RHSA-2009:1222: Important security and bug fix update
125
1.110.8. RHSA-2009:1222: Important security and bug fix update
Important
This update has already been released (prior to the GA of this release) as the security
errata
RHSA-2009:1222
871
Updated kernel packages that fix two security issues and a bug are now available for Red Hat
Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response
Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
These updated packages fix the following security issues:
• a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This macro did not initialize
the sendpage operation in the proto_ops structure correctly. A local, unprivileged user could use this
flaw to cause a local denial of service or escalate their privileges. (
CVE-2009-2692
872
, Important)
• a flaw was found in the udp_sendmsg() implementation in the Linux kernel when using the
MSG_MORE flag on UDP sockets. A local, unprivileged user could use this flaw to cause a local
denial of service or escalate their privileges. (
CVE-2009-2698
873
, Important)
Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google Security Team for
responsibly reporting these flaws.
These updated packages also fix the following bug:
• in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was not freed in the error
exit path. This bug led to a memory leak and an unresponsive system. A reported case of this bug
occurred after running "cman_tool kill -n [nodename]". (
BZ#515432
874
)
Users should upgrade to these updated packages, which contain backported patches to correct these
issues. The system must be rebooted for this update to take effect.
1.110.9. RHSA-2009:1243
Updated kernel packages that fix security issues, address several hundred bugs and add numerous
enhancements are now available as part of the ongoing support and maintenance of Red Hat
Enterprise Linux version 5.
1.110.9.1. General Kernel Support
An outline of general kernel updates.
• KVM
guest-smp tlb
flushing without
mmu-notifiers
could corrupt memory as a kernel-based
virtual machine (KVM) may add pages to the kernel freelist while another
vcpu
may still be writing
to them through guest mode. This update adds
mmu-notifier
support to the kernel and also
corrects a bug found in an earlier patch wherein
mm_struct
was grown by existing drivers and
caused a failed kABI check. This bug has been corrected by using an index that resides in an
unused padding hole to avoid expanding the structure size.(
BZ#485718
875
)
Summary of Contents for ENTERPRISE 5.4 RELEASE NOTES
Page 1: ...Red Hat Enterprise Linux 5 4 Technical Notes Every Change to Every Package ...
Page 18: ...xviii ...
Page 306: ...288 ...
Page 464: ...446 ...
Page 466: ...448 ...