Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:1469 - Security Advisory
Issued:
2009-09-30
Updated:
2009-09-30

RHSA-2009:1469 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix several security issues are now available
for Red Hat Enterprise Linux 4.7 Extended Update Support.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in

the Linux kernel. This driver allowed interfaces using this driver to
receive frames larger than what could be handled. This could lead to a
remote denial of service or code execution. (CVE-2009-1389, Important)

  • Tavis Ormandy and Julien Tinnes of the Google Security Team reported a

flaw in the SOCKOPS_WRAP macro in the Linux kernel. This macro did not
initialize the sendpage operation in the proto_ops structure correctly. A
local, unprivileged user could use this flaw to cause a local denial of
service or escalate their privileges. (CVE-2009-2692, Important)

  • Tavis Ormandy and Julien Tinnes of the Google Security Team reported a

flaw in the udp_sendmsg() implementation in the Linux kernel when using the
MSG_MORE flag on UDP sockets. A local, unprivileged user could use this
flaw to cause a local denial of service or escalate their privileges.
(CVE-2009-2698, Important)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7 ppc

Fixes

  • BZ - 504726 - CVE-2009-1389 kernel: r8169: fix crash when large packets are received
  • BZ - 516949 - CVE-2009-2692 kernel: uninit op in SOCKOPS_WRAP() leads to privesc
  • BZ - 518034 - CVE-2009-2698 kernel: udp socket NULL ptr dereference

CVEs

  • CVE-2009-1389
  • CVE-2009-2698
  • CVE-2009-2692

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.27.EL.src.rpm SHA-256: 387969e198f7e5882b3a33903d49e9335cbc6272531f12afcf075155ce08f85f
x86_64
kernel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 76b0bce12a6e509b351e199ae40ca8a86b75bf75036ae91f8dbd24b6ed98c20e
kernel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 76b0bce12a6e509b351e199ae40ca8a86b75bf75036ae91f8dbd24b6ed98c20e
kernel-devel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 89647c009fee09d64b1d486a9d31bd2fbbd50c60a3cd16173df722a2d607bdc9
kernel-devel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 89647c009fee09d64b1d486a9d31bd2fbbd50c60a3cd16173df722a2d607bdc9
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e
kernel-largesmp-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 8a780d0fdab2e5d845dd96af1b5bda016c52ef7f8512ab2cb8cc70f3b41e97e5
kernel-largesmp-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 8a780d0fdab2e5d845dd96af1b5bda016c52ef7f8512ab2cb8cc70f3b41e97e5
kernel-largesmp-devel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 4fdf13354b36f6cbc61efe66030952be3d39f5de87e6719ad404660cb25daa71
kernel-largesmp-devel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 4fdf13354b36f6cbc61efe66030952be3d39f5de87e6719ad404660cb25daa71
kernel-smp-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 23e3a12ef4bc9e2904de62346cc4aac70cfd340bc9d45527f1018ca39664c92f
kernel-smp-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 23e3a12ef4bc9e2904de62346cc4aac70cfd340bc9d45527f1018ca39664c92f
kernel-smp-devel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 3a9ee95e48d68a5aa93dd627c4dae26a42acfe638b6fcaf7d59417eca6e1fb8f
kernel-smp-devel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 3a9ee95e48d68a5aa93dd627c4dae26a42acfe638b6fcaf7d59417eca6e1fb8f
kernel-xenU-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 6c9775774d748c71d5278b19966f5f7c9511aa127a3fb5f86ae17c20f5e65283
kernel-xenU-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 6c9775774d748c71d5278b19966f5f7c9511aa127a3fb5f86ae17c20f5e65283
kernel-xenU-devel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 0fb6ace09e424e518f744eb92e457cb02a19449346968fab897a120a6accf20c
kernel-xenU-devel-2.6.9-78.0.27.EL.x86_64.rpm SHA-256: 0fb6ace09e424e518f744eb92e457cb02a19449346968fab897a120a6accf20c
ia64
kernel-2.6.9-78.0.27.EL.ia64.rpm SHA-256: e1ba14f3c8ef769e76276595b7d7739d8f8f16e650b1db5accfdacfb0ba67879
kernel-2.6.9-78.0.27.EL.ia64.rpm SHA-256: e1ba14f3c8ef769e76276595b7d7739d8f8f16e650b1db5accfdacfb0ba67879
kernel-devel-2.6.9-78.0.27.EL.ia64.rpm SHA-256: c260b51e8e4b169ab5fd8dab9d3f2ab3adb0f73917814976baf576833979be82
kernel-devel-2.6.9-78.0.27.EL.ia64.rpm SHA-256: c260b51e8e4b169ab5fd8dab9d3f2ab3adb0f73917814976baf576833979be82
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e
kernel-largesmp-2.6.9-78.0.27.EL.ia64.rpm SHA-256: cccf59a2d7625e4f3298c9ca52931159859ea54586070c6e07a30a28f0368e1f
kernel-largesmp-2.6.9-78.0.27.EL.ia64.rpm SHA-256: cccf59a2d7625e4f3298c9ca52931159859ea54586070c6e07a30a28f0368e1f
kernel-largesmp-devel-2.6.9-78.0.27.EL.ia64.rpm SHA-256: d8b6076a1cfaaf46f69542db896b3ae0894568e6540f37eb218e495a006cebff
kernel-largesmp-devel-2.6.9-78.0.27.EL.ia64.rpm SHA-256: d8b6076a1cfaaf46f69542db896b3ae0894568e6540f37eb218e495a006cebff
i386
kernel-2.6.9-78.0.27.EL.i686.rpm SHA-256: d76c83e65d13e62fcf81c13ef3284eef3b3af2a75509ba2d4ce7e0b018813988
kernel-2.6.9-78.0.27.EL.i686.rpm SHA-256: d76c83e65d13e62fcf81c13ef3284eef3b3af2a75509ba2d4ce7e0b018813988
kernel-devel-2.6.9-78.0.27.EL.i686.rpm SHA-256: d70b996b671edc367e827eb5931b35192db50b04f0458f1976b64d3505979dce
kernel-devel-2.6.9-78.0.27.EL.i686.rpm SHA-256: d70b996b671edc367e827eb5931b35192db50b04f0458f1976b64d3505979dce
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e
kernel-hugemem-2.6.9-78.0.27.EL.i686.rpm SHA-256: 6d8d03924345266bf4df7695a9581e47f2201ec9fdcee0ae4b4a9f57ab87c85b
kernel-hugemem-2.6.9-78.0.27.EL.i686.rpm SHA-256: 6d8d03924345266bf4df7695a9581e47f2201ec9fdcee0ae4b4a9f57ab87c85b
kernel-hugemem-devel-2.6.9-78.0.27.EL.i686.rpm SHA-256: 04983652342f30e787f57d4a0edf1246085122a92dbc16301ac836786f000fda
kernel-hugemem-devel-2.6.9-78.0.27.EL.i686.rpm SHA-256: 04983652342f30e787f57d4a0edf1246085122a92dbc16301ac836786f000fda
kernel-smp-2.6.9-78.0.27.EL.i686.rpm SHA-256: e83dcc47a0deef607655a1585f6ddc7277adbab581b1f7847d5595b51b01e9e5
kernel-smp-2.6.9-78.0.27.EL.i686.rpm SHA-256: e83dcc47a0deef607655a1585f6ddc7277adbab581b1f7847d5595b51b01e9e5
kernel-smp-devel-2.6.9-78.0.27.EL.i686.rpm SHA-256: 017f70166b60da300c878d305016a22b2682374f2927e544ea11ca0c65037a3f
kernel-smp-devel-2.6.9-78.0.27.EL.i686.rpm SHA-256: 017f70166b60da300c878d305016a22b2682374f2927e544ea11ca0c65037a3f
kernel-xenU-2.6.9-78.0.27.EL.i686.rpm SHA-256: 56538dabcd2b4362883cb2b8fa1fa1cd34c8391ff49c18bfda008ba41c68f182
kernel-xenU-2.6.9-78.0.27.EL.i686.rpm SHA-256: 56538dabcd2b4362883cb2b8fa1fa1cd34c8391ff49c18bfda008ba41c68f182
kernel-xenU-devel-2.6.9-78.0.27.EL.i686.rpm SHA-256: 69673178ad267c91253319ee105d71789b4891a88b96431717e2c970d12e9597
kernel-xenU-devel-2.6.9-78.0.27.EL.i686.rpm SHA-256: 69673178ad267c91253319ee105d71789b4891a88b96431717e2c970d12e9597

