RHSA-2009:1548: Important security and bug fix update
97
* a NULL pointer dereference flaw was found in each of the following functions in the Linux kernel:
pipe_read_open(), pipe_write_open(), and pipe_rdwr_open(). When the mutex lock is not held, the
i_pipe pointer could be released by other processes before it is used to update the pipe's reader and
writer counters. This could lead to a local denial of service or privilege escalation. (
CVE-2009-3547
653
,
Important)
* a flaw was found in the Realtek r8169 Ethernet driver in the Linux kernel. pci_unmap_single()
presented a memory leak that could lead to IOMMU space exhaustion and a system crash. An
attacker on the local network could abuse this flaw by using jumbo frames for large amounts of
network traffic. (
CVE-2009-3613
654
, Important)
* missing initialization flaws were found in the Linux kernel. Padding data in several core network
structures was not initialized properly before being sent to user-space. These flaws could lead to
information leaks. (
CVE-2009-3228
655
, Moderate)
Bug fixes:
* with network bonding in the "balance-tlb" or "balance-alb" mode, the primary setting for the primary
slave device was lost when said device was brought down. Bringing the slave back up did not restore
the primary setting. (
BZ#517971
656
)
* some faulty serial device hardware caused systems running the kernel-xen kernel to take a very long
time to boot. (
BZ#524153
657
)
* a caching bug in nfs_readdir() may have caused NFS clients to see duplicate files or not see all files
in a directory. (
BZ#526960
658
)
* the RHSA-2009:1243 update removed the mpt_msi_enable option, preventing certain scripts from
running. This update adds the option back. (
BZ#526963
659
)
* an iptables rule with the recent module and a hit count value greater than the ip_pkt_list_tot
parameter (the default is 20), did not have any effect over packets, as the hit count could not be
reached. (
BZ#527434
660
)
* a check has been added to the IPv4 code to make sure that rt is not NULL, to help prevent future
bugs in functions that call ip_append_data() from being exploitable. (
BZ#527436
661
)
* a kernel panic occurred in certain conditions after reconfiguring a tape drive's block size.
(
BZ#528133
662
)
* when using the Linux Virtual Server (LVS) in a master and backup configuration, and propagating
active connections on the master to the backup, the connection timeout value on the backup was
hard-coded to 180 seconds, meaning connection information on the backup was soon lost. This could
prevent the successful failover of connections. The timeout value can now be set via "ipvsadm --set".
(
BZ#528645
663
)
653
https://www.redhat.com/security/data/cve/CVE-2009-3547.html
654
https://www.redhat.com/security/data/cve/CVE-2009-3613.html
655
https://www.redhat.com/security/data/cve/CVE-2009-3228.html
656
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=517971
657
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=524153
658
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=526960
659
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=526963
660
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=527434
661
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=527436
662
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=528133
663
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=528645
Summary of Contents for ENTERPRISE LINUX 5.5 - S 2010
Page 10: ...x ...
Page 308: ...298 ...
Page 310: ...300 ...
Page 468: ...458 ...
Page 470: ...460 ...