"This update fixes the following security issues:
* a flaw was found in the IPv6 Extension Header (EH) handling
implementation in the Linux kernel. The skb->dst data structure was not
properly validated in the ipv6_hop_jumbo() function. This could possibly
lead to a remote denial of service. (CVE-2007-4567, Important)
* a flaw was found in each of the following Intel PRO/1000 Linux drivers
in the Linux kernel: e1000 and e1000e. A remote attacker using packets
larger than the MTU could bypass the existing fragment check, resulting
in partial, invalid frames being passed to the network stack. These
flaws could also possibly be used to trigger a remote denial of service.
(CVE-2009-4536, CVE-2009-4538, Important)
* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. Receiving overly-long frames with network cards supported by
this driver could possibly result in a remote denial of service.
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect."
RHEL5 hosts should be updated, especially those using e1000, e1000e and