: Enabled MSI-X, and correctly handle the module parameter to
control it. This improves performance for certain systems. (BZ#537020)

* system crash when reading the cpuaffinity file on a system. (BZ#537346)

* suspend-resume problems on systems with lots of logical CPUs, e.g. BX-EX.
(BZ#539674)

* off-by-one error in the legacy PCI bus check. (BZ#539675)

* TSC was not made available on systems with multi-clustered APICs. This
could cause slow performance for time-sensitive applications. (BZ#539676)

* ACPI: ARB_DISABLE now disabled on platforms that do not need it.
(BZ#539677)

* fix node to core and power-aware scheduling issues, and a kernel panic
during boot on certain AMD Opteron processors. (BZ#539678, BZ#540469,
BZ#539680, BZ#539682)

* APIC timer interrupt issues on some AMD Opteron systems prevented
achieving full power savings. (BZ#539681)

* general OProfile support for some newer Intel processors. (BZ#539683)

* system crash during boot when NUMA is enabled on systems using MC and
kernel-xen. (BZ#539684)

* on some larger systems, performance issues due to a spinlock. (BZ#539685)

* APIC errors when IOMMU is enabled on some AMD Opteron systems.
(BZ#539687)

* on some AMD Opteron systems, repeatedly taking a CPU offline then online
caused a system hang. (BZ#539688)

* I/O page fault errors on some systems. (BZ#539689)

* certain memory configurations could cause the kernel-xen kernel to fail
to boot on some AMD Opteron systems. (BZ#539690)

* NMI watchdog is now disabled for offline CPUs. (BZ#539691)

* duplicate directories in /proc/acpi/processor/ on BX-EX systems.
(BZ#539692)

* links did not come up when using bnx2x with certain Broadcom devices.
(BZ#540381)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

528868 - CVE-2009-3612 kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7
529227 - CVE-2009-3726 kernel: nfsv4: kernel panic in nfs4_proc_lock()
529308 - [5.4]The errata 28 fix on LSI53C1030 hasn't been included yet. [rhel-5.4.z]
529597 - CVE-2009-3620 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised
529626 - CVE-2009-3621 kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket
530383 - [5.3] PCIe hotplug slot detection failure [rhel-5.4.z]
533822 - CRM 1908390 - BUG: warning at fs/inotify.c:181/set_dentry_child_flags() [rhel-5.4.z]
533858 - threads on pthread_mutex_lock wake in fifo order, but posix specifies by priority [rhel-5.4.z]
533859 - dlm_recv deadlock under memory pressure while processing GFP_KERNEL locks. [rhel-5.4.z]
533861 - system crashes in audit_update_watch() [rhel-5.4.z]
537014 - Panic on boot when loading iscsid with broadcom NIC [rhel-5.4.z]
537019 - kernel: BUG: soft lockup with dcache_lock [rhel-5.4.z]
537020 - [QLogic 5.4.z bug] qla2xxx - enable MSI-X and correct/cleanup irq request code [rhel-5.4.z]
537346 - kernel: NULL pointer dereference in pci_bus_show_cpuaffinity() [rhel-5.4.z]
539675 - [Intel 5.5 FEAT] Add ability to access Nehalem uncore config space [rhel-5.4.z]
539676 - [Intel 5.5 FEAT] Support Intel multi-APIC-cluster systems [rhel-5.4.z]
539677 - [Intel 5.5 FEAT] ACPI: Disable ARB_DISABLE on platforms where it is not needed [rhel-5.4.z]
539678 - Fix node to core association [rhel-5.4.z]
539680 - Fix Power-aware scheduling [rhel-5.4.z]
539681 - Fix AMD erratum - server C1E [rhel-5.4.z]
539682 - Fix kernel panic while booting RHEL5 32-bit kernel [rhel-5.4.z]
539683 - [Intel 5.5 FEAT] Oprofile: Add support for arch perfmon - kernel component [rhel-5.4.z]
539684 - EXPERIMENTAL EX/MC: Fix Xen NUMA [rhel-5.4.z]
539685 - [Intel 5.5 FEAT] Fix spinlock issue which causes performance impact on large systems [rhel-5.4.z]
539687 - EXPERIMENTAL MC/EX: Fix APIC error IOMMU issues [rhel-5.4.z]
539688 - EXPERIMENTAL MC/EX: Issue when bringing CPU offline and online with 32-bit kernel [rhel-5.4.z]
539689 - EXPERIMENTAL EX/MC: AMD IOMMU Linux driver with latest BIOS has IO PAGE FAULTS [rhel-5.4.z]
539690 - EXPERIMENTAL MC/EX: Incorrect memory setup can cause Xen crash [rhel-5.4.z]
539691 - [Intel 5.5 BUG] NMI and Watchdog are not disabled on CPU when CPU is off-lined [rhel-5.4.z]
540381 - Broadcom Everest Dual port 10Gb with SFP+ (57711) NIC fails with no link [rhel-5.4.z]
540469 - EXPERIMENTAL EX/MC: Fix node to core issue [rhel-5.4.z]
545583 - kernel panic when doing cpu offline/online frequently on hp-dl785g5-01.rhts.eng.bos.redhat.com [rhel-5.4.z]

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-164.9.1.el5.src.rpm

i386:
kernel-2.6.18-164.9.1.el5.i686.rpm
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-164.9.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm
kernel-debug-2.6.18-164.9.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-164.9.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm
kernel-debuginfo-2.6.18-164.9.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-164.9.1.el5.i686.rpm
kernel-devel-2.6.18-164.9.1.el5.i686.rpm
kernel-headers-2.6.18-164.9.1.el5.i386.rpm
kernel-xen-2.6.18-164.9.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-164.9.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm

noarch:
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm

x86_64:
kernel-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-164.9.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-164.9.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-164.9.1.el5.src.rpm

i386:
kernel-2.6.18-164.9.1.el5.i686.rpm
kernel-PAE-2.6.18-164.9.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-164.9.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.9.1.el5.i686.rpm
kernel-debug-2.6.18-164.9.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-164.9.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.9.1.el5.i686.rpm
kernel-debuginfo-2.6.18-164.9.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-164.9.1.el5.i686.rpm
kernel-devel-2.6.18-164.9.1.el5.i686.rpm
kernel-headers-2.6.18-164.9.1.el5.i386.rpm
kernel-xen-2.6.18-164.9.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-164.9.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.9.1.el5.i686.rpm

ia64:
kernel-2.6.18-164.9.1.el5.ia64.rpm
kernel-debug-2.6.18-164.9.1.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-164.9.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-164.9.1.el5.ia64.rpm
kernel-debuginfo-2.6.18-164.9.1.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-164.9.1.el5.ia64.rpm
kernel-devel-2.6.18-164.9.1.el5.ia64.rpm
kernel-headers-2.6.18-164.9.1.el5.ia64.rpm
kernel-xen-2.6.18-164.9.1.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-164.9.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-164.9.1.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-164.9.1.el5.noarch.rpm

ppc:
kernel-2.6.18-164.9.1.el5.ppc64.rpm
kernel-debug-2.6.18-164.9.1.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-164.9.1.el5.ppc64.rpm
kernel-debug-devel-2.6.18-164.9.1.el5.ppc64.rpm
kernel-debuginfo-2.6.18-164.9.1.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-164.9.1.el5.ppc64.rpm
kernel-devel-2.6.18-164.9.1.el5.ppc64.rpm
kernel-headers-2.6.18-164.9.1.el5.ppc.rpm
kernel-headers-2.6.18-164.9.1.el5.ppc64.rpm
kernel-kdump-2.6.18-164.9.1.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-164.9.1.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-164.9.1.el5.ppc64.rpm

