Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:1077 - Security Advisory
Issued:
2009-06-02
Updated:
2009-06-02

RHSA-2009:1077 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix two security issues and two bugs are now
available for Red Hat Enterprise Linux 4.7 Extended Update Support.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update includes backported fixes for two approved security issues.
These issues only affected users of Red Hat Enterprise Linux 4.7 Extended
Update Support, as they have already been addressed for users of Red Hat
Enterprise Linux 4 in the 4.8 update, RHSA-2009:1024.

  • the exit_notify() function in the Linux kernel did not properly reset the

exit signal if a process executed a set user ID (setuid) application before
exiting. This could allow a local, unprivileged user to elevate their
privileges. (CVE-2009-1337, Important)

  • the Linux kernel implementation of the Network File System (NFS) version

4 did not properly initialize the file name limit in the nfs_server data
structure. This flaw could possibly lead to a denial of service on a client
mounting an NFSv4 share. (CVE-2009-1336, Moderate)

This update fixes the following bugs:

  • on IBM System z systems, if the cio driver was used for DASD devices, and

the last path to a DASD device was varied off, it was still possible to
attempt read and write operations to that device, resulting in errors. In
this update, path verification is used in this situation, which resolves
this issue. Also, a bug may have caused errors when subchannels were
unregistered. (BZ#437486)

  • a bug prevented the Broadcom NetXtreme II 57710 network device from

working correctly on some Dell PowerEdge R805 systems. This device was
correctly shown in "lspci" output, but "ifup" failed and an IP address was
not assigned. In this update, the device works correctly on Dell PowerEdge
R805 systems. (BZ#491752)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. For this update to take effect, the system
must be rebooted.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7 ppc

Fixes

  • BZ - 491752 - For Broadcom(r) BMC57710, modprobe bnx2* fails citing memory allocation failures
  • BZ - 493771 - CVE-2009-1337 kernel: exit_notify: kill the wrong capable(CAP_KILL) check
  • BZ - 494074 - CVE-2009-1336 kernel: nfsv4 client can be crashed by stating a long filename

