Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2008:0211-8
Type: Security Advisory
Severity: Important
Issued on: 2008-05-07
Last updated on: 2008-05-07
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2006-4814
CVE-2007-5001
CVE-2007-6151
CVE-2007-6206
CVE-2008-0007
CVE-2008-1367
CVE-2008-1375
CVE-2008-1669

Details

Updated kernel packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 3.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

* the absence of a protection mechanism when attempting to access a
critical section of code has been found in the Linux kernel open file
descriptors control mechanism, fcntl. This could allow a local unprivileged
user to simultaneously execute code, which would otherwise be protected
against parallel execution. As well, a race condition when handling locks
in the Linux kernel fcntl functionality, may have allowed a process
belonging to a local unprivileged user to gain re-ordered access to the
descriptor table. (CVE-2008-1669, Important)

* the absence of a protection mechanism when attempting to access a
critical section of code, as well as a race condition, have been found in
the Linux kernel file system event notifier, dnotify. This could allow a
local unprivileged user to get inconsistent data, or to send arbitrary
signals to arbitrary system processes. (CVE-2008-1375, Important)

Red Hat would like to thank Nick Piggin for responsibly disclosing the
following issue:

* when accessing kernel memory locations, certain Linux kernel drivers
registering a fault handler did not perform required range checks. A local
unprivileged user could use this flaw to gain read or write access to
arbitrary kernel memory, or possibly cause a kernel crash.
(CVE-2008-0007, Important)

* a flaw was found when performing asynchronous input or output operations
on a FIFO special file. A local unprivileged user could use this flaw to
cause a kernel panic. (CVE-2007-5001, Important)

* a flaw was found in the way core dump files were created. If a local user
could get a root-owned process to dump a core file into a directory, which
the user has write access to, they could gain read access to that core
file. This could potentially grant unauthorized access to sensitive
information. (CVE-2007-6206, Moderate)

* a buffer overflow was found in the Linux kernel ISDN subsystem. A local
unprivileged user could use this flaw to cause a denial of service.
(CVE-2007-6151, Moderate)

* a race condition found in the mincore system core could allow a local
user to cause a denial of service (system hang). (CVE-2006-4814, Moderate)

* it was discovered that the Linux kernel handled string operations in the
opposite way to the GNU Compiler Collection (GCC). This could allow a local
unprivileged user to cause memory corruption. (CVE-2008-1367, Low)

As well, these updated packages fix the following bugs:

* a bug, which caused long delays when unmounting mounts containing a large
number of unused dentries, has been resolved.

* in the previous kernel packages, the kernel was unable to handle certain
floating point instructions on Itanium(R) architectures.

* on certain Intel CPUs, the Translation Lookaside Buffer (TLB) was not
flushed correctly, which caused machine check errors.

Red Hat Enterprise Linux 3 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
kernel-2.4.21-57.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: a1ec65f9f2c02d45802859cd7bc6297f
 
IA-32:
kernel-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 30d34f35a519d3822ee8c50c42f18610
kernel-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: aecf0b0d5644fcad52e625f1be32dd12
kernel-BOOT-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6e9a8c9db6d56c9b1f3452550517b5a7
kernel-doc-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: efc91de75ebab275c7270b1a7c27d328
kernel-hugemem-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7d00106691b6f632284f575765e19ad6
kernel-hugemem-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 73f13645abe8bcb40c0af00ccd99a17d
kernel-smp-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 82791fcb78478942b38e27bf13f54f9b
kernel-smp-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1aae8180d2df3f19f79df3456613172b
kernel-smp-unsupported-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: ba14428901f6388e7324b5392e2e10e8
kernel-smp-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 15ec5f78b3f19b9aa40c5755d88be7cb
kernel-source-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: c927e3ea773c96397304baa62e7aba29
kernel-unsupported-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3a4ccef29b3a9f6f58ffe6e1739fde31
kernel-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 47bfedc9f265eb43e775b960ab96649b
 
x86_64:
kernel-2.4.21-57.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2f5ba5d199f745272f177d822e568214
kernel-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0c8da81c382cd2a08e9c3ac4b69e8ba8
kernel-doc-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 680d75f665027874aae7e785042a3b81
kernel-smp-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8b7fbd8a108bd725748b1ec1c897b1d4
kernel-smp-unsupported-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0c358420b3b8774a561609bdc9f34e2
kernel-source-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 48bf1ef8e49c09ea88cf3f733f5537c1
kernel-unsupported-2.4.21-57.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: a1bc26c646c9d2133f4f6f70b51bf778
kernel-unsupported-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cc87b1e46ab334e1a456090bf388ee87
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
kernel-2.4.21-57.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: a1ec65f9f2c02d45802859cd7bc6297f
 