s390x:
kernel-2.6.18-164.9.1.el5.s390x.rpm
kernel-debug-2.6.18-164.9.1.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-164.9.1.el5.s390x.rpm
kernel-debug-devel-2.6.18-164.9.1.el5.s390x.rpm
kernel-debuginfo-2.6.18-164.9.1.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-164.9.1.el5.s390x.rpm
kernel-devel-2.6.18-164.9.1.el5.s390x.rpm
kernel-headers-2.6.18-164.9.1.el5.s390x.rpm
kernel-kdump-2.6.18-164.9.1.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-164.9.1.el5.s390x.rpm
kernel-kdump-devel-2.6.18-164.9.1.el5.s390x.rpm

x86_64:
kernel-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-164.9.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-164.9.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.9.1.el5.x86_64.rpm
kernel-headers-2.6.18-164.9.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.9.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-164.9.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.9.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-3612.html
https://www.redhat.com/security/data/cve/CVE-2009-3620.html
https://www.redhat.com/security/data/cve/CVE-2009-3621.html
https://www.redhat.com/security/data/cve/CVE-2009-3726.html
http://www.redhat.com/security/updates/classification/#important
http://kbase.redhat.com/faq/docs/DOC-20536

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLJ8maXlSAg2UNWIIRAspdAJ9snL9coMoBs6EsIPtbeG SFN1rkVwCfZoZ4
GF10zDJTMEN78Yztkoy4UAU=
=vFYn
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 12-15-2009, 04:39 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2009:1671-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1671.html
Issue date: 2009-12-15
CVE Names: CVE-2009-2910 CVE-2009-3613 CVE-2009-3620
CVE-2009-3621
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
trigger this flaw by using jumbo frames for large amounts of network
traffic. (CVE-2009-3613, Important)

* NULL pointer dereference flaws were found in the r128 driver in the Linux
kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)

* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)

* the unix_stream_connect() function in the Linux kernel did not check if a
UNIX domain socket was in the shutdown state. This could lead to a
deadlock. A local, unprivileged user could use this flaw to cause a denial
of service. (CVE-2009-3621, Moderate)

This update also fixes the following bugs:

* an iptables rule with the recent module and a hit count value greater
than the ip_pkt_list_tot parameter (the default is 20), did not have any
effect over packets, as the hit count could not be reached. (BZ#529306)

* in environments that use dual-controller storage devices with the cciss
driver, Device-Mapper Multipath maps could not be detected and configured,
due to the cciss driver not exporting the bus attribute via sysfs. This
attribute is now exported. (BZ#529309)

* the kernel crashed with a divide error when a certain joystick was
attached. (BZ#532027)

* a bug in the mptctl_do_mpt_command() function in the mpt driver may have
resulted in crashes during boot on i386 systems with certain adapters using
the mpt driver, and also running the hugemem kernel. (BZ#533798)

* on certain hardware, the igb driver was unable to detect link statuses
correctly. This may have caused problems for network bonding, such as
failover not occurring. (BZ#534105)

* the RHSA-2009:1024 update introduced a regression. After updating to Red
Hat Enterprise Linux 4.8 and rebooting, network links often failed to be
brought up for interfaces using the forcedeth driver. "no link during
initialization" messages may have been logged. (BZ#534112)

* the RHSA-2009:1024 update introduced a second regression. On certain
systems, PS/2 keyboards failed to work. (BZ#537344)

* a bug in checksum offload calculations could have crashed the bnx2x
firmware when the iptable_nat module was loaded, causing network traffic
to stop. (BZ#537013)

* a check has been added to the IPv4 code to make sure that the routing
table data structure, rt, is not NULL, to help prevent future bugs in
functions that call ip_append_data() from being exploitable. (BZ#537016)

* possible kernel pointer dereferences on systems with several NFS mounts
(a mixture of "-o lock" and "-o nolock"), which in rare cases may have
caused a system crash, have been resolved. (BZ#537017)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

526788 - CVE-2009-2910 kernel: x86_64 32 bit process register leak
529137 - CVE-2009-3613 kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500
529306 - kernel: ipt_recent: sanity check hit count [rhel-4.9] [rhel-4.8.z]
529309 - CCISS device-mapper-multipath support: missing sysfs attributes [rhel-4.8.z]
529597 - CVE-2009-3620 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised
529626 - CVE-2009-3621 kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket
532027 - kernel hid-input.c divide error crash [rhel-4.8.z]
533798 - [Cisco/LSI 4.8.z bug] mptctl module dereferences a userspace address, triggering a crash [rhel-4.8.z]
534105 - EL4.8: igb driver fails to detect link status change on SERDES interface [rhel-4.8.z]
534112 - Upgrade from RHEL4U7 to U8 fails to bring up networking with forcedeth driver. [simple patch] [rhel-4.8.z]
537013 - bnx2x fails when iptables is on [rhel-4.8.z]
537016 - kernel: ipv4: make ip_append_data() handle NULL routing table [rhel-4.8.z]
537017 - NLM: Fix Oops in nlmclnt_mark_reclaim() [rhel-4.8.z]
537344 - RHEL4.8 regression: PS/2 keyboard doesn't work on PRIMERGY TX120S1 [rhel-4.8.z]

6. Package List:

Red Hat Enterprise Linux AS version 4:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-89.0.18.EL.src.rpm

i386:
kernel-2.6.9-89.0.18.EL.i686.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.i686.rpm
kernel-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-hugemem-2.6.9-89.0.18.EL.i686.rpm
kernel-hugemem-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-smp-2.6.9-89.0.18.EL.i686.rpm
kernel-smp-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-xenU-2.6.9-89.0.18.EL.i686.rpm
kernel-xenU-devel-2.6.9-89.0.18.EL.i686.rpm

ia64:
kernel-2.6.9-89.0.18.EL.ia64.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.ia64.rpm
kernel-devel-2.6.9-89.0.18.EL.ia64.rpm
kernel-largesmp-2.6.9-89.0.18.EL.ia64.rpm
kernel-largesmp-devel-2.6.9-89.0.18.EL.ia64.rpm

noarch:
kernel-doc-2.6.9-89.0.18.EL.noarch.rpm

ppc:
kernel-2.6.9-89.0.18.EL.ppc64.rpm
kernel-2.6.9-89.0.18.EL.ppc64iseries.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.ppc64.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.ppc64iseries.rpm
kernel-devel-2.6.9-89.0.18.EL.ppc64.rpm
kernel-devel-2.6.9-89.0.18.EL.ppc64iseries.rpm
kernel-largesmp-2.6.9-89.0.18.EL.ppc64.rpm
kernel-largesmp-devel-2.6.9-89.0.18.EL.ppc64.rpm

s390:
kernel-2.6.9-89.0.18.EL.s390.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.s390.rpm
kernel-devel-2.6.9-89.0.18.EL.s390.rpm

s390x:
kernel-2.6.9-89.0.18.EL.s390x.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.s390x.rpm
kernel-devel-2.6.9-89.0.18.EL.s390x.rpm

