Chapter 1. Package Updates
100
* running the SAP Linux Certification Suite in a KVM guest caused severe SAP kernel errors, causing
it to exit. (
BZ#524150
688
)
* attempting to 'online' a CPU for a KVM guest via sysfs caused a system crash. (
BZ#524151
689
)
* when using KVM, pvclock returned bogus wallclock values. (
BZ#524152
690
)
* the clock could go backwards when using the vsyscall infrastructure. (
BZ#524527
691
)
See References for KBase links re
BZ#519782
693
692
&
BZ#520906
695
694
.
Users should upgrade to these updated packages, which contain backported patches to correct these
issues. Reboot the system for this update to take effect.
1.88.7. RHSA-2010:0178: Important Red Hat Enterprise Linux 5.5
kernel security and bug fix update
Updated kernel packages that fix three security issues, address several hundred bugs, and add
numerous enhancements are now available as part of the ongoing support and maintenance of Red
Hat Enterprise Linux version 5. This is the fifth regular update.
The Red Hat Security Response Team has rated this update as having important security impact.
Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are
available for each vulnerability from the CVE links in the References section.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following security issues:
* a race condition was found in the mac80211 implementation, a framework used for writing drivers
for wireless devices. An attacker could trigger this flaw by sending a Delete Block ACK (DELBA)
packet to a target system, resulting in a remote denial of service. Note: This issue only affected
users on 802.11n networks, and that also use the iwlagn driver with Intel wireless hardware.
(
CVE-2009-4027
696
, Important)
* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code could skip the lock
operation for files that have the S_ISGID bit (set-group-ID on execution) in their mode set. A local,
unprivileged user on a system that has a GFS2 file system mounted could use this flaw to cause a
kernel panic. (
CVE-2010-0727
697
, Moderate)
* a divide-by-zero flaw was found in the ext4 file system code. A local attacker could use this flaw to
cause a denial of service by mounting a specially-crafted ext4 file system. (
CVE-2009-4307
698
, Low)
These updated packages also include several hundred bug fixes for and enhancements to the Linux
kernel. Space precludes documenting each of these changes in this advisory and users are directed
688
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=524150
689
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=524151
690
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=524152
691
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=524527
693
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=519782
692
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=519782
695
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=520906
694
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=520906
696
https://www.redhat.com/security/data/cve/CVE-2009-4027.html
697
https://www.redhat.com/security/data/cve/CVE-2010-0727.html
698
https://www.redhat.com/security/data/cve/CVE-2009-4307.html
Содержание ENTERPRISE LINUX 5.5 - S 2010
Страница 10: ...x ...
Страница 308: ...298 ...
Страница 310: ...300 ...
Страница 468: ...458 ...
Страница 470: ...460 ...