Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2006:0140-9
Type: Security Advisory
Severity: Important
Issued on: 2006-01-19
Last updated on: 2006-01-19
Affected Products: Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
CVEs (cve.mitre.org): CVE-2002-2185
CVE-2004-1057
CVE-2005-2708
CVE-2005-2709
CVE-2005-2973
CVE-2005-3044
CVE-2005-3180
CVE-2005-3275
CVE-2005-3806
CVE-2005-3848
CVE-2005-3857
CVE-2005-3858

Details

Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 3 kernel are now available.

This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues
described below:

- a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)

- a flaw in remap_page_range() with O_DIRECT writes that allowed a local
user to cause a denial of service (crash) (CVE-2004-1057, important)

- a flaw in exec() handling on some 64-bit architectures that allowed
a local user to cause a denial of service (crash) (CVE-2005-2708, important)

- a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)

- a flaw in IPv6 network UDP port hash table lookups that allowed a local
user to cause a denial of service (hang) (CVE-2005-2973, important)

- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed
a local user to cause a denial of service (crash) (CVE-2005-3044, important)

- a network buffer info leak using the orinoco driver that allowed
a remote user to possibly view uninitialized data (CVE-2005-3180, important)

- a flaw in IPv4 network TCP and UDP netfilter handling that allowed
a local user to cause a denial of service (crash) (CVE-2005-3275, important)

- a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)

- a flaw in network ICMP processing that allowed a local user to cause
a denial of service (memory exhaustion) (CVE-2005-3848, important)

- a flaw in file lease time-out handling that allowed a local user to cause
a denial of service (log file overflow) (CVE-2005-3857, moderate)

- a flaw in network IPv6 xfrm handling that allowed a local user to
cause a denial of service (memory exhaustion) (CVE-2005-3858, important)

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels
to the packages associated with their machine architecture and
configurations as listed in this erratum.


Solution

Before applying this update, make sure that all previously released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
kernel-2.4.21-37.0.1.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8ac573fd7da76bdbb692608fd112c17e
 
IA-32:
kernel-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c132a984fc36125635ed8c9dfea0aafe
kernel-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: c4eacef42415a77f0ef049e20eab7a54
kernel-BOOT-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29574e30ddd8e7f412446916670cb2d9
kernel-doc-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: dc499687869783cb0f29dace2a166564
kernel-hugemem-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: d87be7a68ad11961c17b35dc1874baa8
kernel-hugemem-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9a73c7159290bbf5a4c697930947e55e
kernel-smp-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29c4165c6982cbe8cdcca4e544898fd3
kernel-smp-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8242f8c46face8171232ee3628a18f8a
kernel-smp-unsupported-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c51f8fa5df41bb2d894d1d93c1ea16fd
kernel-smp-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 61e11b896ca9dc9daeb7a728a24bc92e
kernel-source-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 14b67fc434b7b611bc48a3ea085fd090
kernel-unsupported-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1dfc561d293146a44a9b96e58a283260
kernel-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: fe7b99cc532c6f87251b7acb1c874755
 
x86_64:
kernel-2.4.21-37.0.1.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: fa476998934d46e5549f181fe29691ac
kernel-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3dc1501cfad7aa37634b963bb53a0255
kernel-doc-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9bb8abb6c8623855eb1b25628e6f9677
kernel-smp-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2267c033d5b57b9790b087af67c3a456
kernel-smp-unsupported-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4a8422d6fdff27b0af58150a243eabc5
kernel-source-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3dc2e200ea133fcfd329d828eaffb469
kernel-unsupported-2.4.21-37.0.1.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 471e991baa9a16dc911f7d0e9f88f739
kernel-unsupported-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6da82d4b8685ce8f1868c2699467e502
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
kernel-2.4.21-37.0.1.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8ac573fd7da76bdbb692608fd112c17e
 
IA-32:
kernel-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c132a984fc36125635ed8c9dfea0aafe
kernel-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: c4eacef42415a77f0ef049e20eab7a54
kernel-BOOT-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29574e30ddd8e7f412446916670cb2d9
kernel-doc-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: dc499687869783cb0f29dace2a166564
kernel-hugemem-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: d87be7a68ad11961c17b35dc1874baa8
kernel-hugemem-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9a73c7159290bbf5a4c697930947e55e
kernel-smp-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29c4165c6982cbe8cdcca4e544898fd3
kernel-smp-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8242f8c46face8171232ee3628a18f8a
kernel-smp-unsupported-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c51f8fa5df41bb2d894d1d93c1ea16fd
kernel-smp-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 61e11b896ca9dc9daeb7a728a24bc92e
kernel-source-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 14b67fc434b7b611bc48a3ea085fd090
kernel-unsupported-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1dfc561d293146a44a9b96e58a283260
kernel-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: fe7b99cc532c6f87251b7acb1c874755
 