x86_64:
kernel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.x86_64.rpm
kernel-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-largesmp-2.6.9-89.0.18.EL.x86_64.rpm
kernel-largesmp-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-smp-2.6.9-89.0.18.EL.x86_64.rpm
kernel-smp-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-xenU-2.6.9-89.0.18.EL.x86_64.rpm
kernel-xenU-devel-2.6.9-89.0.18.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-89.0.18.EL.src.rpm

i386:
kernel-2.6.9-89.0.18.EL.i686.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.i686.rpm
kernel-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-hugemem-2.6.9-89.0.18.EL.i686.rpm
kernel-hugemem-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-smp-2.6.9-89.0.18.EL.i686.rpm
kernel-smp-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-xenU-2.6.9-89.0.18.EL.i686.rpm
kernel-xenU-devel-2.6.9-89.0.18.EL.i686.rpm

noarch:
kernel-doc-2.6.9-89.0.18.EL.noarch.rpm

x86_64:
kernel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.x86_64.rpm
kernel-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-largesmp-2.6.9-89.0.18.EL.x86_64.rpm
kernel-largesmp-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-smp-2.6.9-89.0.18.EL.x86_64.rpm
kernel-smp-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-xenU-2.6.9-89.0.18.EL.x86_64.rpm
kernel-xenU-devel-2.6.9-89.0.18.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-89.0.18.EL.src.rpm

i386:
kernel-2.6.9-89.0.18.EL.i686.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.i686.rpm
kernel-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-hugemem-2.6.9-89.0.18.EL.i686.rpm
kernel-hugemem-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-smp-2.6.9-89.0.18.EL.i686.rpm
kernel-smp-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-xenU-2.6.9-89.0.18.EL.i686.rpm
kernel-xenU-devel-2.6.9-89.0.18.EL.i686.rpm

ia64:
kernel-2.6.9-89.0.18.EL.ia64.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.ia64.rpm
kernel-devel-2.6.9-89.0.18.EL.ia64.rpm
kernel-largesmp-2.6.9-89.0.18.EL.ia64.rpm
kernel-largesmp-devel-2.6.9-89.0.18.EL.ia64.rpm

noarch:
kernel-doc-2.6.9-89.0.18.EL.noarch.rpm

x86_64:
kernel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.x86_64.rpm
kernel-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-largesmp-2.6.9-89.0.18.EL.x86_64.rpm
kernel-largesmp-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-smp-2.6.9-89.0.18.EL.x86_64.rpm
kernel-smp-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-xenU-2.6.9-89.0.18.EL.x86_64.rpm
kernel-xenU-devel-2.6.9-89.0.18.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-89.0.18.EL.src.rpm

i386:
kernel-2.6.9-89.0.18.EL.i686.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.i686.rpm
kernel-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-hugemem-2.6.9-89.0.18.EL.i686.rpm
kernel-hugemem-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-smp-2.6.9-89.0.18.EL.i686.rpm
kernel-smp-devel-2.6.9-89.0.18.EL.i686.rpm
kernel-xenU-2.6.9-89.0.18.EL.i686.rpm
kernel-xenU-devel-2.6.9-89.0.18.EL.i686.rpm

ia64:
kernel-2.6.9-89.0.18.EL.ia64.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.ia64.rpm
kernel-devel-2.6.9-89.0.18.EL.ia64.rpm
kernel-largesmp-2.6.9-89.0.18.EL.ia64.rpm
kernel-largesmp-devel-2.6.9-89.0.18.EL.ia64.rpm

noarch:
kernel-doc-2.6.9-89.0.18.EL.noarch.rpm

x86_64:
kernel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-debuginfo-2.6.9-89.0.18.EL.x86_64.rpm
kernel-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-largesmp-2.6.9-89.0.18.EL.x86_64.rpm
kernel-largesmp-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-smp-2.6.9-89.0.18.EL.x86_64.rpm
kernel-smp-devel-2.6.9-89.0.18.EL.x86_64.rpm
kernel-xenU-2.6.9-89.0.18.EL.x86_64.rpm
kernel-xenU-devel-2.6.9-89.0.18.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-2910.html
https://www.redhat.com/security/data/cve/CVE-2009-3613.html
https://www.redhat.com/security/data/cve/CVE-2009-3620.html
https://www.redhat.com/security/data/cve/CVE-2009-3621.html
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLJ8m7XlSAg2UNWIIRAsWJAJ4mEMYJQj0Ip6III9iOvj X2Sy8IUwCfQn4X
Fcu+dr6IYIeh7sWonyPng2A=
=Sw46
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 12-15-2009, 04:39 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2009:1672-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1672.html
Issue date: 2009-12-15
CVE Names: CVE-2009-2695 CVE-2009-3547
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and one bug are
now available for Red Hat Enterprise Linux 5.2 Extended Update Support.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5.2.z server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a system with SELinux enforced was more permissive in allowing local
users in the unconfined_t domain to map low memory areas even if the
mmap_min_addr restriction was enabled. This could aid in the local
exploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)

* a NULL pointer dereference flaw was found in each of the following
functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
be released by other processes before it is used to update the pipe's
reader and writer counters. This could lead to a local denial of service or
privilege escalation. (CVE-2009-3547, Important)

This update also fixes the following bug:

* a bug in the IPv6 implementation in the Linux kernel could have caused an
unbalanced reference count. When using network bonding, this bug may have
caused a hang when shutting the system down via "shutdown -h", or prevented
the network service from being stopped via "service network stop".
(BZ#538409)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

517830 - CVE-2009-2695 kernel: SELinux and mmap_min_addr
530490 - CVE-2009-3547 kernel: fs: pipe.c null pointer dereference
538409 - Unbalance reference count in ndisc_recv_ns [rhel-5.2.z]

6. Package List:

Red Hat Enterprise Linux (v. 5.2.z server):

Source:
kernel-2.6.18-92.1.32.el5.src.rpm

i386:
kernel-2.6.18-92.1.32.el5.i686.rpm
kernel-PAE-2.6.18-92.1.32.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-92.1.32.el5.i686.rpm
kernel-PAE-devel-2.6.18-92.1.32.el5.i686.rpm
kernel-debug-2.6.18-92.1.32.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-92.1.32.el5.i686.rpm
kernel-debug-devel-2.6.18-92.1.32.el5.i686.rpm
kernel-debuginfo-2.6.18-92.1.32.el5.i686.rpm
kernel-debuginfo-common-2.6.18-92.1.32.el5.i686.rpm
kernel-devel-2.6.18-92.1.32.el5.i686.rpm
kernel-headers-2.6.18-92.1.32.el5.i386.rpm
kernel-xen-2.6.18-92.1.32.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-92.1.32.el5.i686.rpm
kernel-xen-devel-2.6.18-92.1.32.el5.i686.rpm

ia64:
kernel-2.6.18-92.1.32.el5.ia64.rpm
kernel-debug-2.6.18-92.1.32.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-92.1.32.el5.ia64.rpm
kernel-debug-devel-2.6.18-92.1.32.el5.ia64.rpm
kernel-debuginfo-2.6.18-92.1.32.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-92.1.32.el5.ia64.rpm
kernel-devel-2.6.18-92.1.32.el5.ia64.rpm
kernel-headers-2.6.18-92.1.32.el5.ia64.rpm
kernel-xen-2.6.18-92.1.32.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-92.1.32.el5.ia64.rpm
kernel-xen-devel-2.6.18-92.1.32.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-92.1.32.el5.noarch.rpm

