Start Updating redhat linux

Updating redhat linux

If a system using IPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote attacker could send an IPv6 packet to that system, causing a kernel panic (denial of service).

Red Hat Enterprise Linux 5 kernel security update (RHSA-2010-0380 RHSA-2010-0178 RHSA-2010-0439) Original Release Date: May 11, 2010 Last Revised: July 12, 2011 Number: ASA-2010-130 Risk Level: Low Advisory Version: 8.0 Advisory Status: Final The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security fixes: * a race condition was found in the mac80211 implementation, a framework used for writing drivers for wireless devices.

ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS".

AVAYA INC., ON BEHALF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO AS "AVAYA"), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS' SYSTEMS.

Customers should determine on which Linux operating system the product was installed and then follow that vendor's guidance.

Recommended Actions for Software-Only Products: In the event that the affected package is installed, Avaya recommends that customers follow recommended actions supplied by Red Hat Linux.

These vulnerabilities often do not impact the software-only product directly but may threaten the integrity of the underlying platform.

In the case of this advisory Avaya software-only products are not affected by the vulnerability directly but the underlying Linux platform may be.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2009-4307 to this issue.

More information about these vulnerabilities can be found in the security advisories issued by Red Hat Linux: Recommended Actions for System Products: Avaya strongly recommends that customers follow networking and security best practices by implementing firewalls, ACLs, physical security or other appropriate access restrictions.

* a divide-by-zero flaw was found in the ext4 file system code.