IA-64:
kernel-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 08e68cea214530406cac348d2f9263f7
kernel-doc-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8e64a87ef70d5f7dec65dbd4c6ff82c4
kernel-source-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5d93447ebf637cb3ce59ed6a860f3913
kernel-unsupported-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: df5ef4f8aed639e36b1c306aa1818eb2
 
PPC:
kernel-2.4.21-37.0.1.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0cf3be5ad486a13a925b0e06730e8cd
kernel-2.4.21-37.0.1.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 0e64cd084da06531c4e9b1d1b3ced207
kernel-doc-2.4.21-37.0.1.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: d21d3acee3e6cbcde9c62454336f5f5f
kernel-source-2.4.21-37.0.1.EL.ppc64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8044137f4adbe9d0c93919af49839e01
kernel-unsupported-2.4.21-37.0.1.EL.ppc64iseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1d19870581d879f9d0d4c9978091c6c3
kernel-unsupported-2.4.21-37.0.1.EL.ppc64pseries.rpm
File outdated by:  RHSA-2009:1550
    MD5: a0250e2b0f9ac93a7c568e7389f53457
 
s390:
kernel-2.4.21-37.0.1.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: ca591a86b393f36885041d4a3cd82a53
kernel-doc-2.4.21-37.0.1.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3788cd512b7fa6b577e500a2ee4d1fef
kernel-source-2.4.21-37.0.1.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 44beedbe1d9e82aed2f73d6f814ec653
kernel-unsupported-2.4.21-37.0.1.EL.s390.rpm
File outdated by:  RHSA-2009:1550
    MD5: 7ced947293d4682682b067b61c387e7c
 
s390x:
kernel-2.4.21-37.0.1.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: bacb4aab55a2166d2c9ea53a3512a646
kernel-doc-2.4.21-37.0.1.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9cadb9c025c5d1c43c4b52bd7c3cdd62
kernel-source-2.4.21-37.0.1.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: dea19dae65c362aa5f811f32ee00763e
kernel-unsupported-2.4.21-37.0.1.EL.s390x.rpm
File outdated by:  RHSA-2009:1550
    MD5: f16374ee1d14e8002225d84ae462dba1
 
x86_64:
kernel-2.4.21-37.0.1.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: fa476998934d46e5549f181fe29691ac
kernel-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3dc1501cfad7aa37634b963bb53a0255
kernel-doc-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9bb8abb6c8623855eb1b25628e6f9677
kernel-smp-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2267c033d5b57b9790b087af67c3a456
kernel-smp-unsupported-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4a8422d6fdff27b0af58150a243eabc5
kernel-source-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3dc2e200ea133fcfd329d828eaffb469
kernel-unsupported-2.4.21-37.0.1.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 471e991baa9a16dc911f7d0e9f88f739
kernel-unsupported-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6da82d4b8685ce8f1868c2699467e502
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
kernel-2.4.21-37.0.1.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8ac573fd7da76bdbb692608fd112c17e
 
IA-32:
kernel-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c132a984fc36125635ed8c9dfea0aafe
kernel-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: c4eacef42415a77f0ef049e20eab7a54
kernel-BOOT-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29574e30ddd8e7f412446916670cb2d9
kernel-doc-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: dc499687869783cb0f29dace2a166564
kernel-hugemem-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: d87be7a68ad11961c17b35dc1874baa8
kernel-hugemem-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9a73c7159290bbf5a4c697930947e55e
kernel-smp-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29c4165c6982cbe8cdcca4e544898fd3
kernel-smp-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8242f8c46face8171232ee3628a18f8a
kernel-smp-unsupported-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c51f8fa5df41bb2d894d1d93c1ea16fd
kernel-smp-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 61e11b896ca9dc9daeb7a728a24bc92e
kernel-source-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 14b67fc434b7b611bc48a3ea085fd090
kernel-unsupported-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1dfc561d293146a44a9b96e58a283260
kernel-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: fe7b99cc532c6f87251b7acb1c874755
 