CVEs

  • CVE-2009-1337
  • CVE-2009-1336

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.24.EL.src.rpm SHA-256: f6a810946bce52c4d5f27d698a3b29dcc3e9625a961fd250467a51706ae11683
x86_64
kernel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 700429cdc7bac90526a44eabe8759f3e920b45ef7dbc8c2f235e9913744395e3
kernel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 700429cdc7bac90526a44eabe8759f3e920b45ef7dbc8c2f235e9913744395e3
kernel-devel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: b15ea6ac8ae0063bf470095dac64dd31e6b0f3403b4b72771d2ad3b31a22501e
kernel-devel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: b15ea6ac8ae0063bf470095dac64dd31e6b0f3403b4b72771d2ad3b31a22501e
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402
kernel-largesmp-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: a667071b540be324fadb9783e2cb5c62305f5d4205dbe8e383b40b0529848293
kernel-largesmp-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: a667071b540be324fadb9783e2cb5c62305f5d4205dbe8e383b40b0529848293
kernel-largesmp-devel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 2bd3c11e1b66221575349b64098e6dece548c014940e47e9fdd8af8b2c147f1f
kernel-largesmp-devel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 2bd3c11e1b66221575349b64098e6dece548c014940e47e9fdd8af8b2c147f1f
kernel-smp-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 4e124e0552d8e11f5b3062dba880eab1e4f0dd5be814a7815beac6ce79c0f5b6
kernel-smp-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 4e124e0552d8e11f5b3062dba880eab1e4f0dd5be814a7815beac6ce79c0f5b6
kernel-smp-devel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: a358ea74246f4bde533fdf5be806ac75cb09e13fb5d38838a155db458abedfbb
kernel-smp-devel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: a358ea74246f4bde533fdf5be806ac75cb09e13fb5d38838a155db458abedfbb
kernel-xenU-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 1e76425aacbffad27d1e0f5fafb0faff5f9ffee85840ae94cd06c7ad53a765ef
kernel-xenU-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 1e76425aacbffad27d1e0f5fafb0faff5f9ffee85840ae94cd06c7ad53a765ef
kernel-xenU-devel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 3f808dddeb500414ccdf704730a5481a0e66e49847b2a33504fdc42b024922bd
kernel-xenU-devel-2.6.9-78.0.24.EL.x86_64.rpm SHA-256: 3f808dddeb500414ccdf704730a5481a0e66e49847b2a33504fdc42b024922bd
ia64
kernel-2.6.9-78.0.24.EL.ia64.rpm SHA-256: 537b620f6314031684512350929fa44ecf90ad2acf18a26f6a9f94c6c399e6fe
kernel-2.6.9-78.0.24.EL.ia64.rpm SHA-256: 537b620f6314031684512350929fa44ecf90ad2acf18a26f6a9f94c6c399e6fe
kernel-devel-2.6.9-78.0.24.EL.ia64.rpm SHA-256: 8254a79ead505305b0112e3f08941f7c3888110366a074860155b922d174b0dd
kernel-devel-2.6.9-78.0.24.EL.ia64.rpm SHA-256: 8254a79ead505305b0112e3f08941f7c3888110366a074860155b922d174b0dd
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402
kernel-largesmp-2.6.9-78.0.24.EL.ia64.rpm SHA-256: 40cf642ea35503e32c37da3d132d1302578f822e1a035fc1b9d9f8af5b8e81be
kernel-largesmp-2.6.9-78.0.24.EL.ia64.rpm SHA-256: 40cf642ea35503e32c37da3d132d1302578f822e1a035fc1b9d9f8af5b8e81be
kernel-largesmp-devel-2.6.9-78.0.24.EL.ia64.rpm SHA-256: 605388099f757a8c9aa372a0d5fd670b52fc16a216a3b67766d2d84cde096f98
kernel-largesmp-devel-2.6.9-78.0.24.EL.ia64.rpm SHA-256: 605388099f757a8c9aa372a0d5fd670b52fc16a216a3b67766d2d84cde096f98
i386
kernel-2.6.9-78.0.24.EL.i686.rpm SHA-256: a86c0ca73693fa88a8106be575d28b404706e7a540a5b7d9e65ebc691eb57c74
kernel-2.6.9-78.0.24.EL.i686.rpm SHA-256: a86c0ca73693fa88a8106be575d28b404706e7a540a5b7d9e65ebc691eb57c74
kernel-devel-2.6.9-78.0.24.EL.i686.rpm SHA-256: 5003b8419c0ca571245fb04cbe6fc652d01776326e26d365a4b8553cd428be68
kernel-devel-2.6.9-78.0.24.EL.i686.rpm SHA-256: 5003b8419c0ca571245fb04cbe6fc652d01776326e26d365a4b8553cd428be68
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402
kernel-hugemem-2.6.9-78.0.24.EL.i686.rpm SHA-256: 5e7921d8069074a5a250761eee84363a7b09acdfd6a19b29ec362c52037bac2d
kernel-hugemem-2.6.9-78.0.24.EL.i686.rpm SHA-256: 5e7921d8069074a5a250761eee84363a7b09acdfd6a19b29ec362c52037bac2d
kernel-hugemem-devel-2.6.9-78.0.24.EL.i686.rpm SHA-256: da55a5c7055d7f623ad8583077d9dbea00fed986d1d2a9a4e662c28b5865d977
kernel-hugemem-devel-2.6.9-78.0.24.EL.i686.rpm SHA-256: da55a5c7055d7f623ad8583077d9dbea00fed986d1d2a9a4e662c28b5865d977
kernel-smp-2.6.9-78.0.24.EL.i686.rpm SHA-256: cb047f617e554afe7b397da96d7342fb28c2d7b09d8aaa2fe44fda0ea0fc7cfb
kernel-smp-2.6.9-78.0.24.EL.i686.rpm SHA-256: cb047f617e554afe7b397da96d7342fb28c2d7b09d8aaa2fe44fda0ea0fc7cfb
kernel-smp-devel-2.6.9-78.0.24.EL.i686.rpm SHA-256: 9a2e49ce99c8330ae0619b80ba9b7d775dd387bfe0914bd9f6c45bebc5091d1d
kernel-smp-devel-2.6.9-78.0.24.EL.i686.rpm SHA-256: 9a2e49ce99c8330ae0619b80ba9b7d775dd387bfe0914bd9f6c45bebc5091d1d
kernel-xenU-2.6.9-78.0.24.EL.i686.rpm SHA-256: 7c1227e3fcef804a02bc7004e41653bf210fde9a5fede1845f81613c2e2fe973
kernel-xenU-2.6.9-78.0.24.EL.i686.rpm SHA-256: 7c1227e3fcef804a02bc7004e41653bf210fde9a5fede1845f81613c2e2fe973
kernel-xenU-devel-2.6.9-78.0.24.EL.i686.rpm SHA-256: b25a4719805595c196bdbb982a3ed8c2e43df675b26fe98241df3b195c41b2c5
kernel-xenU-devel-2.6.9-78.0.24.EL.i686.rpm SHA-256: b25a4719805595c196bdbb982a3ed8c2e43df675b26fe98241df3b195c41b2c5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.24.EL.src.rpm SHA-256: f6a810946bce52c4d5f27d698a3b29dcc3e9625a961fd250467a51706ae11683
s390x
kernel-2.6.9-78.0.24.EL.s390x.rpm SHA-256: 6151b8566089245fb40dc03cda171331d4a8360489c2f12bffb539660502fa7d
kernel-devel-2.6.9-78.0.24.EL.s390x.rpm SHA-256: 476690bd7a0231bcdd9f5690238d92df799f447c14564a99e7fe3d10f18ac485
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402
s390
kernel-2.6.9-78.0.24.EL.s390.rpm SHA-256: ecd09b085d258bba3e1e027a91cc88789580f10c88e44d894d038de4b4c92749
kernel-devel-2.6.9-78.0.24.EL.s390.rpm SHA-256: 1bb83fdeef1af6a9a9360be3e79a0be8b471b906201c148465c9c63bccc704d1
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.24.EL.src.rpm SHA-256: f6a810946bce52c4d5f27d698a3b29dcc3e9625a961fd250467a51706ae11683
ppc
kernel-2.6.9-78.0.24.EL.ppc64.rpm SHA-256: de4087e3be0279869341eaef01baa37ddd29ad0f9d22bcb7f7c58341d81db2bd
kernel-2.6.9-78.0.24.EL.ppc64iseries.rpm SHA-256: 4eb5be6ef1a1cfb41b42b9b03ab71f07f800ae807d47a7f060b6d37099936f5a
kernel-devel-2.6.9-78.0.24.EL.ppc64.rpm SHA-256: 32be55eafc7307d82df088dc335b764285174a254ebb581c27ade8af98e46618
kernel-devel-2.6.9-78.0.24.EL.ppc64iseries.rpm SHA-256: 0d844a22224eeae57828b3df2a50c56a7f328249fa92e8a29c1a6977205a9fd1
kernel-doc-2.6.9-78.0.24.EL.noarch.rpm SHA-256: f3af01b45ad2d7825c64ddc162d19d1f44140d885068d8e954627e31468c2402
kernel-largesmp-2.6.9-78.0.24.EL.ppc64.rpm SHA-256: ec86f62d730326f41271a759c825d5bf784efc9d7b7eb85d30a4573de5caa8d1
kernel-largesmp-devel-2.6.9-78.0.24.EL.ppc64.rpm SHA-256: 27fd3fce52f3904c3404707dc3f52da2b498aa44e71a4b8fdb0baa450a78f910

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility