Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2009:1672-1
Type: Security Advisory
Severity: Important
Issued on: 2009-12-15
Last updated on: 2009-12-15
Affected Products: Red Hat Enterprise Linux EUS (v. 5.2.z server)
CVEs (cve.mitre.org): CVE-2009-2695
CVE-2009-3547

Details

Updated kernel packages that fix multiple security issues and one bug are
now available for Red Hat Enterprise Linux 5.2 Extended Update Support.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a system with SELinux enforced was more permissive in allowing local
users in the unconfined_t domain to map low memory areas even if the
mmap_min_addr restriction was enabled. This could aid in the local
exploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)

* a NULL pointer dereference flaw was found in each of the following
functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and
pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could
be released by other processes before it is used to update the pipe's
reader and writer counters. This could lead to a local denial of service or
privilege escalation. (CVE-2009-3547, Important)

This update also fixes the following bug:

* a bug in the IPv6 implementation in the Linux kernel could have caused an
unbalanced reference count. When using network bonding, this bug may have
caused a hang when shutting the system down via "shutdown -h", or prevented
the network service from being stopped via "service network stop".
(BZ#538409)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux EUS (v. 5.2.z server)

IA-32:
kernel-2.6.18-92.1.32.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1eeba98eb97f82cbf99175e23d41bd73
kernel-PAE-2.6.18-92.1.32.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: f0d6065efa81dfef87ae2e68401f346e
kernel-PAE-devel-2.6.18-92.1.32.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 6ea538f23a2894d2695c070b64c7615d
kernel-debug-2.6.18-92.1.32.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: ff4073961428a7c5d44455fad7b49784
kernel-debug-devel-2.6.18-92.1.32.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: a79258356130e811b13d9bbc0fe8d952
kernel-devel-2.6.18-92.1.32.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 73c2bdb5005159477df7b62558d22672
kernel-doc-2.6.18-92.1.32.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: e552043332a7651087118beb2f8141a7
kernel-headers-2.6.18-92.1.32.el5.i386.rpm
File outdated by:  RHSA-2010:0148
    MD5: 0de28a238f2109905001612c50969275
kernel-xen-2.6.18-92.1.32.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: bcd23fa945d4c9a5bbd91728fa733739
kernel-xen-devel-2.6.18-92.1.32.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: a7535363f6b4e1643231dea0285c01fb
 
IA-64:
kernel-2.6.18-92.1.32.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 5d303ee75330e101506ef2773ce09402
kernel-debug-2.6.18-92.1.32.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: d0767ee7ffd44e239421de1f40295c46
kernel-debug-devel-2.6.18-92.1.32.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 60a2810a0e7dd5fde301b12639f9faf5
kernel-devel-2.6.18-92.1.32.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: de70cdd41eaf4cf4945e78c1ba64404d
kernel-doc-2.6.18-92.1.32.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: e552043332a7651087118beb2f8141a7
kernel-headers-2.6.18-92.1.32.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: ec1c3ffbfd4668545bea6b712c24cd31
kernel-xen-2.6.18-92.1.32.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: ccc3828bb84d7ec96f45f9452c6afe55
kernel-xen-devel-2.6.18-92.1.32.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: feab1c5de97e570a732ed70261013f41
 
PPC:
kernel-2.6.18-92.1.32.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: de9867792c25259d087e1874432d9af2
kernel-debug-2.6.18-92.1.32.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: a8cf30f3f89d3f0537c62d6ac362ac5b
kernel-debug-devel-2.6.18-92.1.32.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 209df39e2fd85d162bc52e020eb650f6
kernel-devel-2.6.18-92.1.32.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: e54555f9c7a810bed425d9cd924542d8
kernel-doc-2.6.18-92.1.32.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: e552043332a7651087118beb2f8141a7
kernel-headers-2.6.18-92.1.32.el5.ppc.rpm
File outdated by:  RHSA-2010:0148
    MD5: 6b79b7705322ca3c906065094e0f7ed3
kernel-headers-2.6.18-92.1.32.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 717b4f0b0f379c3d1f4e61b18d4473e9
kernel-kdump-2.6.18-92.1.32.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 86358d34521590304ea4c2709939cef7
kernel-kdump-devel-2.6.18-92.1.32.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 17b1b6f56f142f0939b128b3fba38d75
 
s390x:
kernel-2.6.18-92.1.32.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4275683aa73deec69354fd3f40329a42
kernel-debug-2.6.18-92.1.32.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: fedbd8ce9d61c33fa2dd7891b8b6fbf9
kernel-debug-devel-2.6.18-92.1.32.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1a6415b0285522d0a2ae1ace39960f24
kernel-devel-2.6.18-92.1.32.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 25aa2e6d7ae4bc074e7853c93bb0c90f
kernel-doc-2.6.18-92.1.32.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: e552043332a7651087118beb2f8141a7
kernel-headers-2.6.18-92.1.32.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 8f054c24a1dc1c91e3b46de3b7e6eee0
kernel-kdump-2.6.18-92.1.32.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 18fe107db6c6d5257a22cb3fdb4c9347
kernel-kdump-devel-2.6.18-92.1.32.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 80da41a5ab2b0fc87361ded4977a6518
 
x86_64:
kernel-2.6.18-92.1.32.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 96363b8e6935c1c9922c605950726953
kernel-debug-2.6.18-92.1.32.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 606ec564383cc68c49eb9d754da4571b
kernel-debug-devel-2.6.18-92.1.32.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: f6232d8f0426208a65ed01770b8bb946
kernel-devel-2.6.18-92.1.32.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 5deb2fdc9cc77635960acce7d492a8a5
kernel-doc-2.6.18-92.1.32.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: e552043332a7651087118beb2f8141a7
kernel-headers-2.6.18-92.1.32.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4e57084e0c61374a1a364b77644636dd
kernel-xen-2.6.18-92.1.32.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: a89b76e79a2a4fac05af9b7005aa7cc1
kernel-xen-devel-2.6.18-92.1.32.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1ee66748da1dcabc8cc1b26c2ebee1a1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

517830 - CVE-2009-2695 kernel: SELinux and mmap_min_addr
530490 - CVE-2009-3547 kernel: fs: pipe.c null pointer dereference
538409 - Unbalance reference count in ndisc_recv_ns [rhel-5.2.z]


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/