First published: Tue Mar 30 2010(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br>This update fixes the following security issues:<br><li> a race condition was found in the mac80211 implementation, a framework</li> used for writing drivers for wireless devices. An attacker could trigger<br>this flaw by sending a Delete Block ACK (DELBA) packet to a target system,<br>resulting in a remote denial of service. Note: This issue only affected<br>users on 802.11n networks, and that also use the iwlagn driver with Intel<br>wireless hardware. (CVE-2009-4027, Important)<br><li> a flaw was found in the gfs2_lock() implementation. The GFS2 locking code</li> could skip the lock operation for files that have the S_ISGID bit<br>(set-group-ID on execution) in their mode set. A local, unprivileged user<br>on a system that has a GFS2 file system mounted could use this flaw to<br>cause a kernel panic. (CVE-2010-0727, Moderate)<br><li> a divide-by-zero flaw was found in the ext4 file system code. A local</li> attacker could use this flaw to cause a denial of service by mounting a<br>specially-crafted ext4 file system. (CVE-2009-4307, Low)<br>These updated packages also include several hundred bug fixes for and<br>enhancements to the Linux kernel. Space precludes documenting each of these<br>changes in this advisory and users are directed to the Red Hat Enterprise<br>Linux 5.5 Release Notes for information on the most significant of these<br>changes:<br><a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/" target="_blank">http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Release_Notes/</a> Also, for details concerning every bug fixed in and every enhancement added<br>to the kernel for this release, refer to the kernel chapter in the Red Hat<br>Enterprise Linux 5.5 Technical Notes:<br><a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html" target="_blank">http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.5/html/Technical_Notes/kernel.html</a> All Red Hat Enterprise Linux 5 users are advised to install these updated<br>packages, which address these vulnerabilities as well as fixing the bugs<br>and adding the enhancements noted in the Red Hat Enterprise Linux 5.5<br>Release Notes and Technical Notes. The system must be rebooted for this<br>update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-debug | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-debug-devel | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-devel | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-doc | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-headers | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-xen | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-xen-devel | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-debug | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-debug-devel | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-devel | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-headers | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-xen | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-xen-devel | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-kdump | <2.6.18-194.el5 | 2.6.18-194.el5 |
redhat/kernel-kdump-devel | <2.6.18-194.el5 | 2.6.18-194.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0178 is classified as moderate due to the potential for remote code execution through a race condition.
To fix RHSA-2010:0178, update your kernel packages to version 2.6.18-194.el5 or later.
The affected software for RHSA-2010:0178 includes several kernel packages such as kernel, kernel-debug, and kernel-devel for the el5 distribution.
RHSA-2010:0178 addresses a race condition vulnerability in the mac80211 implementation used for wireless device drivers.
Yes, the fix for the wireless driver vulnerability can be applied by updating to the recommended kernel version specified in RHSA-2010:0178.