Red Hat Enterprise Linux 5 IMPORTANT Security Update [ 4-Nov-2008 ]

in Categories kernel, Linux, News, RedHat/Fedora Linux, Security, Security Alert last updated November 4, 2008

Red Hat today released kernel updates to fix at least 15 security flaws in its core called Linux kernel. RHEL users can grab the latest updates from RHN website or by simply running yum update command. This update has been rated as having important security impact.

The Xen implementation did not prevent applications running in a para-virtualized guest from modifying CR4 TSC. This could cause a local denial of service. (CVE-2007-5907, Important)

Tavis Ormandy reported missing boundary checks in the Virtual Dynamic Shared Objects (vDSO) implementation. This could allow a local unprivileged user to cause a denial of service or escalate privileges. (CVE-2008-3527, Important)

The do_truncate() and generic_file_splice_write() functions did not clear the setuid and setgid bits. This could allow a local unprivileged user to obtain access to privileged information. (CVE-2008-4210, CVE-2008-3833, Important)

A flaw was found in the Linux kernel splice implementation. This could cause a local denial of service when there is a certain failure in the add_to_page_cache_lru() function. (CVE-2008-4302, Important)

How do I upgrade RHEL 5 system kernel?

Simply type the command:
# yum update -y
# reboot

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin and a trainer for the Linux operating system/Unix shell scripting. He has worked with global clients and in various industries, including IT, education, defense and space research, and the nonprofit sector. Follow him on Twitter, Facebook, Google+.

Share this on (or read 2 comments/add one below):

2 comment

  1. ******* NOTE: this is NOT A CRITICAL security update ****

    Redhat categorizes this as an ‘IMPORTANT’ update, which is well below critical.


    This is a very low level update according to redhat…no need to put “CRITICAL” in your headline.

    Have a question? Post it on our forum!