ppc:
kernel-2.6.18-92.1.32.el5.ppc64.rpm
kernel-debug-2.6.18-92.1.32.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-92.1.32.el5.ppc64.rpm
kernel-debug-devel-2.6.18-92.1.32.el5.ppc64.rpm
kernel-debuginfo-2.6.18-92.1.32.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-92.1.32.el5.ppc64.rpm
kernel-devel-2.6.18-92.1.32.el5.ppc64.rpm
kernel-headers-2.6.18-92.1.32.el5.ppc.rpm
kernel-headers-2.6.18-92.1.32.el5.ppc64.rpm
kernel-kdump-2.6.18-92.1.32.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-92.1.32.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-92.1.32.el5.ppc64.rpm

s390x:
kernel-2.6.18-92.1.32.el5.s390x.rpm
kernel-debug-2.6.18-92.1.32.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-92.1.32.el5.s390x.rpm
kernel-debug-devel-2.6.18-92.1.32.el5.s390x.rpm
kernel-debuginfo-2.6.18-92.1.32.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-92.1.32.el5.s390x.rpm
kernel-devel-2.6.18-92.1.32.el5.s390x.rpm
kernel-headers-2.6.18-92.1.32.el5.s390x.rpm
kernel-kdump-2.6.18-92.1.32.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-92.1.32.el5.s390x.rpm
kernel-kdump-devel-2.6.18-92.1.32.el5.s390x.rpm

x86_64:
kernel-2.6.18-92.1.32.el5.x86_64.rpm
kernel-debug-2.6.18-92.1.32.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-92.1.32.el5.x86_64.rpm
kernel-debug-devel-2.6.18-92.1.32.el5.x86_64.rpm
kernel-debuginfo-2.6.18-92.1.32.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-92.1.32.el5.x86_64.rpm
kernel-devel-2.6.18-92.1.32.el5.x86_64.rpm
kernel-headers-2.6.18-92.1.32.el5.x86_64.rpm
kernel-xen-2.6.18-92.1.32.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-92.1.32.el5.x86_64.rpm
kernel-xen-devel-2.6.18-92.1.32.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-2695.html
https://www.redhat.com/security/data/cve/CVE-2009-3547.html
http://www.redhat.com/security/updates/classification/#important
http://kbase.redhat.com/faq/docs/DOC-20481
http://kbase.redhat.com/faq/docs/DOC-18042

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLJ8nSXlSAg2UNWIIRAuGnAJ9efdo7qm9BIyy6BShaIu L/xM/gYQCgmi+Q
lJzYPF4hmKplmx4ibhEhB4Y=
=Q//E
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 01-19-2010, 10:41 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2010:0046-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0046.html
Issue date: 2010-01-19
CVE Names: CVE-2006-6304 CVE-2009-2910 CVE-2009-3080
CVE-2009-3556 CVE-2009-3889 CVE-2009-3939
CVE-2009-4020 CVE-2009-4021 CVE-2009-4138
CVE-2009-4141 CVE-2009-4272
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* an array index error was found in the gdth driver. A local user could
send a specially-crafted IOCTL request that would cause a denial of service
or, possibly, privilege escalation. (CVE-2009-3080, Important)

* a flaw was found in the FUSE implementation. When a system is low on
memory, fuse_put_request() could dereference an invalid pointer, possibly
leading to a local denial of service or privilege escalation.
(CVE-2009-4021, Important)

* Tavis Ormandy discovered a deficiency in the fasync_helper()
implementation. This could allow a local, unprivileged user to leverage a
use-after-free of locked, asynchronous file descriptors to cause a denial
of service or privilege escalation. (CVE-2009-4141, Important)

* the Parallels Virtuozzo Containers team reported the RHSA-2009:1243
update introduced two flaws in the routing implementation. If an attacker
was able to cause a large enough number of collisions in the routing hash
table (via specially-crafted packets) for the emergency route flush to
trigger, a deadlock could occur. Secondly, if the kernel routing cache was
disabled, an uninitialized pointer would be left behind after a route
lookup, leading to a kernel panic. (CVE-2009-4272, Important)

* the RHSA-2009:0225 update introduced a rewrite attack flaw in the
do_coredump() function. A local attacker able to guess the file name a
process is going to dump its core to, prior to the process crashing, could
use this flaw to append data to the dumped core file. This issue only
affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the
default value is 0). (CVE-2006-6304, Moderate)

The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable
set to 2, the core file will not be recorded if the file already exists.
For example, core files will not be overwritten on subsequent crashes of
processes whose core files map to the same name.

* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)

* the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV)
support in the qla2xxx driver, resulting in two new sysfs pseudo files,
"/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete".
These two files were world-writable by default, allowing a local user to
change SCSI host attributes. This flaw only affects systems using the
qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate)

* permission issues were found in the megaraid_sas driver. The "dbg_lvl"
and "poll_mode_io" files on the sysfs file system ("/sys/") had
world-writable permissions. This could allow local, unprivileged users to
change the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate)

* a NULL pointer dereference flaw was found in the firewire-ohci driver
used for OHCI compliant IEEE 1394 controllers. A local, unprivileged user
with access to /dev/fw* files could issue certain IOCTL calls, causing a
denial of service or privilege escalation. The FireWire modules are
blacklisted by default, and if enabled, only root has access to the files
noted above by default. (CVE-2009-4138, Moderate)

* a buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS file system implementation. This could lead to a denial of service if a
user browsed a specially-crafted HFS file system, for example, by running
"ls". (CVE-2009-4020, Low)

Bug fix documentation for this update will be available shortly from
www.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/
index.html

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

526068 - CVE-2009-3889 CVE-2009-3939 kernel: megaraid_sas permissions in sysfs
526788 - CVE-2009-2910 kernel: x86_64 32 bit process register leak
537027 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour [rhel-5.4.z]
537177 - CVE-2009-3556 kernel: qla2xxx NPIV vport management pseudofiles are world writable
537273 - CVE-2006-6304 kernel: use flag in do_coredump()
538734 - CVE-2009-4021 kernel: fuse: prevent fuse_put_request on invalid pointer
539414 - CVE-2009-3080 kernel: gdth: Prevent negative offsets in ioctl
539686 - bnx2: panic in bnx2_poll_work() [rhel-5.4.z]
540736 - CVE-2009-4020 kernel: hfs buffer overflow
540896 - PV clock fix throws off database application time [rhel-5.4.z]
542582 - kdump corefile cannot be backtraced in IA64 [rhel-5.4.z]
543448 - Using IPoIB, losing connectivity with 1 host, other hosts accessible [rhel-5.4.z]
544978 - glock_workqueue -- glock ref count via gfs2_glock_hold [rhel-5.4.z]
545411 - CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock
547236 - CVE-2009-4138 kernel: firewire: ohci: handle receive packets with a data length of zero
547521 - CRM#1971672, Data loss in GFS2 when multiple nodes writes to same file [rhel-5.4.z]
547530 - kernel: BUG: soft lockup - CPU#1 stuck for 13s! [httpd:4490] [rhel-5.4.z]
547906 - CVE-2009-4141 kernel: create_elf_tables can leave urandom in a bad state
548370 - kernel: sleeping vfs_check_frozen in called in atomic context from do_wp_page [rhel-5.4.z]
549905 - hvm, x86_64 guest panic on 2.6.18-164.9.1.el5 [rhel-5.4.z]
549906 - [NetApp 5.4.z bug] Emulex FC ports on RHEL 5.4 GA offlined during target controller faults [rhel-5.4.z]
549907 - Hang when echoing to /proc/sys/net/ipv4/route/secret_interval [rhel-5.4.z]
549908 - resize2fs online resize hangs [rhel-5.4.z]
550968 - RHEL5.4 guest with PV clock: inconsistent times returned by clock_gettime(CLOCK_REALTIME) and gettimeofday() [rhel-5.4.z]