IA-32:
kernel-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 30d34f35a519d3822ee8c50c42f18610
kernel-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: aecf0b0d5644fcad52e625f1be32dd12
kernel-BOOT-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6e9a8c9db6d56c9b1f3452550517b5a7
kernel-doc-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: efc91de75ebab275c7270b1a7c27d328
kernel-hugemem-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7d00106691b6f632284f575765e19ad6
kernel-hugemem-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 73f13645abe8bcb40c0af00ccd99a17d
kernel-smp-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 82791fcb78478942b38e27bf13f54f9b
kernel-smp-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1aae8180d2df3f19f79df3456613172b
kernel-smp-unsupported-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: ba14428901f6388e7324b5392e2e10e8
kernel-smp-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 15ec5f78b3f19b9aa40c5755d88be7cb
kernel-source-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: c927e3ea773c96397304baa62e7aba29
kernel-unsupported-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3a4ccef29b3a9f6f58ffe6e1739fde31
kernel-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 47bfedc9f265eb43e775b960ab96649b
 
IA-64:
kernel-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: f37d44f6be1345f85f3e448afa78abe5
kernel-doc-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: ab7ddb5b5b8739f398ad3256ffd78eb2
kernel-source-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cbda432638330265babefd722b6cef1c
kernel-unsupported-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 10fe56b99dacfce8c65397f602308aec
 
PPC:
kernel-2.4.21-57.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5504a3acea4f66dd3fa94318b3da31c9
kernel-2.4.21-57.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: e85cd81cdcd77d56480cff608c81f8d2
kernel-doc-2.4.21-57.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: db9189ce9b75ece8ea41eae6c5b5a7f3
kernel-source-2.4.21-57.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2dd9ba5fba7d856c0634b6c5bd4cf335
kernel-unsupported-2.4.21-57.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 612f10c863e712b30b5586e938ce23d9
kernel-unsupported-2.4.21-57.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 98f0ba80fbc4fa4d6e6d8adea9122f0c
 
s390:
kernel-2.4.21-57.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: f2f5e2014ce5757946629dcf6bdf5569
kernel-doc-2.4.21-57.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 26b362e8c0037fe995c92c244af20da8
kernel-source-2.4.21-57.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8640438c22fe8bdad80c17e1bbf12416
kernel-unsupported-2.4.21-57.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0141be703780663c0c98baef9faf025d
 
s390x:
kernel-2.4.21-57.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: d1e6bf74a2567a66abc34a82d41c7071
kernel-doc-2.4.21-57.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 875a410dc8e6c6e4f085734c61eedb85
kernel-source-2.4.21-57.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: a419ae1e57bcac61a6c792f2a39947dc
kernel-unsupported-2.4.21-57.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: b38d80a19ddf3481a2088e6e7dce7175
 
x86_64:
kernel-2.4.21-57.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2f5ba5d199f745272f177d822e568214
kernel-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0c8da81c382cd2a08e9c3ac4b69e8ba8
kernel-doc-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 680d75f665027874aae7e785042a3b81
kernel-smp-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8b7fbd8a108bd725748b1ec1c897b1d4
kernel-smp-unsupported-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0c358420b3b8774a561609bdc9f34e2
kernel-source-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 48bf1ef8e49c09ea88cf3f733f5537c1
kernel-unsupported-2.4.21-57.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: a1bc26c646c9d2133f4f6f70b51bf778
kernel-unsupported-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cc87b1e46ab334e1a456090bf388ee87
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
kernel-2.4.21-57.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: a1ec65f9f2c02d45802859cd7bc6297f
 
IA-32:
kernel-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 30d34f35a519d3822ee8c50c42f18610
kernel-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: aecf0b0d5644fcad52e625f1be32dd12
kernel-BOOT-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6e9a8c9db6d56c9b1f3452550517b5a7
kernel-doc-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: efc91de75ebab275c7270b1a7c27d328
kernel-hugemem-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7d00106691b6f632284f575765e19ad6
kernel-hugemem-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 73f13645abe8bcb40c0af00ccd99a17d
kernel-smp-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 82791fcb78478942b38e27bf13f54f9b
kernel-smp-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1aae8180d2df3f19f79df3456613172b
kernel-smp-unsupported-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: ba14428901f6388e7324b5392e2e10e8
kernel-smp-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 15ec5f78b3f19b9aa40c5755d88be7cb
kernel-source-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: c927e3ea773c96397304baa62e7aba29
kernel-unsupported-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3a4ccef29b3a9f6f58ffe6e1739fde31
kernel-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 47bfedc9f265eb43e775b960ab96649b
 
