First published: Tue Feb 16 2010(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br>This update fixes the following security issues:<br><li> a flaw was found in each of the following Intel PRO/1000 Linux drivers in</li> the Linux kernel: e1000 and e1000e. A remote attacker using packets larger<br>than the MTU could bypass the existing fragment check, resulting in<br>partial, invalid frames being passed to the network stack. These flaws<br>could also possibly be used to trigger a remote denial of service.<br>(CVE-2009-4536, CVE-2009-4538, Important)<br><li> a flaw was found in the Realtek r8169 Ethernet driver in the Linux</li> kernel. Receiving overly-long frames with a certain revision of the network<br>cards supported by this driver could possibly result in a remote denial of<br>service. (CVE-2009-4537, Important)<br>Users should upgrade to these updated packages, which contain backported<br>patches to correct these issues. The system must be rebooted for this<br>update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0111 is rated as critical due to the potential for remote code execution.
To fix RHSA-2010:0111, update your Linux kernel packages to the latest version provided by your distribution.
RHSA-2010:0111 addresses vulnerabilities in the Intel PRO/1000 Linux drivers e1000 and e1000e.
All users utilizing affected Intel PRO/1000 network drivers in their Linux kernel are at risk from RHSA-2010:0111.
Yes, RHSA-2010:0111 includes vulnerabilities that could be exploited by remote attackers.