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-164.11.1.el5.src.rpm

i386:
kernel-2.6.18-164.11.1.el5.i686.rpm
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-164.11.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm
kernel-debug-2.6.18-164.11.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-164.11.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm
kernel-debuginfo-2.6.18-164.11.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-164.11.1.el5.i686.rpm
kernel-devel-2.6.18-164.11.1.el5.i686.rpm
kernel-headers-2.6.18-164.11.1.el5.i386.rpm
kernel-xen-2.6.18-164.11.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-164.11.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm

noarch:
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm

x86_64:
kernel-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-164.11.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-164.11.1.el5.src.rpm

i386:
kernel-2.6.18-164.11.1.el5.i686.rpm
kernel-PAE-2.6.18-164.11.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-164.11.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm
kernel-debug-2.6.18-164.11.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-164.11.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm
kernel-debuginfo-2.6.18-164.11.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-164.11.1.el5.i686.rpm
kernel-devel-2.6.18-164.11.1.el5.i686.rpm
kernel-headers-2.6.18-164.11.1.el5.i386.rpm
kernel-xen-2.6.18-164.11.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-164.11.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm

ia64:
kernel-2.6.18-164.11.1.el5.ia64.rpm
kernel-debug-2.6.18-164.11.1.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-164.11.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-164.11.1.el5.ia64.rpm
kernel-debuginfo-2.6.18-164.11.1.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-164.11.1.el5.ia64.rpm
kernel-devel-2.6.18-164.11.1.el5.ia64.rpm
kernel-headers-2.6.18-164.11.1.el5.ia64.rpm
kernel-xen-2.6.18-164.11.1.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-164.11.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-164.11.1.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-164.11.1.el5.noarch.rpm

ppc:
kernel-2.6.18-164.11.1.el5.ppc64.rpm
kernel-debug-2.6.18-164.11.1.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-164.11.1.el5.ppc64.rpm
kernel-debug-devel-2.6.18-164.11.1.el5.ppc64.rpm
kernel-debuginfo-2.6.18-164.11.1.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-164.11.1.el5.ppc64.rpm
kernel-devel-2.6.18-164.11.1.el5.ppc64.rpm
kernel-headers-2.6.18-164.11.1.el5.ppc.rpm
kernel-headers-2.6.18-164.11.1.el5.ppc64.rpm
kernel-kdump-2.6.18-164.11.1.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-164.11.1.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-164.11.1.el5.ppc64.rpm

s390x:
kernel-2.6.18-164.11.1.el5.s390x.rpm
kernel-debug-2.6.18-164.11.1.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-164.11.1.el5.s390x.rpm
kernel-debug-devel-2.6.18-164.11.1.el5.s390x.rpm
kernel-debuginfo-2.6.18-164.11.1.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-164.11.1.el5.s390x.rpm
kernel-devel-2.6.18-164.11.1.el5.s390x.rpm
kernel-headers-2.6.18-164.11.1.el5.s390x.rpm
kernel-kdump-2.6.18-164.11.1.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-164.11.1.el5.s390x.rpm
kernel-kdump-devel-2.6.18-164.11.1.el5.s390x.rpm

x86_64:
kernel-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-164.11.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm
kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2006-6304.html
https://www.redhat.com/security/data/cve/CVE-2009-2910.html
https://www.redhat.com/security/data/cve/CVE-2009-3080.html
https://www.redhat.com/security/data/cve/CVE-2009-3556.html
https://www.redhat.com/security/data/cve/CVE-2009-3889.html
https://www.redhat.com/security/data/cve/CVE-2009-3939.html
https://www.redhat.com/security/data/cve/CVE-2009-4020.html
https://www.redhat.com/security/data/cve/CVE-2009-4021.html
https://www.redhat.com/security/data/cve/CVE-2009-4138.html
https://www.redhat.com/security/data/cve/CVE-2009-4141.html
https://www.redhat.com/security/data/cve/CVE-2009-4272.html
http://www.redhat.com/security/updates/classification/#important
http://kbase.redhat.com/faq/docs/DOC-20536

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLVkMOXlSAg2UNWIIRAv9fAJ4srKWUnIYD49CS8bSbxa fK8Jpk1gCeNk+y
KdAhEJk1P2KotTF5p4bw7ys=
=j+JL
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 01-19-2010, 11:16 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2010:0053-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0053.html
Issue date: 2010-01-19
CVE Names: CVE-2007-4567 CVE-2009-4536 CVE-2009-4537
CVE-2009-4538
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and two bugs are
now available for Red Hat Enterprise Linux 5.3 Extended Update Support.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5.3.z server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a flaw was found in the IPv6 Extension Header (EH) handling
implementation in the Linux kernel. The skb->dst data structure was not
properly validated in the ipv6_hop_jumbo() function. This could possibly
lead to a remote denial of service. (CVE-2007-4567, Important)

* a flaw was found in each of the following Intel PRO/1000 Linux
drivers in the Linux kernel: e1000 and e1000e. A remote attacker using
packets larger than the MTU could bypass the existing fragment check,
resulting in partial, invalid frames being passed to the network stack.
These flaws could also possibly be used to trigger a remote denial of
service. (CVE-2009-4536, CVE-2009-4538, Important)

* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. Receiving overly-long frames with a certain revision of the network
cards supported by this driver could possibly result in a remote denial of
service. (CVE-2009-4537, Important)

This update also fixes the following bugs:

* on certain hardware, the igb driver was unable to detect link statuses
correctly for Serializer-Deserializer (SERDES) interface Ethernet ports.
This may have caused problems for network interface bonding, such as
failover not occurring. (BZ#548023)

* in certain situations, kdump occasionally dumped a vmcore file with no
registers on Intel Itanium systems that were under high disk I/O load. In
these cases, this prevented the kernel stack backtrace in the vmcore from
being viewed with the crash utility. (BZ#542581)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

542581 - kdump corefile cannot be backtraced in IA64 [rhel-5.3.z]
548023 - EL5.3: igb driver fails to detect link status change on SERDES interface [rhel-5.3.z]
548641 - CVE-2007-4567 kernel: ipv6_hop_jumbo remote system crash
550907 - CVE-2009-4537 kernel: r8169 issue reported at 26c3
551214 - CVE-2009-4538 kernel: e1000e frame fragment issue
552126 - CVE-2009-4536 kernel: e1000 issue reported at 26c3

6. Package List:

Red Hat Enterprise Linux (v. 5.3.z server):