IA-64:
kernel-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: f37d44f6be1345f85f3e448afa78abe5
kernel-doc-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: ab7ddb5b5b8739f398ad3256ffd78eb2
kernel-source-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cbda432638330265babefd722b6cef1c
kernel-unsupported-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 10fe56b99dacfce8c65397f602308aec
 
x86_64:
kernel-2.4.21-57.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2f5ba5d199f745272f177d822e568214
kernel-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0c8da81c382cd2a08e9c3ac4b69e8ba8
kernel-doc-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 680d75f665027874aae7e785042a3b81
kernel-smp-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8b7fbd8a108bd725748b1ec1c897b1d4
kernel-smp-unsupported-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0c358420b3b8774a561609bdc9f34e2
kernel-source-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 48bf1ef8e49c09ea88cf3f733f5537c1
kernel-unsupported-2.4.21-57.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: a1bc26c646c9d2133f4f6f70b51bf778
kernel-unsupported-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cc87b1e46ab334e1a456090bf388ee87
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
kernel-2.4.21-57.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: a1ec65f9f2c02d45802859cd7bc6297f
 
IA-32:
kernel-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 30d34f35a519d3822ee8c50c42f18610
kernel-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: aecf0b0d5644fcad52e625f1be32dd12
kernel-BOOT-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6e9a8c9db6d56c9b1f3452550517b5a7
kernel-doc-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: efc91de75ebab275c7270b1a7c27d328
kernel-hugemem-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7d00106691b6f632284f575765e19ad6
kernel-hugemem-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 73f13645abe8bcb40c0af00ccd99a17d
kernel-smp-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 82791fcb78478942b38e27bf13f54f9b
kernel-smp-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1aae8180d2df3f19f79df3456613172b
kernel-smp-unsupported-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: ba14428901f6388e7324b5392e2e10e8
kernel-smp-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 15ec5f78b3f19b9aa40c5755d88be7cb
kernel-source-2.4.21-57.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: c927e3ea773c96397304baa62e7aba29
kernel-unsupported-2.4.21-57.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3a4ccef29b3a9f6f58ffe6e1739fde31
kernel-unsupported-2.4.21-57.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 47bfedc9f265eb43e775b960ab96649b
 
IA-64:
kernel-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: f37d44f6be1345f85f3e448afa78abe5
kernel-doc-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: ab7ddb5b5b8739f398ad3256ffd78eb2
kernel-source-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cbda432638330265babefd722b6cef1c
kernel-unsupported-2.4.21-57.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 10fe56b99dacfce8c65397f602308aec
 
x86_64:
kernel-2.4.21-57.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2f5ba5d199f745272f177d822e568214
kernel-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0c8da81c382cd2a08e9c3ac4b69e8ba8
kernel-doc-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 680d75f665027874aae7e785042a3b81
kernel-smp-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8b7fbd8a108bd725748b1ec1c897b1d4
kernel-smp-unsupported-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0c358420b3b8774a561609bdc9f34e2
kernel-source-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 48bf1ef8e49c09ea88cf3f733f5537c1
kernel-unsupported-2.4.21-57.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: a1bc26c646c9d2133f4f6f70b51bf778
kernel-unsupported-2.4.21-57.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: cc87b1e46ab334e1a456090bf388ee87
 

Bugs fixed (see bugzilla for more information)

306971 - CVE-2006-4814 kernel Race condition in mincore can cause "ps -ef" to hang
326251 - CVE-2007-5001 kernel asynchronous IO on a FIFO kernel panic
396861 - CVE-2007-6206 Issue with core dump owner
413731 - RHEL3: System hangs at unmount
425111 - CVE-2007-6151 I4L: fix isdn_ioctl memory issue
428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap
437312 - CVE-2008-1367 Kernel doesn't clear DF for signal handlers
439754 - CVE-2008-1375 kernel: race condition in dnotify (local DoS, local roothole possible)
443433 - CVE-2008-1669 kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/