First published: Wed Dec 08 2010(Updated: )
The kernel-rt packages contain the Linux kernel, the core of any Linux<br>operating system.<br>Security fixes:<br><li> Missing sanity checks in the Intel i915 driver in the Linux kernel could</li> allow a local, unprivileged user to escalate their privileges.<br>(CVE-2010-2962, Important)<br><li> A flaw in sctp_packet_config() in the Linux kernel's Stream Control</li> Transmission Protocol (SCTP) implementation could allow a remote attacker<br>to cause a denial of service. (CVE-2010-3432, Important)<br><li> A missing integer overflow check in snd_ctl_new() in the Linux kernel's</li> sound subsystem could allow a local, unprivileged user on a 32-bit system<br>to cause a denial of service or escalate their privileges. (CVE-2010-3442,<br>Important)<br><li> A flaw in sctp_auth_asoc_get_hmac() in the Linux kernel's SCTP</li> implementation. When iterating through the hmac_ids array, it did not reset<br>the last id element if it was out of range. This could allow a remote<br>attacker to cause a denial of service. (CVE-2010-3705, Important)<br><li> Missing sanity checks in setup_arg_pages() in the Linux kernel. When</li> making the size of the argument and environment area on the stack very<br>large, it could trigger a BUG_ON(), resulting in a local denial of service.<br>(CVE-2010-3858, Moderate)<br><li> A flaw in ethtool_get_rxnfc() in the Linux kernel's ethtool IOCTL</li> handler. When it is called with a large info.rule_cnt, it could allow a<br>local user to cause an information leak. (CVE-2010-3861, Moderate)<br><li> A flaw in bcm_connect() in the Linux kernel's Controller Area Network</li> (CAN) Broadcast Manager. On 64-bit systems, writing the socket address may<br>overflow the procname character array. (CVE-2010-3874, Moderate)<br><li> A flaw in inet_csk_diag_dump() in the Linux kernel's module for</li> monitoring the sockets of INET transport protocols. By sending a netlink<br>message with certain bytecode, a local, unprivileged user could cause a<br>denial of service. (CVE-2010-3880, Moderate)<br><li> Missing sanity checks in gdth_ioctl_alloc() in the gdth driver in the</li> Linux kernel, could allow a local user with access to "/dev/gdth" on a<br>64-bit system to cause a denial of service or escalate their privileges.<br>(CVE-2010-4157, Moderate)<br><li> A use-after-free flaw in the mprotect() system call could allow a local,</li> unprivileged user to cause a local denial of service. (CVE-2010-4169,<br>Moderate)<br><li> Missing initialization flaws in the Linux kernel could lead to</li> information leaks. (CVE-2010-3876, CVE-2010-4072, CVE-2010-4073,<br>CVE-2010-4074, CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080,<br>CVE-2010-4082, CVE-2010-4083, CVE-2010-4158, Low)<br>Red Hat would like to thank Kees Cook for reporting CVE-2010-2962,<br>CVE-2010-3861, and CVE-2010-4072; Dan Rosenberg for reporting<br>CVE-2010-3442, CVE-2010-3705, CVE-2010-3874, CVE-2010-4073, CVE-2010-4074,<br>CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4082,<br>CVE-2010-4083, and CVE-2010-4158; Brad Spengler for reporting<br>CVE-2010-3858; Nelson Elhage for reporting CVE-2010-3880; and Vasiliy<br>Kulikov for reporting CVE-2010-3876.<br>Bug fixes:<br><li> A vulnerability in the 32-bit compatibility code for the VIDIOCSMICROCODE</li> IOCTL in the Video4Linux implementation. It does not affect Red Hat<br>Enterprise MRG, but as a preventive measure, this update removes the code.<br>Red Hat would like to thank Kees Cook for reporting this vulnerability.<br>(BZ#642469)<br><li> The kernel-rt spec file was missing the crypto, drm, generated, and trace</li> header directories when generating the kernel-rt-devel package, resulting<br>in out-of-tree modules failing to build. (BZ#608784)<br><li> On computers without a supported Performance Monitoring Unit, a crash</li> would occur when running the "perf top" command, and occasionally other<br>perf commands. perf software events are now marked as IRQ safe to avoid<br>this crash. (BZ#647434)<br>Users should upgrade to these updated packages, which contain backported<br>patches to correct these issues. The system must be rebooted for this<br>update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.