Source:
kernel-2.6.18-128.12.1.el5.src.rpm

i386:
kernel-2.6.18-128.12.1.el5.i686.rpm
kernel-PAE-2.6.18-128.12.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-128.12.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-128.12.1.el5.i686.rpm
kernel-debug-2.6.18-128.12.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-128.12.1.el5.i686.rpm
kernel-debug-devel-2.6.18-128.12.1.el5.i686.rpm
kernel-debuginfo-2.6.18-128.12.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-128.12.1.el5.i686.rpm
kernel-devel-2.6.18-128.12.1.el5.i686.rpm
kernel-headers-2.6.18-128.12.1.el5.i386.rpm
kernel-xen-2.6.18-128.12.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-128.12.1.el5.i686.rpm
kernel-xen-devel-2.6.18-128.12.1.el5.i686.rpm

ia64:
kernel-2.6.18-128.12.1.el5.ia64.rpm
kernel-debug-2.6.18-128.12.1.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-128.12.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-128.12.1.el5.ia64.rpm
kernel-debuginfo-2.6.18-128.12.1.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-128.12.1.el5.ia64.rpm
kernel-devel-2.6.18-128.12.1.el5.ia64.rpm
kernel-headers-2.6.18-128.12.1.el5.ia64.rpm
kernel-xen-2.6.18-128.12.1.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-128.12.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-128.12.1.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-128.12.1.el5.noarch.rpm

ppc:
kernel-2.6.18-128.12.1.el5.ppc64.rpm
kernel-debug-2.6.18-128.12.1.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-128.12.1.el5.ppc64.rpm
kernel-debug-devel-2.6.18-128.12.1.el5.ppc64.rpm
kernel-debuginfo-2.6.18-128.12.1.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-128.12.1.el5.ppc64.rpm
kernel-devel-2.6.18-128.12.1.el5.ppc64.rpm
kernel-headers-2.6.18-128.12.1.el5.ppc.rpm
kernel-headers-2.6.18-128.12.1.el5.ppc64.rpm
kernel-kdump-2.6.18-128.12.1.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-128.12.1.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-128.12.1.el5.ppc64.rpm

s390x:
kernel-2.6.18-128.12.1.el5.s390x.rpm
kernel-debug-2.6.18-128.12.1.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-128.12.1.el5.s390x.rpm
kernel-debug-devel-2.6.18-128.12.1.el5.s390x.rpm
kernel-debuginfo-2.6.18-128.12.1.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-128.12.1.el5.s390x.rpm
kernel-devel-2.6.18-128.12.1.el5.s390x.rpm
kernel-headers-2.6.18-128.12.1.el5.s390x.rpm
kernel-kdump-2.6.18-128.12.1.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-128.12.1.el5.s390x.rpm
kernel-kdump-devel-2.6.18-128.12.1.el5.s390x.rpm

x86_64:
kernel-2.6.18-128.12.1.el5.x86_64.rpm
kernel-debug-2.6.18-128.12.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-128.12.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-128.12.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-128.12.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-128.12.1.el5.x86_64.rpm
kernel-devel-2.6.18-128.12.1.el5.x86_64.rpm
kernel-headers-2.6.18-128.12.1.el5.x86_64.rpm
kernel-xen-2.6.18-128.12.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-128.12.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-128.12.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2007-4567.html
https://www.redhat.com/security/data/cve/CVE-2009-4536.html
https://www.redhat.com/security/data/cve/CVE-2009-4537.html
https://www.redhat.com/security/data/cve/CVE-2009-4538.html
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLVktGXlSAg2UNWIIRArSKAKCTtzyMIPJBUYR8IiLkgv DoOBv+VACfZ6dp
5Epmo8QFKo60Vw0BVVdhqMg=
=V7Hl
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 02-02-2010, 07:44 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2010:0076-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0076.html
Issue date: 2010-02-02
CVE Names: CVE-2009-3080 CVE-2009-3889 CVE-2009-3939
CVE-2009-4005 CVE-2009-4020
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and three bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* an array index error was found in the gdth driver in the Linux kernel. A
local user could send a specially-crafted IOCTL request that would cause a
denial of service or, possibly, privilege escalation. (CVE-2009-3080,
Important)

* a flaw was found in the collect_rx_frame() function in the HiSax ISDN
driver (hfc_usb) in the Linux kernel. An attacker could use this flaw to
send a specially-crafted HDLC packet that could trigger a buffer out of
bounds, possibly resulting in a denial of service. (CVE-2009-4005,
Important)

* permission issues were found in the megaraid_sas driver (for SAS based
RAID controllers) in the Linux kernel. The "dbg_lvl" and "poll_mode_io"
files on the sysfs file system ("/sys/") had world-writable permissions.
This could allow local, unprivileged users to change the behavior of the
driver. (CVE-2009-3889, CVE-2009-3939, Moderate)

* a buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS file system implementation in the Linux kernel. This could lead to a
denial of service if a user browsed a specially-crafted HFS file system,
for example, by running "ls". (CVE-2009-4020, Low)

This update also fixes the following bugs:

* if a process was using ptrace() to trace a multi-threaded process, and
that multi-threaded process dumped its core, the process performing the
trace could hang in wait4(). This issue could be triggered by running
"strace -f" on a multi-threaded process that was dumping its core,
resulting in the strace command hanging. (BZ#555869)

* a bug in the ptrace() implementation could have, in some cases, caused
ptrace_detach() to create a zombie process if the process being traced
was terminated with a SIGKILL signal. (BZ#555869)

* the RHSA-2010:0020 update resolved an issue (CVE-2009-4537) in the
Realtek r8169 Ethernet driver. This update implements a better solution for
that issue. Note: This is not a security regression. The original fix was
complete. This update is adding the official upstream fix. (BZ#556406)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

526068 - CVE-2009-3889 CVE-2009-3939 kernel: megaraid_sas permissions in sysfs
539414 - CVE-2009-3080 kernel: gdth: Prevent negative offsets in ioctl
539435 - CVE-2009-4005 kernel: isdn: hfc_usb: fix read buffer overflow
540736 - CVE-2009-4020 kernel: hfs buffer overflow
555869 - [4.7] wait4 blocks on non-existing pid [rhel-4.8.z]
556406 - kernel: r8169: straighten out overlength frame detection (improved) [rhel-4.9] [rhel-4.8.z]

6. Package List:

Red Hat Enterprise Linux AS version 4:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-89.0.20.EL.src.rpm

i386:
kernel-2.6.9-89.0.20.EL.i686.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.i686.rpm
kernel-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-hugemem-2.6.9-89.0.20.EL.i686.rpm
kernel-hugemem-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-smp-2.6.9-89.0.20.EL.i686.rpm
kernel-smp-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-xenU-2.6.9-89.0.20.EL.i686.rpm
kernel-xenU-devel-2.6.9-89.0.20.EL.i686.rpm

ia64:
kernel-2.6.9-89.0.20.EL.ia64.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.ia64.rpm
kernel-devel-2.6.9-89.0.20.EL.ia64.rpm
kernel-largesmp-2.6.9-89.0.20.EL.ia64.rpm
kernel-largesmp-devel-2.6.9-89.0.20.EL.ia64.rpm

noarch:
kernel-doc-2.6.9-89.0.20.EL.noarch.rpm

ppc:
kernel-2.6.9-89.0.20.EL.ppc64.rpm
kernel-2.6.9-89.0.20.EL.ppc64iseries.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.ppc64.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.ppc64iseries.rpm
kernel-devel-2.6.9-89.0.20.EL.ppc64.rpm
kernel-devel-2.6.9-89.0.20.EL.ppc64iseries.rpm
kernel-largesmp-2.6.9-89.0.20.EL.ppc64.rpm
kernel-largesmp-devel-2.6.9-89.0.20.EL.ppc64.rpm

