Red Hat ENTERPRISE LINUX 5.5 - TECHNICAL NOTES Manual page 104

Table of Contents

Advertisement

Chapter 1. Package Updates
1.88.4. RHSA-2009:1670: Important security and bug fix update
Important
This update has already been released (prior to the GA of this release) as the security
RHSA-2009:1670
errata
Updated kernel packages that fix multiple security issues and several bugs are now available for Red
Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response
Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security fixes:
* NULL pointer dereference flaws in the r128 driver. Checks to test if the Concurrent Command Engine
state was initialized were missing in private IOCTL functions. An attacker could use these flaws to
cause a local denial of service or escalate their privileges.
* a NULL pointer dereference flaw in the NFSv4 implementation. Several NFSv4 file locking functions
failed to check whether a file had been opened on the server before performing locking operations
on it. A local user on a system with an NFSv4 share mounted could possibly use this flaw to cause a
denial of service or escalate their privileges.
* a flaw in tcf_fill_node(). A certain data structure in this function was not initialized properly before
being copied to user-space. This could lead to an information leak.
* unix_stream_connect() did not check if a UNIX domain socket was in the shutdown state. This
could lead to a deadlock. A local, unprivileged user could use this flaw to cause a denial of service.
618
(CVE-2009-3621
, Moderate)
Knowledgebase DOC-20536 has steps to mitigate NULL pointer dereference flaws.
Bug fixes:
* frequently changing a CPU between online and offline caused a kernel panic on some systems.
619
(BZ#545583
)
* for the LSI Logic LSI53C1030 Ultra320 SCSI controller, read commands sent could receive incorrect
data, preventing correct data transfer.
* pciehp could not detect PCI Express hot plug slots on some systems.
* soft lockups: inotify race and contention on dcache_lock.
623
BZ#537019
)
615
https://www.redhat.com/security/data/cve/CVE-2009-3620.html
616
https://www.redhat.com/security/data/cve/CVE-2009-3726.html
617
https://www.redhat.com/security/data/cve/CVE-2009-3612.html
618
https://www.redhat.com/security/data/cve/CVE-2009-3621.html
619
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=545583
620
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=529308
621
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=530383
622
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=533822
623
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=537019
94
614
(CVE-2009-3620
(CVE-2009-3726
620
(BZ#529308
)
(BZ#533822
615
, Important)
616
, Important)
(CVE-2009-3612
621
(BZ#530383
622
,
617
, Moderate)
)

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise linux 5.5

Table of Contents