IA-64:
kernel-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 08e68cea214530406cac348d2f9263f7
kernel-doc-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8e64a87ef70d5f7dec65dbd4c6ff82c4
kernel-source-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5d93447ebf637cb3ce59ed6a860f3913
kernel-unsupported-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: df5ef4f8aed639e36b1c306aa1818eb2
 
x86_64:
kernel-2.4.21-37.0.1.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: fa476998934d46e5549f181fe29691ac
kernel-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3dc1501cfad7aa37634b963bb53a0255
kernel-doc-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9bb8abb6c8623855eb1b25628e6f9677
kernel-smp-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2267c033d5b57b9790b087af67c3a456
kernel-smp-unsupported-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4a8422d6fdff27b0af58150a243eabc5
kernel-source-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3dc2e200ea133fcfd329d828eaffb469
kernel-unsupported-2.4.21-37.0.1.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 471e991baa9a16dc911f7d0e9f88f739
kernel-unsupported-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6da82d4b8685ce8f1868c2699467e502
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
kernel-2.4.21-37.0.1.EL.src.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8ac573fd7da76bdbb692608fd112c17e
 
IA-32:
kernel-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c132a984fc36125635ed8c9dfea0aafe
kernel-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: c4eacef42415a77f0ef049e20eab7a54
kernel-BOOT-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29574e30ddd8e7f412446916670cb2d9
kernel-doc-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: dc499687869783cb0f29dace2a166564
kernel-hugemem-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: d87be7a68ad11961c17b35dc1874baa8
kernel-hugemem-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9a73c7159290bbf5a4c697930947e55e
kernel-smp-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 29c4165c6982cbe8cdcca4e544898fd3
kernel-smp-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8242f8c46face8171232ee3628a18f8a
kernel-smp-unsupported-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: c51f8fa5df41bb2d894d1d93c1ea16fd
kernel-smp-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: 61e11b896ca9dc9daeb7a728a24bc92e
kernel-source-2.4.21-37.0.1.EL.i386.rpm
File outdated by:  RHSA-2009:1550
    MD5: 14b67fc434b7b611bc48a3ea085fd090
kernel-unsupported-2.4.21-37.0.1.EL.athlon.rpm
File outdated by:  RHSA-2009:1550
    MD5: 1dfc561d293146a44a9b96e58a283260
kernel-unsupported-2.4.21-37.0.1.EL.i686.rpm
File outdated by:  RHSA-2009:1550
    MD5: fe7b99cc532c6f87251b7acb1c874755
 
IA-64:
kernel-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 08e68cea214530406cac348d2f9263f7
kernel-doc-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 8e64a87ef70d5f7dec65dbd4c6ff82c4
kernel-source-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 5d93447ebf637cb3ce59ed6a860f3913
kernel-unsupported-2.4.21-37.0.1.EL.ia64.rpm
File outdated by:  RHSA-2009:1550
    MD5: df5ef4f8aed639e36b1c306aa1818eb2
 
x86_64:
kernel-2.4.21-37.0.1.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: fa476998934d46e5549f181fe29691ac
kernel-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3dc1501cfad7aa37634b963bb53a0255
kernel-doc-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 9bb8abb6c8623855eb1b25628e6f9677
kernel-smp-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 2267c033d5b57b9790b087af67c3a456
kernel-smp-unsupported-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 4a8422d6fdff27b0af58150a243eabc5
kernel-source-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 3dc2e200ea133fcfd329d828eaffb469
kernel-unsupported-2.4.21-37.0.1.EL.ia32e.rpm
File outdated by:  RHSA-2009:1550
    MD5: 471e991baa9a16dc911f7d0e9f88f739
kernel-unsupported-2.4.21-37.0.1.EL.x86_64.rpm
File outdated by:  RHSA-2009:1550
    MD5: 6da82d4b8685ce8f1868c2699467e502
 

Bugs fixed (see bugzilla for more information)

137820 - CVE-2004-1057 VM_IO refcount issue
161925 - CVE-2005-2708 user code panics kernel in exec.c
168661 - CVE-2005-3044 lost fput could lead to DoS
168925 - CVE-2005-2709 More sysctl flaws
170278 - CVE-2005-3180 orinoco driver information leakage
170774 - CVE-2005-2973 ipv6 infinite loop
171386 - CVE-2005-3275 NAT DoS
174082 - CVE-2005-3806 ipv6 DOS
174338 - CVE-2005-3857 lease printk DoS
174344 - CVE-2005-3858 ip6_input_finish DoS
174347 - CVE-2005-3848 dst_entry leak DoS
174808 - CVE-2002-2185 IGMP DoS


References


Keywords

errata, kernel, security, taroon


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/