s390:
kernel-2.6.9-89.0.20.EL.s390.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.s390.rpm
kernel-devel-2.6.9-89.0.20.EL.s390.rpm

s390x:
kernel-2.6.9-89.0.20.EL.s390x.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.s390x.rpm
kernel-devel-2.6.9-89.0.20.EL.s390x.rpm

x86_64:
kernel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.x86_64.rpm
kernel-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-largesmp-2.6.9-89.0.20.EL.x86_64.rpm
kernel-largesmp-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-smp-2.6.9-89.0.20.EL.x86_64.rpm
kernel-smp-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-xenU-2.6.9-89.0.20.EL.x86_64.rpm
kernel-xenU-devel-2.6.9-89.0.20.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-89.0.20.EL.src.rpm

i386:
kernel-2.6.9-89.0.20.EL.i686.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.i686.rpm
kernel-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-hugemem-2.6.9-89.0.20.EL.i686.rpm
kernel-hugemem-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-smp-2.6.9-89.0.20.EL.i686.rpm
kernel-smp-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-xenU-2.6.9-89.0.20.EL.i686.rpm
kernel-xenU-devel-2.6.9-89.0.20.EL.i686.rpm

noarch:
kernel-doc-2.6.9-89.0.20.EL.noarch.rpm

x86_64:
kernel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.x86_64.rpm
kernel-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-largesmp-2.6.9-89.0.20.EL.x86_64.rpm
kernel-largesmp-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-smp-2.6.9-89.0.20.EL.x86_64.rpm
kernel-smp-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-xenU-2.6.9-89.0.20.EL.x86_64.rpm
kernel-xenU-devel-2.6.9-89.0.20.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-89.0.20.EL.src.rpm

i386:
kernel-2.6.9-89.0.20.EL.i686.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.i686.rpm
kernel-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-hugemem-2.6.9-89.0.20.EL.i686.rpm
kernel-hugemem-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-smp-2.6.9-89.0.20.EL.i686.rpm
kernel-smp-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-xenU-2.6.9-89.0.20.EL.i686.rpm
kernel-xenU-devel-2.6.9-89.0.20.EL.i686.rpm

ia64:
kernel-2.6.9-89.0.20.EL.ia64.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.ia64.rpm
kernel-devel-2.6.9-89.0.20.EL.ia64.rpm
kernel-largesmp-2.6.9-89.0.20.EL.ia64.rpm
kernel-largesmp-devel-2.6.9-89.0.20.EL.ia64.rpm

noarch:
kernel-doc-2.6.9-89.0.20.EL.noarch.rpm

x86_64:
kernel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.x86_64.rpm
kernel-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-largesmp-2.6.9-89.0.20.EL.x86_64.rpm
kernel-largesmp-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-smp-2.6.9-89.0.20.EL.x86_64.rpm
kernel-smp-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-xenU-2.6.9-89.0.20.EL.x86_64.rpm
kernel-xenU-devel-2.6.9-89.0.20.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-89.0.20.EL.src.rpm

i386:
kernel-2.6.9-89.0.20.EL.i686.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.i686.rpm
kernel-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-hugemem-2.6.9-89.0.20.EL.i686.rpm
kernel-hugemem-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-smp-2.6.9-89.0.20.EL.i686.rpm
kernel-smp-devel-2.6.9-89.0.20.EL.i686.rpm
kernel-xenU-2.6.9-89.0.20.EL.i686.rpm
kernel-xenU-devel-2.6.9-89.0.20.EL.i686.rpm

ia64:
kernel-2.6.9-89.0.20.EL.ia64.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.ia64.rpm
kernel-devel-2.6.9-89.0.20.EL.ia64.rpm
kernel-largesmp-2.6.9-89.0.20.EL.ia64.rpm
kernel-largesmp-devel-2.6.9-89.0.20.EL.ia64.rpm

noarch:
kernel-doc-2.6.9-89.0.20.EL.noarch.rpm

x86_64:
kernel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-debuginfo-2.6.9-89.0.20.EL.x86_64.rpm
kernel-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-largesmp-2.6.9-89.0.20.EL.x86_64.rpm
kernel-largesmp-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-smp-2.6.9-89.0.20.EL.x86_64.rpm
kernel-smp-devel-2.6.9-89.0.20.EL.x86_64.rpm
kernel-xenU-2.6.9-89.0.20.EL.x86_64.rpm
kernel-xenU-devel-2.6.9-89.0.20.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-3080.html
https://www.redhat.com/security/data/cve/CVE-2009-3889.html
https://www.redhat.com/security/data/cve/CVE-2009-3939.html
https://www.redhat.com/security/data/cve/CVE-2009-4005.html
https://www.redhat.com/security/data/cve/CVE-2009-4020.html
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLaI5xXlSAg2UNWIIRApx1AJ9JkeyBnigrm4x+Iqab/AudXflzKACdFgYF
qwKc3jZBKrpF4g50ZePMaXc=
=zBXZ
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 02-02-2010, 08:04 PM
 
Default Important: kernel security and bug fix update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

================================================== ===================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2010:0079-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0079.html
Issue date: 2010-02-02
CVE Names: CVE-2007-4567 CVE-2007-5966 CVE-2009-0778
CVE-2009-0834 CVE-2009-1385 CVE-2009-1895
CVE-2009-4536 CVE-2009-4537 CVE-2009-4538
================================================== ===================

1. Summary:

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.2 Extended Update Support.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5.2.z server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a flaw was found in the IPv6 Extension Header (EH) handling
implementation in the Linux kernel. The skb->dst data structure was not
properly validated in the ipv6_hop_jumbo() function. This could possibly
lead to a remote denial of service. (CVE-2007-4567, Important)

* the possibility of a timeout value overflow was found in the Linux kernel
high-resolution timers functionality, hrtimers. This could allow a local,
unprivileged user to execute arbitrary code, or cause a denial of service
(kernel panic). (CVE-2007-5966, Important)

* memory leaks were found on some error paths in the icmp_send()
function in the Linux kernel. This could, potentially, cause the network
connectivity to cease. (CVE-2009-0778, Important)

* a deficiency was found in the Linux kernel system call auditing
implementation on 64-bit systems. This could allow a local, unprivileged
user to circumvent a system call audit configuration, if that configuration
filtered based on the "syscall" number or arguments. (CVE-2009-0834,
Important)

* a flaw was found in the Intel PRO/1000 Linux driver (e1000) in the Linux
kernel. Frames with sizes near the MTU of an interface may be split across
multiple hardware receive descriptors. Receipt of such a frame could leak
through a validation check, leading to a corruption of the length check. A
remote attacker could use this flaw to send a specially-crafted packet that
would cause a denial of service or code execution. (CVE-2009-1385,
Important)

* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a
setuid or setgid program was executed. A local, unprivileged user could use
this flaw to bypass the mmap_min_addr protection mechanism and perform a
NULL pointer dereference attack, or bypass the Address Space Layout
Randomization (ASLR) security feature. (CVE-2009-1895, Important)

* a flaw was found in each of the following Intel PRO/1000 Linux drivers in
the Linux kernel: e1000 and e1000e. A remote attacker using packets larger
than the MTU could bypass the existing fragment check, resulting in
partial, invalid frames being passed to the network stack. These flaws
could also possibly be used to trigger a remote denial of service.
(CVE-2009-4536, CVE-2009-4538, Important)

* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. Receiving overly-long frames with a certain revision of the network
cards supported by this driver could possibly result in a remote denial of
service. (CVE-2009-4537, Important)

Note: This update also fixes several bugs. Documentation for these bug
fixes will be available shortly from
www.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/
index.html

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

453135 - CVE-2007-5966 kernel: non-root can trigger cpu_idle soft lockup
485163 - CVE-2009-0778 kernel: rt_cache leak leads to lack of network connectivity
487990 - CVE-2009-0834 kernel: x86-64: syscall-audit: 32/64 syscall hole
502981 - CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
511171 - CVE-2009-1895 kernel: personality: fix PER_CLEAR_ON_SETID
524179 - Frequent path failures during I/O on DM multipath devices [rhel-5.2.z]
546226 - RHEL5.2/3 - setpgid() returns ESRCH in some situations [rhel-5.2.z]
546227 - [5.3] clock_gettime() syscall returns a smaller timespec value than previous. [rhel-5.2.z]
546228 - [5.3] The nanosleep() syscall sleeps one second longer. [rhel-5.2.z]
546229 - [RHEL 5] gen_estimator deadlock fix [rhel-5.2.z]
546230 - softlockups due to infinite loops in posix_locks_deadlock [rhel-5.2.z]
546231 - crm #1896100 port epoll_wait fix from RHSA-2008-0665 to RHEL 5 [rhel-5.2.z]
546232 - NFS problem#3 of IT 106473 - 32-bit jiffy wrap around - NFS inode [rhel-5.2.z]
546233 - [RHEL5.2] nfs_getattr() hangs during heavy write workloads [rhel-5.2.z]
546234 - Deadlock in flush_workqueue() results in hung nfs clients [rhel-5.2.z]
546236 - Kernel panic in auth_rpcgss:__gss_find_upcall [rhel-5.2.z]
547299 - RHEL5.3.z LTP nanosleep02 Test Case Failure on Fujitsu Machine [rhel-5.2.z]
548074 - [5.3]Write operation with O_NONBLOCK flag to TTY terminal is blocked [rhel-5.2.z]
548641 - CVE-2007-4567 kernel: ipv6_hop_jumbo remote system crash
550907 - CVE-2009-4537 kernel: r8169 issue reported at 26c3
551214 - CVE-2009-4538 kernel: e1000e frame fragment issue
552126 - CVE-2009-4536 kernel: e1000 issue reported at 26c3
553133 - RHSA-2008:0508 linux-2.6.9-x86_64-copy_user-zero-tail.patch broken [rhel-5.2.z]
555052 - setitimer(ITIMER_REAL, ...) failing in 64bit enviroment [rhel-5.2.z]

6. Package List:

Red Hat Enterprise Linux (v. 5.2.z server):

Source:
kernel-2.6.18-92.1.35.el5.src.rpm

i386:
kernel-2.6.18-92.1.35.el5.i686.rpm
kernel-PAE-2.6.18-92.1.35.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-92.1.35.el5.i686.rpm
kernel-PAE-devel-2.6.18-92.1.35.el5.i686.rpm
kernel-debug-2.6.18-92.1.35.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-92.1.35.el5.i686.rpm
kernel-debug-devel-2.6.18-92.1.35.el5.i686.rpm
kernel-debuginfo-2.6.18-92.1.35.el5.i686.rpm
kernel-debuginfo-common-2.6.18-92.1.35.el5.i686.rpm
kernel-devel-2.6.18-92.1.35.el5.i686.rpm
kernel-headers-2.6.18-92.1.35.el5.i386.rpm
kernel-xen-2.6.18-92.1.35.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-92.1.35.el5.i686.rpm
kernel-xen-devel-2.6.18-92.1.35.el5.i686.rpm

ia64:
kernel-2.6.18-92.1.35.el5.ia64.rpm
kernel-debug-2.6.18-92.1.35.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-92.1.35.el5.ia64.rpm
kernel-debug-devel-2.6.18-92.1.35.el5.ia64.rpm
kernel-debuginfo-2.6.18-92.1.35.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-92.1.35.el5.ia64.rpm
kernel-devel-2.6.18-92.1.35.el5.ia64.rpm
kernel-headers-2.6.18-92.1.35.el5.ia64.rpm
kernel-xen-2.6.18-92.1.35.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-92.1.35.el5.ia64.rpm
kernel-xen-devel-2.6.18-92.1.35.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-92.1.35.el5.noarch.rpm

ppc:
kernel-2.6.18-92.1.35.el5.ppc64.rpm
kernel-debug-2.6.18-92.1.35.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-92.1.35.el5.ppc64.rpm
kernel-debug-devel-2.6.18-92.1.35.el5.ppc64.rpm
kernel-debuginfo-2.6.18-92.1.35.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-92.1.35.el5.ppc64.rpm
kernel-devel-2.6.18-92.1.35.el5.ppc64.rpm
kernel-headers-2.6.18-92.1.35.el5.ppc.rpm
kernel-headers-2.6.18-92.1.35.el5.ppc64.rpm
kernel-kdump-2.6.18-92.1.35.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-92.1.35.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-92.1.35.el5.ppc64.rpm

s390x:
kernel-2.6.18-92.1.35.el5.s390x.rpm
kernel-debug-2.6.18-92.1.35.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-92.1.35.el5.s390x.rpm
kernel-debug-devel-2.6.18-92.1.35.el5.s390x.rpm
kernel-debuginfo-2.6.18-92.1.35.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-92.1.35.el5.s390x.rpm
kernel-devel-2.6.18-92.1.35.el5.s390x.rpm
kernel-headers-2.6.18-92.1.35.el5.s390x.rpm
kernel-kdump-2.6.18-92.1.35.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-92.1.35.el5.s390x.rpm
kernel-kdump-devel-2.6.18-92.1.35.el5.s390x.rpm

x86_64:
kernel-2.6.18-92.1.35.el5.x86_64.rpm
kernel-debug-2.6.18-92.1.35.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-92.1.35.el5.x86_64.rpm
kernel-debug-devel-2.6.18-92.1.35.el5.x86_64.rpm
kernel-debuginfo-2.6.18-92.1.35.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-92.1.35.el5.x86_64.rpm
kernel-devel-2.6.18-92.1.35.el5.x86_64.rpm
kernel-headers-2.6.18-92.1.35.el5.x86_64.rpm
kernel-xen-2.6.18-92.1.35.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-92.1.35.el5.x86_64.rpm
kernel-xen-devel-2.6.18-92.1.35.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2007-4567.html
https://www.redhat.com/security/data/cve/CVE-2007-5966.html
https://www.redhat.com/security/data/cve/CVE-2009-0778.html
https://www.redhat.com/security/data/cve/CVE-2009-0834.html
https://www.redhat.com/security/data/cve/CVE-2009-1385.html
https://www.redhat.com/security/data/cve/CVE-2009-1895.html
https://www.redhat.com/security/data/cve/CVE-2009-4536.html
https://www.redhat.com/security/data/cve/CVE-2009-4537.html
https://www.redhat.com/security/data/cve/CVE-2009-4538.html
http://www.redhat.com/security/updates/classification/#important
www.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/index.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLaJNIXlSAg2UNWIIRAsQrAKC7nYXA7y9ze6eL7xMo2M CZqDnzYgCfX1Wn
V6eoXfbGsp1woczITyf7nQ4=
=BfMH
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 

Thread Tools




All times are GMT. The time now is 11:48 PM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org