Oval Definition:oval:com.redhat.rhsa:def:20100606
Revision Date:2010-08-05Version:648
Title:RHSA-2010:0606: kernel security and bug fix update (Important)
Description:The kernel packages contain the Linux kernel, the core of any Linux operating system.

This update fixes the following security issues:

  • a flaw was found in the CIFSSMBWrite() function in the Linux kernel Common Internet File System (CIFS) implementation. A remote attacker could send a specially-crafted SMB response packet to a target CIFS client, resulting in a kernel panic (denial of service). (CVE-2010-2248, Important)

  • buffer overflow flaws were found in the Linux kernel's implementation of the server-side External Data Representation (XDR) for the Network File System (NFS) version 4. An attacker on the local network could send a specially-crafted large compound request to the NFSv4 server, which could possibly result in a kernel panic (denial of service) or, potentially, code execution. (CVE-2010-2521, Important)

    This update also fixes the following bug:

  • the rpc_call_async() function in the SUN Remote Procedure Call (RPC) subsystem in the Linux kernel had a reference counting bug. In certain situations, some Network Lock Manager (NLM) messages may have triggered this bug on NFSv2 and NFSv3 servers, leading to a kernel panic (with "kernel BUG at fs/lockd/host.c:[xxx]!" logged to "/var/log/messages"). (BZ#612962)

    Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2010-2248
    CVE-2010-2521
    RHSA-2010:0606
    RHSA-2010:0606-01
    RHSA-2010:0606-01
    Platform(s):Red Hat Enterprise Linux 4
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 4 is installed
  • AND
  • kernel earlier than 0:2.6.9-89.0.28.EL is currently running
  • OR kernel earlier than 0:2.6.9-89.0.28.EL is set to boot up on next boot
  • AND
  • kernel is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel is signed with Red Hat redhatrelease2 key
  • kernel-devel is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-devel is signed with Red Hat redhatrelease2 key
  • kernel-doc is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-doc is signed with Red Hat redhatrelease2 key
  • kernel-hugemem is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-hugemem is signed with Red Hat redhatrelease2 key
  • kernel-hugemem-devel is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-hugemem-devel is signed with Red Hat redhatrelease2 key
  • kernel-largesmp is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-largesmp is signed with Red Hat redhatrelease2 key
  • kernel-largesmp-devel is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-largesmp-devel is signed with Red Hat redhatrelease2 key
  • kernel-smp is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-smp is signed with Red Hat redhatrelease2 key
  • kernel-smp-devel is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-smp-devel is signed with Red Hat redhatrelease2 key
  • kernel-xenU is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-xenU is signed with Red Hat redhatrelease2 key
  • kernel-xenU-devel is earlier than 0:2.6.9-89.0.28.EL
  • AND kernel-xenU-devel is signed with Red Hat redhatrelease2 key
  • BACK