Red Hat Enterprise Linux 5 IMPORTANT Security Update [ 4-Nov-2008 ]

last updated in Categories kernel, Linux, News, RedHat/Fedora Linux, Security, Security Alert

Red Hat today released kernel updates to fix at least 15 security flaws in its core called Linux kernel. RHEL users can grab the latest updates from RHN website or by simply running yum update command. This update has been rated as having important security impact.

The Xen implementation did not prevent applications running in a para-virtualized guest from modifying CR4 TSC. This could cause a local denial of service. (CVE-2007-5907, Important)

Tavis Ormandy reported missing boundary checks in the Virtual Dynamic Shared Objects (vDSO) implementation. This could allow a local unprivileged user to cause a denial of service or escalate privileges. (CVE-2008-3527, Important)

The do_truncate() and generic_file_splice_write() functions did not clear the setuid and setgid bits. This could allow a local unprivileged user to obtain access to privileged information. (CVE-2008-4210, CVE-2008-3833, Important)

A flaw was found in the Linux kernel splice implementation. This could cause a local denial of service when there is a certain failure in the add_to_page_cache_lru() function. (CVE-2008-4302, Important)

How do I upgrade RHEL 5 system kernel?

Simply type the command:
# yum update -y
# reboot

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

2 comment

  1. ******* NOTE: this is NOT A CRITICAL security update ****

    Redhat categorizes this as an ‘IMPORTANT’ update, which is well below critical.


    This is a very low level update according to redhat…no need to put “CRITICAL” in your headline.

    Have a question? Post it on our forum!