Chapter 1. Package Updates
96
* on some AMD Opteron systems, repeatedly taking a CPU offline then online caused a system hang.
(
BZ#539688
643
)
* I/O page fault errors on some systems. (
BZ#539689
644
)
* certain memory configurations could cause the kernel-xen kernel to fail to boot on some AMD
Opteron systems. (
BZ#539690
645
)
* NMI watchdog is now disabled for offline CPUs. (
BZ#539691
646
)
* duplicate directories in /proc/acpi/processor/ on BX-EX systems. (
BZ#539692
647
)
* links did not come up when using bnx2x with certain Broadcom devices. (
BZ#540381
648
)
Users should upgrade to these updated packages, which contain backported patches to correct these
issues. The system must be rebooted for this update to take effect.
1.88.5. RHSA-2009:1548: Important security and bug fix update
Important
This update has already been released (prior to the GA of this release) as the security
errata
RHSA-2009:1548
649
Updated kernel packages that fix multiple security issues and several bugs are now available for Red
Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red Hat Security Response
Team.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security fixes:
* a system with SELinux enforced was more permissive in allowing local users in the unconfined_t
domain to map low memory areas even if the mmap_min_addr restriction was enabled. This could aid
in the local exploitation of NULL pointer dereference bugs. (
CVE-2009-2695
650
, Important)
* a NULL pointer dereference flaw was found in the eCryptfs implementation in the Linux kernel.
A local attacker could use this flaw to cause a local denial of service or escalate their privileges.
(
CVE-2009-2908
651
, Important)
* a flaw was found in the NFSv4 implementation. The kernel would do an unnecessary permission
check after creating a file. This check would usually fail and leave the file with the permission bits set
to random values. Note: This is a server-side only issue. (
CVE-2009-3286
652
, Important)
643
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=539688
644
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=539689
645
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=539690
646
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=539691
647
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=539692
648
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=540381
650
https://www.redhat.com/security/data/cve/CVE-2009-2695.html
651
https://www.redhat.com/security/data/cve/CVE-2009-2908.html
652
https://www.redhat.com/security/data/cve/CVE-2009-3286.html
Содержание ENTERPRISE LINUX 5.5 - S 2010
Страница 10: ...x ...
Страница 308: ...298 ...
Страница 310: ...300 ...
Страница 468: ...458 ...
Страница 470: ...460 ...