First published: Thu Aug 27 2009(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br>These updated packages fix the following security issues:<br><li> a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This</li> macro did not initialize the sendpage operation in the proto_ops structure<br>correctly. A local, unprivileged user could use this flaw to cause a local<br>denial of service or escalate their privileges. (CVE-2009-2692, Important)<br><li> a flaw was found in the udp_sendmsg() implementation in the Linux kernel</li> when using the MSG_MORE flag on UDP sockets. A local, unprivileged user<br>could use this flaw to cause a local denial of service or escalate their<br>privileges. (CVE-2009-2698, Important)<br>Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google<br>Security Team for responsibly reporting these flaws.<br>All Red Hat Enterprise Linux 3 users should upgrade to these updated<br>packages, which contain backported patches to resolve these issues. The<br>system must be rebooted for this update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | ||
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2009:1233 is classified as important.
To fix RHSA-2009:1233, you should update your kernel packages to the latest version provided by your Linux distribution.
RHSA-2009:1233 affects various systems running an affected version of the Linux kernel.
RHSA-2009:1233 addresses a flaw in the SOCKOPS_WRAP macro related to the sendpage operation in the Linux kernel.
Yes, if not patched, the vulnerabilities fixed in RHSA-2009:1233 could potentially be exploited by attackers.