Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0342 - Security Advisory
Issued:
2010-04-06
Updated:
2010-04-06

RHSA-2010:0342 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 4.7 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • a flaw was found in the sctp_rcv_ootb() function in the Linux kernel

Stream Control Transmission Protocol (SCTP) implementation. A remote
attacker could send a specially-crafted SCTP packet to a target system,
resulting in a denial of service. (CVE-2010-0008, Important)

This update also fixes the following bug:

  • the fix for CVE-2009-4538 provided by RHSA-2010:0111 introduced a

regression, preventing Wake on LAN (WoL) working for network devices using
the Intel PRO/1000 Linux driver, e1000e. Attempting to configure WoL for
such devices resulted in the following error, even when configuring valid
options:

"Cannot set new wake-on-lan settings: Operation not supported not
setting wol"

This update resolves this regression, and WoL now works as expected for
network devices using the e1000e driver. (BZ#565495)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7 ppc

Fixes

  • BZ - 555658 - CVE-2010-0008 kernel: sctp remote denial of service
  • BZ - 565495 - e1000e: wol is broken in kernel 2.6.9-89.19 [rhel-4.7.z]

CVEs

  • CVE-2010-0008

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.30.EL.src.rpm SHA-256: efa55187f8b0fcff6bf775342a1dc627f238b3f3417fd2cc694d7594211a056e
x86_64
kernel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 1904683a30b976956a1ff68496562377e5e469e2103734c16cc2d11f1723aab0
kernel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 1904683a30b976956a1ff68496562377e5e469e2103734c16cc2d11f1723aab0
kernel-devel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 5aa8f3d60229a48e291a1b87ef96b70a2bcc90a9879c213cd4f80990d47467ab
kernel-devel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 5aa8f3d60229a48e291a1b87ef96b70a2bcc90a9879c213cd4f80990d47467ab
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80
kernel-largesmp-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 0fb501d06c83628079e6b7ebdf25c15b186447f55b32a7dda099f6366dd7fa9e
kernel-largesmp-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 0fb501d06c83628079e6b7ebdf25c15b186447f55b32a7dda099f6366dd7fa9e
kernel-largesmp-devel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 86926925839fb0681ac6e9ed470cab7809c022ff1870def4a8f4f9771763ac2f
kernel-largesmp-devel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 86926925839fb0681ac6e9ed470cab7809c022ff1870def4a8f4f9771763ac2f
kernel-smp-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: bf22441c31ac77fd06ee514b659595c243c43e3bc01a191c1c225e9e61625e1d
kernel-smp-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: bf22441c31ac77fd06ee514b659595c243c43e3bc01a191c1c225e9e61625e1d
kernel-smp-devel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 62afb36d7bfe19fed80b0497961e872dcc1f60ad255cec578ec3502933b63176
kernel-smp-devel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 62afb36d7bfe19fed80b0497961e872dcc1f60ad255cec578ec3502933b63176
kernel-xenU-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 2157134e05d448c357cd5618e77491a8d00fe237938b650ccce865f1d217b3fa
kernel-xenU-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: 2157134e05d448c357cd5618e77491a8d00fe237938b650ccce865f1d217b3fa
kernel-xenU-devel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: b845b3e864e78d1b2302691486c7486e7243f54015c8b6e7185a7bd7d65d035c
kernel-xenU-devel-2.6.9-78.0.30.EL.x86_64.rpm SHA-256: b845b3e864e78d1b2302691486c7486e7243f54015c8b6e7185a7bd7d65d035c
ia64
kernel-2.6.9-78.0.30.EL.ia64.rpm SHA-256: dd1a56e1ad60a09a86ffbd80ad83e59fd2936c2e87b64dd400281fea19dabd81
kernel-2.6.9-78.0.30.EL.ia64.rpm SHA-256: dd1a56e1ad60a09a86ffbd80ad83e59fd2936c2e87b64dd400281fea19dabd81
kernel-devel-2.6.9-78.0.30.EL.ia64.rpm SHA-256: 0eb50cacddb70f565898362fe8960aea7181ad49f9235351507fc686850907ab
kernel-devel-2.6.9-78.0.30.EL.ia64.rpm SHA-256: 0eb50cacddb70f565898362fe8960aea7181ad49f9235351507fc686850907ab
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80
kernel-largesmp-2.6.9-78.0.30.EL.ia64.rpm SHA-256: 3fe589a62736a91cca2e7d17d1a58054c73d804e1b846cbdd476d05cbc630a61
kernel-largesmp-2.6.9-78.0.30.EL.ia64.rpm SHA-256: 3fe589a62736a91cca2e7d17d1a58054c73d804e1b846cbdd476d05cbc630a61
kernel-largesmp-devel-2.6.9-78.0.30.EL.ia64.rpm SHA-256: 78ed549e906c3599c5e1e53a98f9a65c4153683e8e7e69f15fbea57c2ae8b070
kernel-largesmp-devel-2.6.9-78.0.30.EL.ia64.rpm SHA-256: 78ed549e906c3599c5e1e53a98f9a65c4153683e8e7e69f15fbea57c2ae8b070
i386
kernel-2.6.9-78.0.30.EL.i686.rpm SHA-256: 4be8fcae7424cb0347c06413c9ee2c12d14a1662a9b2005d1891b0dbc2e3da78
kernel-2.6.9-78.0.30.EL.i686.rpm SHA-256: 4be8fcae7424cb0347c06413c9ee2c12d14a1662a9b2005d1891b0dbc2e3da78
kernel-devel-2.6.9-78.0.30.EL.i686.rpm SHA-256: 724b50f559fd2c9c513b5d41a758e6efc3781c33d76a9eeddc44505f644397f8
kernel-devel-2.6.9-78.0.30.EL.i686.rpm SHA-256: 724b50f559fd2c9c513b5d41a758e6efc3781c33d76a9eeddc44505f644397f8
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80
kernel-hugemem-2.6.9-78.0.30.EL.i686.rpm SHA-256: 55b6184227076efd21736f3c85f64ae09b2d287d69f51ead4f7a5c66ec60dad9
kernel-hugemem-2.6.9-78.0.30.EL.i686.rpm SHA-256: 55b6184227076efd21736f3c85f64ae09b2d287d69f51ead4f7a5c66ec60dad9
kernel-hugemem-devel-2.6.9-78.0.30.EL.i686.rpm SHA-256: b89c99c80bfdb6944331c06308371a5ebb43fa3bac3882af592d47461e262cc8
kernel-hugemem-devel-2.6.9-78.0.30.EL.i686.rpm SHA-256: b89c99c80bfdb6944331c06308371a5ebb43fa3bac3882af592d47461e262cc8
kernel-smp-2.6.9-78.0.30.EL.i686.rpm SHA-256: 5b34749b249017d235ddfe60880f191e8d4922a39665d7452e5fce732e78be47
kernel-smp-2.6.9-78.0.30.EL.i686.rpm SHA-256: 5b34749b249017d235ddfe60880f191e8d4922a39665d7452e5fce732e78be47
kernel-smp-devel-2.6.9-78.0.30.EL.i686.rpm SHA-256: 4615baac867d6e4d884c2272fe7345f5644f1173c8f85b51233deaf0a77c52db
kernel-smp-devel-2.6.9-78.0.30.EL.i686.rpm SHA-256: 4615baac867d6e4d884c2272fe7345f5644f1173c8f85b51233deaf0a77c52db
kernel-xenU-2.6.9-78.0.30.EL.i686.rpm SHA-256: a4dfe445753bdfb10aafe9ac063fa4e38971d2f29c0722b53dc52cf050e0fce1
kernel-xenU-2.6.9-78.0.30.EL.i686.rpm SHA-256: a4dfe445753bdfb10aafe9ac063fa4e38971d2f29c0722b53dc52cf050e0fce1
kernel-xenU-devel-2.6.9-78.0.30.EL.i686.rpm SHA-256: f2b9d2b4954c11580ff71957fef8b4e930856e2c658efe1d550e659f7f8126e8
kernel-xenU-devel-2.6.9-78.0.30.EL.i686.rpm SHA-256: f2b9d2b4954c11580ff71957fef8b4e930856e2c658efe1d550e659f7f8126e8

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.30.EL.src.rpm SHA-256: efa55187f8b0fcff6bf775342a1dc627f238b3f3417fd2cc694d7594211a056e
s390x
kernel-2.6.9-78.0.30.EL.s390x.rpm SHA-256: c9396184787e403ddf50e5161587252c2b95b03ce7bc2198058979db5ee9755f
kernel-devel-2.6.9-78.0.30.EL.s390x.rpm SHA-256: f7f6bab101b3bdc61430fcaf433d6c06239f4c1684d35ae1f2b4491b424364fc
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80
s390
kernel-2.6.9-78.0.30.EL.s390.rpm SHA-256: f9dc969648342de88dd6c611b4fd4a335f0e7ae1230d0abf41c89595923bcab8
kernel-devel-2.6.9-78.0.30.EL.s390.rpm SHA-256: 4a21f256e514e11106edab9bb600c7457e6e1b7d76a94000f295d4cec1a306f9
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7

SRPM
kernel-2.6.9-78.0.30.EL.src.rpm SHA-256: efa55187f8b0fcff6bf775342a1dc627f238b3f3417fd2cc694d7594211a056e
ppc
kernel-2.6.9-78.0.30.EL.ppc64.rpm SHA-256: df895d7818bf384c14c29f9ef42026046e71d41bf3009e55cc1a03bc7dbfd3fb
kernel-2.6.9-78.0.30.EL.ppc64iseries.rpm SHA-256: 266b1b4434b060bd3fc7edb48e8cbe8523fe7c9e13ecc3093f525a2b0a065de9
kernel-devel-2.6.9-78.0.30.EL.ppc64.rpm SHA-256: 680e0b9e7869264d7033dfbf1764fbe90228a04571300fe0e242f6e3cbc74a14
kernel-devel-2.6.9-78.0.30.EL.ppc64iseries.rpm SHA-256: b056eb83cc54e756432d85b3adba6cfddd76e8ec5db9bf7a8707708c64574554
kernel-doc-2.6.9-78.0.30.EL.noarch.rpm SHA-256: 9efa2594a423f8fc5dc8b0140846328128b6ccd3b54c7a7741d46caa38632c80
kernel-largesmp-2.6.9-78.0.30.EL.ppc64.rpm SHA-256: 9966e74faf684ba117181a85816b8f1c0a608170fda4b0ec85486d83631f508f
kernel-largesmp-devel-2.6.9-78.0.30.EL.ppc64.rpm SHA-256: 9d81c45058bf4f48fa00b4a7eeaab8225201b4925b42ca1523854220a753e440

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility