Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2009:1055-1
Type: Security Advisory
Severity: Important
Issued on: 2009-05-19
Last updated on: 2009-05-19
Affected Products: Red Hat Enterprise Linux EUS (v. 5.2.z server)
CVEs (cve.mitre.org): CVE-2009-0065

Details

Updated kernel packages that fix one security issue and a bug are now
available for Red Hat Enterprise Linux 5.2 Extended Update Support.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* a buffer overflow was found in the Linux kernel Partial Reliable Stream
Control Transmission Protocol (PR-SCTP) implementation. This could,
potentially, lead to a remote denial of service or arbitrary code execution
if a Forward-TSN chunk is received with a large stream ID. Note: An
established connection between SCTP endpoints is necessary to exploit this
vulnerability. Refer to the Knowledgebase article in the References section
for further information. (CVE-2009-0065, Important)

This update also fixes the following bug:

* a problem in the way the i5000_edac module reported errors may have
caused the console on some systems to be flooded with errors, similar to
the following:

EDAC i5000 MC0: NON-FATAL ERROR Found!!! 1st NON-FATAL Err Reg= [hex value]
EDAC i5000: NON-Retry Errors, bits= [hex value]

After installing this update, the console will not be flooded with these
errors. (BZ#494734)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux EUS (v. 5.2.z server)

SRPMS:
kernel-2.6.18-92.1.26.el5.src.rpm
File outdated by:  RHSA-2010:0148
    MD5: 87d3e3f007d36212c155d370e9f02158
 
IA-32:
kernel-2.6.18-92.1.26.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 238b557c776729d58b28dbfe9574bf6c
kernel-PAE-2.6.18-92.1.26.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: fc092da45b7b2fab86eea23853332539
kernel-PAE-devel-2.6.18-92.1.26.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: f3c8f18722a6f66458b994a95627f842
kernel-debug-2.6.18-92.1.26.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: e6d95038e6c5a38cdc2247733ce3ee89
kernel-debug-devel-2.6.18-92.1.26.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: ccd474c87534e2ba897994ea52b1c196
kernel-devel-2.6.18-92.1.26.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 32111755d1765bd04ed62089a5dcf9c0
kernel-doc-2.6.18-92.1.26.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 214e272106020f637115dec5f601bd81
kernel-headers-2.6.18-92.1.26.el5.i386.rpm
File outdated by:  RHSA-2010:0148
    MD5: 003c1eb1d82d6f5fd548d4853d95959c
kernel-xen-2.6.18-92.1.26.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: f7e787ea7ecd676ad3be79c31ae28d96
kernel-xen-devel-2.6.18-92.1.26.el5.i686.rpm
File outdated by:  RHSA-2010:0148
    MD5: 844376db1908b6279fbdd3337c4d4f15
 
IA-64:
kernel-2.6.18-92.1.26.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 3bb09bdac79dc0da055f7d2d0df6a7b2
kernel-debug-2.6.18-92.1.26.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 99f1f2891d781b9e6ce2b7a35330b25f
kernel-debug-devel-2.6.18-92.1.26.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 7c71a7dbb8d08b1723af57dd0b7f9a39
kernel-devel-2.6.18-92.1.26.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 2128add31cca92494233d87f5eb74bb8
kernel-doc-2.6.18-92.1.26.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 214e272106020f637115dec5f601bd81
kernel-headers-2.6.18-92.1.26.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 21be078f7bae9c4dd195d1f480a57dc2
kernel-xen-2.6.18-92.1.26.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 91c6f0c581db0abe86b7d5cc69875c01
kernel-xen-devel-2.6.18-92.1.26.el5.ia64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4bc06ef3fdc096ff3c9f571177593189
 
PPC:
kernel-2.6.18-92.1.26.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 567e424567472552d6824eb8ebcd6197
kernel-debug-2.6.18-92.1.26.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 581024b5c43b383abc6a3c12673ea8cb
kernel-debug-devel-2.6.18-92.1.26.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 6d1b08cd3fd5dac056a3de24ad635f0e
kernel-devel-2.6.18-92.1.26.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 0f38b0be075466de5c5538f36cc41c5d
kernel-doc-2.6.18-92.1.26.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 214e272106020f637115dec5f601bd81
kernel-headers-2.6.18-92.1.26.el5.ppc.rpm
File outdated by:  RHSA-2010:0148
    MD5: 0d6dd88cda7eb90848b09ac23159a1e9
kernel-headers-2.6.18-92.1.26.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: a68b7f65240802297817d87ab1bf70b7
kernel-kdump-2.6.18-92.1.26.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: f4611ed44fbfbf950f4fc467c0262056
kernel-kdump-devel-2.6.18-92.1.26.el5.ppc64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 217762f29987ca73faa1a7ef20118029
 
s390x:
kernel-2.6.18-92.1.26.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 70519b1adbcd42244df37af50ae38c8c
kernel-debug-2.6.18-92.1.26.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 45966019a08386d867e3b5387a1c06bb
kernel-debug-devel-2.6.18-92.1.26.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 6cc0eb3e8ef6ac77cd6a1ab069cf028c
kernel-devel-2.6.18-92.1.26.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: ca32f979d4116994321381cb1a28a826
kernel-doc-2.6.18-92.1.26.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 214e272106020f637115dec5f601bd81
kernel-headers-2.6.18-92.1.26.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 04b9bacea803d215dde7b054489da614
kernel-kdump-2.6.18-92.1.26.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: d387531047226d18905cb4e0db1bf84f
kernel-kdump-devel-2.6.18-92.1.26.el5.s390x.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1148bf79b1c8b82f1bbc9c26738dd19c
 
x86_64:
kernel-2.6.18-92.1.26.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4fe886f67e41cf1ba86a13fab1dcb00b
kernel-debug-2.6.18-92.1.26.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4fc748dcbb625ddd67cfab0969f2958b
kernel-debug-devel-2.6.18-92.1.26.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 4a182bb57f763f1885508f19fbb1926a
kernel-devel-2.6.18-92.1.26.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 232a0d93fa7bb438633a242a35cea4a2
kernel-doc-2.6.18-92.1.26.el5.noarch.rpm
File outdated by:  RHSA-2010:0148
    MD5: 214e272106020f637115dec5f601bd81
kernel-headers-2.6.18-92.1.26.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 1d1ca0e3874d8fdbc63f6f2d42b25136
kernel-xen-2.6.18-92.1.26.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 156f44db1b147fdf021246fea4f9da3a
kernel-xen-devel-2.6.18-92.1.26.el5.x86_64.rpm
File outdated by:  RHSA-2010:0148
    MD5: 5f1c39b8109139c4aac8a180dd489e4b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

478800 - CVE-2009-0065 kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/