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.27.EL.src.rpm SHA-256: 387969e198f7e5882b3a33903d49e9335cbc6272531f12afcf075155ce08f85f
s390x
kernel-2.6.9-78.0.27.EL.s390x.rpm SHA-256: b6c38d2b8c8348e84fa8103afaefd9e307683ce84f1baf016e5bd7be83a8074d
kernel-devel-2.6.9-78.0.27.EL.s390x.rpm SHA-256: 6b2150d19fb28790c65630f74235d8bfe9d5202c0f0e6fcaff746d0fa9047070
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e
s390
kernel-2.6.9-78.0.27.EL.s390.rpm SHA-256: 413887700508ef780624c2c06e400f060d8ff5c8bb7fa856146ccbeb30afb214
kernel-devel-2.6.9-78.0.27.EL.s390.rpm SHA-256: 739695919555dffdbd87b4d04c0addd052903be66b4229e54e0dc72de5cad7eb
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.27.EL.src.rpm SHA-256: 387969e198f7e5882b3a33903d49e9335cbc6272531f12afcf075155ce08f85f
ppc
kernel-2.6.9-78.0.27.EL.ppc64.rpm SHA-256: 712371472b07affc3ed958a58f32ec813156aa8d7a065e7c1eff8e2667c09622
kernel-2.6.9-78.0.27.EL.ppc64iseries.rpm SHA-256: d72f32f4e05f1c6a5f242734913a2afaddec0f173f3ee80784a19c8b9784402e
kernel-devel-2.6.9-78.0.27.EL.ppc64.rpm SHA-256: 86b50470e9019e21015c56f6fab7de25391a995bae9629feb11a9ffcfc563382
kernel-devel-2.6.9-78.0.27.EL.ppc64iseries.rpm SHA-256: 5d3e963034f0239ce0cc3468c461da808e5c1743813adecf722b161a142fecf6
kernel-doc-2.6.9-78.0.27.EL.noarch.rpm SHA-256: 40d14b5b80654c75d59b4e61ca4909dfdefa52ce73d4d9c1a1517bc6f9a75d3e
kernel-largesmp-2.6.9-78.0.27.EL.ppc64.rpm SHA-256: 4c9c97066894cc26cb67fd561c04408a7a1815fa284cc18909ed442a15bfe665
kernel-largesmp-devel-2.6.9-78.0.27.EL.ppc64.rpm SHA-256: 678e6bf582ec6f92969879785e298899571c73fc0dc7fd962ab14d3df7648e40

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility