Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2010-0008: Red Hat Customer Portal - Access to 24x7 support and knowledge

The sctp_rcv_ootb function in the SCTP implementation in the Linux kernel before 2.6.23 allows remote attackers to cause a denial of service (infinite loop) via (1) an Out Of The Blue (OOTB) chunk or (2) a chunk of zero length.

CVE
#vulnerability#mac#linux#red_hat#dos#intel#amd#ibm
  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • a NULL pointer dereference flaw was found in the sctp_rcv_ootb() function

in the Linux kernel Stream Control Transmission Protocol (SCTP)
implementation. A remote attacker could send a specially-crafted SCTP
packet to a target system, resulting in a denial of service.
(CVE-2010-0008, Important)

  • a NULL pointer dereference flaw was found in the Linux kernel. During a

core dump, the kernel did not check if the Virtual Dynamically-linked
Shared Object page was accessible. On Intel 64 and AMD64 systems, a local,
unprivileged user could use this flaw to cause a kernel panic by running a
crafted 32-bit application. (CVE-2009-4271, Important)

  • an information leak was found in the print_fatal_signal() implementation

in the Linux kernel. When “/proc/sys/kernel/print-fatal-signals” is set to
1 (the default value is 0), memory that is reachable by the kernel could be
leaked to user-space. This issue could also result in a system crash. Note
that this flaw only affected the i386 architecture. (CVE-2010-0003,
Moderate)

  • on AMD64 systems, it was discovered that the kernel did not ensure the

ELF interpreter was available before making a call to the SET_PERSONALITY
macro. A local attacker could use this flaw to cause a denial of service by
running a 32-bit application that attempts to execute a 64-bit application.
(CVE-2010-0307, Moderate)

  • missing capability checks were found in the ebtables implementation, used

for creating an Ethernet bridge firewall. This could allow a local,
unprivileged user to bypass intended capability restrictions and modify
ebtables rules. (CVE-2010-0007, Low)

This update also fixes the following bugs:

  • under some circumstances, a locking bug could have caused an online ext3

file system resize to deadlock, which may have, in turn, caused the file
system or the entire system to become unresponsive. In either case, a
reboot was required after the deadlock. With this update, using resize2fs
to perform an online resize of an ext3 file system works as expected.
(BZ#553135)

  • some ATA and SCSI devices were not honoring the barrier=1 mount option,

which could result in data loss after a crash or power loss. This update
applies a patch to the Linux SCSI driver to ensure ordered write caching.
This solution does not provide cache flushes; however, it does provide
data integrity on devices that have no write caching (or where write
caching is disabled) and no command queuing. For systems that have command
queuing or write cache enabled there is no guarantee of data integrity
after a crash. (BZ#560563)

  • it was found that lpfc_find_target() could loop continuously when

scanning a list of nodes due to a missing spinlock. This missing spinlock
allowed the list to be changed after the list_empty() test, resulting in a
NULL value, causing the loop. This update adds the spinlock, resolving the
issue. (BZ#561453)

  • the fix for CVE-2009-4538 provided by RHSA-2010:0020 introduced a

regression, preventing Wake on LAN (WoL) working for network devices using
the Intel PRO/1000 Linux driver, e1000e. Attempting to configure WoL for
such devices resulted in the following error, even when configuring valid
options:

“Cannot set new wake-on-lan settings: Operation not supported
not setting wol”

This update resolves this regression, and WoL now works as expected for
network devices using the e1000e driver. (BZ#565496)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc

Fixes

  • BZ - 548876 - CVE-2009-4271 kernel: 32bit process on 64bit system can trigger a kernel panic
  • BZ - 553135 - ext2online resize hangs [rhel-4.8.z]
  • BZ - 554578 - CVE-2010-0003 kernel: infoleak if print-fatal-signals=1
  • BZ - 555238 - CVE-2010-0007 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN
  • BZ - 555658 - CVE-2010-0008 kernel: sctp remote denial of service
  • BZ - 560547 - CVE-2010-0307 kernel: DoS on x86_64
  • BZ - 560563 - Write barrier operations not working for libata and general SCSI disks [rhel-4.8.z]
  • BZ - 561453 - [Emulex 4.9 bug] lpfc driver doesn’t acquire lock when searching hba for target [rhel-4.8.z]
  • BZ - 565496 - e1000e: wol is broken in kernel 2.6.9-89.19 [rhel-4.8.z]

CVEs

  • CVE-2010-0007
  • CVE-2010-0003
  • CVE-2010-0008
  • CVE-2009-4271
  • CVE-2010-0307

Red Hat Enterprise Linux Server 4

SRPM

kernel-2.6.9-89.0.23.EL.src.rpm

SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c

x86_64

kernel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47

kernel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47

kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca

kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de

kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de

kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da

kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da

kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb

kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb

kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136

kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136

kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf

kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf

kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117

kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117

ia64

kernel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46

kernel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46

kernel-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9

kernel-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2

kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2

kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac

kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac

i386

kernel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b

kernel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b

kernel-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f

kernel-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003

kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003

kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068

kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068

kernel-smp-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129

kernel-smp-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129

kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642

kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642

kernel-xenU-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827

kernel-xenU-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827

kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM

kernel-2.6.9-89.0.23.EL.src.rpm

SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c

x86_64

kernel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47

kernel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47

kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca

kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de

kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de

kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da

kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da

kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb

kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb

kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136

kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136

kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf

kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf

kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117

kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117

ia64

kernel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46

kernel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46

kernel-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9

kernel-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2

kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2

kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac

kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac

i386

kernel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b

kernel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b

kernel-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f

kernel-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003

kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003

kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068

kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068

kernel-smp-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129

kernel-smp-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129

kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642

kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642

kernel-xenU-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827

kernel-xenU-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827

kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

Red Hat Enterprise Linux Workstation 4

SRPM

kernel-2.6.9-89.0.23.EL.src.rpm

SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c

x86_64

kernel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47

kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de

kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da

kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb

kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136

kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf

kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117

ia64

kernel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 07c938cc658a6fbfb7a337bb07e4be19a05d69a426e36e17c661575ae7274f46

kernel-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 29727167974402d6f8aab117f1fedc394bf4218de6263fa564499832bbe087f9

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: 678b9e77a6d5bcb192df62c3fbc4e5f66f0b607c692543016fb3af0ca285b6b2

kernel-largesmp-devel-2.6.9-89.0.23.EL.ia64.rpm

SHA-256: cc9ee0ddefa5df6751265c6d911f82bf9d4a7e39d7bbf64ee6a329b05a08a7ac

i386

kernel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b

kernel-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003

kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068

kernel-smp-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129

kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642

kernel-xenU-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827

kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

Red Hat Enterprise Linux Desktop 4

SRPM

kernel-2.6.9-89.0.23.EL.src.rpm

SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c

x86_64

kernel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 6b6836ad6876df16cdb91af0e2e4db8d796228d7b5a21c79355078b123321f47

kernel-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 739cc3e8a639783e2b5c3e4234fcc13363385d2123d9fb040585f62fcee7fbca

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: fcce621887d543a330e2b75052acaca31d947745fa9c9883fa7f06758706b5de

kernel-largesmp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: aa50dfe504c1fc8e332aae2bcedf2ffa147876eef5d888a743da53b4e167b9da

kernel-smp-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: a7f5833e430928bb1d2d4e02519419e383421366d34bb2183263029d0eb460bb

kernel-smp-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: d86fa16c82fb1821ee61bfc16f75672e09ff7afeeee4a9d5444223928023c136

kernel-xenU-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 4c4da92e00f68ff9f5057fccb36378f803a1e414a8f8a5a05ccaddc0699a6eaf

kernel-xenU-devel-2.6.9-89.0.23.EL.x86_64.rpm

SHA-256: 33062b86e22d19246ae5e96c8393f01ced53205ad92f4a2c1cb3cc90d75c4117

i386

kernel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 7cfdcd6982f80f112dfa031fe1ff7372c12992f92f5f7129b289ab8596a8930b

kernel-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 865870315d84b0f9b90e285b81c835e0b2992e745a21a6f2aba6d64c05e21f9f

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-hugemem-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 8b98baf539cd1cdebba5911f7a4c71fcb646f1f9580d66e090f1b3f76f669003

kernel-hugemem-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 9ea6b655ef955fa8ddd6fa45e80f656986d8b093be04a3de7e7919403dd6e068

kernel-smp-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f5357dd63c3ca333d6cbb7ff967abb234e88e57fbb6d568feb07af31857db129

kernel-smp-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 1c041124b81b6946832ad0e1de697a2cc2716194ebdeda13ec62523b2bb7b642

kernel-xenU-2.6.9-89.0.23.EL.i686.rpm

SHA-256: 265fdea858ef2315e84484f5ffab47f5539307481b3611ea7e97c680dfa2e827

kernel-xenU-devel-2.6.9-89.0.23.EL.i686.rpm

SHA-256: f3b4eecfc1ce6adc7ac4bc346f85cd821d7ce07952285dbc882623376250bf34

Red Hat Enterprise Linux for IBM z Systems 4

SRPM

kernel-2.6.9-89.0.23.EL.src.rpm

SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c

s390x

kernel-2.6.9-89.0.23.EL.s390x.rpm

SHA-256: fa2446ba400b586435a4e18a9cf82922e754727154e0e97152ef87aadbb7d65f

kernel-devel-2.6.9-89.0.23.EL.s390x.rpm

SHA-256: 0cd1bec5aed4da66305f26d629c30a5c64baea8e82a5e7a3ef1eda2cf9fa2cf0

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

s390

kernel-2.6.9-89.0.23.EL.s390.rpm

SHA-256: e20f212ebc4283ae379036533af14aa937d370c863934a442fbdd497681d556d

kernel-devel-2.6.9-89.0.23.EL.s390.rpm

SHA-256: 1a4994f39318bcf173fa60bb51aadd475275d9bba82bdfc79834c94ff9743d85

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM

kernel-2.6.9-89.0.23.EL.src.rpm

SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c

s390x

kernel-2.6.9-89.0.23.EL.s390x.rpm

SHA-256: fa2446ba400b586435a4e18a9cf82922e754727154e0e97152ef87aadbb7d65f

kernel-devel-2.6.9-89.0.23.EL.s390x.rpm

SHA-256: 0cd1bec5aed4da66305f26d629c30a5c64baea8e82a5e7a3ef1eda2cf9fa2cf0

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

s390

kernel-2.6.9-89.0.23.EL.s390.rpm

SHA-256: e20f212ebc4283ae379036533af14aa937d370c863934a442fbdd497681d556d

kernel-devel-2.6.9-89.0.23.EL.s390.rpm

SHA-256: 1a4994f39318bcf173fa60bb51aadd475275d9bba82bdfc79834c94ff9743d85

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

Red Hat Enterprise Linux for Power, big endian 4

SRPM

kernel-2.6.9-89.0.23.EL.src.rpm

SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c

ppc

kernel-2.6.9-89.0.23.EL.ppc64.rpm

SHA-256: 403d99e3a6d18af49b6db58ec77b795d04e01df16c2ce9cab31b471f53285660

kernel-2.6.9-89.0.23.EL.ppc64iseries.rpm

SHA-256: 64e3e27af60253ef8c815133b58f9c9ea14192ae3996219af92154527730fd98

kernel-devel-2.6.9-89.0.23.EL.ppc64.rpm

SHA-256: 50dcc18da5fe0853779c67f38ae2a3c2591cf3e343fd371e6fd872d2108250b8

kernel-devel-2.6.9-89.0.23.EL.ppc64iseries.rpm

SHA-256: 49e197eac8970bf679e190cd761bd2bcca52699032a65ef6a402a7cfa30dfe30

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.ppc64.rpm

SHA-256: 9d4c81536f394870e93fd340943e901056604244fa3d87830c37a9f337523a1e

kernel-largesmp-devel-2.6.9-89.0.23.EL.ppc64.rpm

SHA-256: d238af3405703e891df2533df04226191751e8bbf8e408ec3af574f302c5e7c4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM

kernel-2.6.9-89.0.23.EL.src.rpm

SHA-256: 71742c22bc72dfb5b41344f0a002e5d69174df712334a6f83803f1e3e3c6372c

ppc

kernel-2.6.9-89.0.23.EL.ppc64.rpm

SHA-256: 403d99e3a6d18af49b6db58ec77b795d04e01df16c2ce9cab31b471f53285660

kernel-2.6.9-89.0.23.EL.ppc64iseries.rpm

SHA-256: 64e3e27af60253ef8c815133b58f9c9ea14192ae3996219af92154527730fd98

kernel-devel-2.6.9-89.0.23.EL.ppc64.rpm

SHA-256: 50dcc18da5fe0853779c67f38ae2a3c2591cf3e343fd371e6fd872d2108250b8

kernel-devel-2.6.9-89.0.23.EL.ppc64iseries.rpm

SHA-256: 49e197eac8970bf679e190cd761bd2bcca52699032a65ef6a402a7cfa30dfe30

kernel-doc-2.6.9-89.0.23.EL.noarch.rpm

SHA-256: 442251dce84976317f7b9f861d6d6f3169650e910cf89d1927ef96a888f5bdf0

kernel-largesmp-2.6.9-89.0.23.EL.ppc64.rpm

SHA-256: 9d4c81536f394870e93fd340943e901056604244fa3d87830c37a9f337523a1e

kernel-largesmp-devel-2.6.9-89.0.23.EL.ppc64.rpm

SHA-256: d238af3405703e891df2533df04226191751e8bbf8e408ec3af574f302c5e7c4

Related news

CVE-2010-0003: [SECURITY] Fedora 11 Update: kernel-2.6.30.10-105.2.4.fc11

The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907