First published: Tue Nov 03 2009(Updated: )
The kernel-rt packages contain the Linux kernel, the core of any Linux<br>operating system.<br>Security fixes:<br><li> the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a</li> setuid or setgid program was executed. A local, unprivileged user could use<br>this flaw to bypass the mmap_min_addr protection mechanism and perform a<br>NULL pointer dereference attack, or bypass the Address Space Layout<br>Randomization (ASLR) security feature. (CVE-2009-1895, Important)<br><li> a system with SELinux enforced was more permissive in allowing local</li> users in the unconfined_t domain to map low memory areas even if the<br>mmap_min_addr restriction was enabled. This could aid in the local<br>exploitation of NULL pointer dereference bugs. (CVE-2009-2695, Important)<br><li> missing initialization flaws were found in getname() implementations in</li> numerous network protocol implementations in the Linux kernel. Certain<br>data structures in these getname() implementations were not initialized<br>properly before being copied to user-space. These flaws could lead to an<br>information leak. (CVE-2009-3002, Important)<br><li> a NULL pointer dereference flaw was found in each of the following</li> functions in the Linux kernel: pipe_read_open(), pipe_write_open(), and<br>pipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could<br>be released by other processes before it is used to update the pipe's<br>reader and writer counters. This could lead to a local denial of service or<br>privilege escalation. (CVE-2009-3547, Important)<br><li> a flaw was found in the Realtek r8169 Ethernet driver in the Linux</li> kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU<br>space exhaustion and a system crash. An attacker on the local network could<br>abuse this flaw by using jumbo frames for large amounts of network traffic.<br>(CVE-2009-3613, Important)<br><li> NULL pointer dereference flaws were found in the r128 driver in the</li> Linux kernel. Checks to test if the Concurrent Command Engine state was<br>initialized were missing in private IOCTL functions. An attacker could use<br>these flaws to cause a local denial of service or escalate their<br>privileges. (CVE-2009-3620, Important)<br><li> Kees Cook and Steve Beattie discovered a race condition in the /proc</li> code in the Linux kernel. This could lead to information in the<br>"/proc/[pid]/maps" and "/proc/[pid]/smaps" files being leaked to users (who<br>would otherwise not have access to this information) during ELF loading.<br>This could help a local attacker bypass the ASLR security feature.<br>(CVE-2009-2691, Moderate)<br><li> a NULL pointer dereference flaw was found in the md driver in the Linux</li> kernel. If the suspend_lo or suspend_hi file in "/sys/" is modified when<br>the disk array is inactive, it could lead to a local denial of service or<br>privilege escalation. By default, only root can write to these two files.<br>(CVE-2009-2849, Moderate)<br><li> an information leak was found in the Linux kernel. On AMD64 systems,</li> 32-bit processes could access and read certain 64-bit registers by<br>temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)<br><li> padding data in several core network structures was not initialized</li> properly before being sent to user-space, possibly leading to information<br>leaks. (CVE-2009-3228, CVE-2009-3612, Moderate)<br><li> the unix_stream_connect() function in the Linux kernel did not check if a</li> UNIX domain socket was in the shutdown state. This could lead to a<br>deadlock. A local, unprivileged user could use this flaw to cause a denial<br>of service. (CVE-2009-3621, Moderate)<br>These updated packages also include bug fixes and enhancements. Users are<br>directed to the Realtime Security Update Release Notes for version 1.1 for<br>information on these changes, which will be available shortly from: <br><a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/" target="_blank">http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/</a> Users should upgrade to these updated packages, which contain backported<br>patches to correct these issues and add enhancements. The system must be<br>rebooted for this update to take effect.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.