Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2006:0493-6
Type: Security Advisory
Severity: Important
Issued on: 2006-05-24
Last updated on: 2006-05-24
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2005-2973
CVE-2005-3272
CVE-2005-3359
CVE-2006-0555
CVE-2006-0741
CVE-2006-0744
CVE-2006-1522
CVE-2006-1525
CVE-2006-1527
CVE-2006-1528
CVE-2006-1855
CVE-2006-1856
CVE-2006-1862
CVE-2006-1864
CVE-2006-2271
CVE-2006-2272
CVE-2006-2274

Details

Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available.

This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues
described below:

* a flaw in the IPv6 implementation that allowed a local user to cause a
denial of service (infinite loop and crash) (CVE-2005-2973, important)

* a flaw in the bridge implementation that allowed a remote user to
cause forwarding of spoofed packets via poisoning of the forwarding
table with already dropped frames (CVE-2005-3272, moderate)

* a flaw in the atm module that allowed a local user to cause a denial
of service (panic) via certain socket calls (CVE-2005-3359, important)

* a flaw in the NFS client implementation that allowed a local user to
cause a denial of service (panic) via O_DIRECT writes (CVE-2006-0555,
important)

* a difference in "sysretq" operation of EM64T (as opposed to Opteron)
processors that allowed a local user to cause a denial of service
(crash) upon return from certain system calls (CVE-2006-0741 and
CVE-2006-0744, important)

* a flaw in the keyring implementation that allowed a local user to
cause a denial of service (OOPS) (CVE-2006-1522, important)

* a flaw in IP routing implementation that allowed a local user to cause
a denial of service (panic) via a request for a route for a multicast IP
(CVE-2006-1525, important)

* a flaw in the SCTP-netfilter implementation that allowed a remote user
to cause a denial of service (infinite loop) (CVE-2006-1527, important)

* a flaw in the sg driver that allowed a local user to cause a denial of
service (crash) via a dio transfer to memory mapped (mmap) IO space
(CVE-2006-1528, important)

* a flaw in the threading implementation that allowed a local user to
cause a denial of service (panic) (CVE-2006-1855, important)

* two missing LSM hooks that allowed a local user to bypass the LSM by
using readv() or writev() (CVE-2006-1856, moderate)

* a flaw in the virtual memory implementation that allowed local user to
cause a denial of service (panic) by using the lsof command
(CVE-2006-1862, important)

* a directory traversal vulnerability in smbfs that allowed a local user
to escape chroot restrictions for an SMB-mounted filesystem via "..\\"
sequences (CVE-2006-1864, moderate)

* a flaw in the ECNE chunk handling of SCTP that allowed a remote user
to cause a denial of service (panic) (CVE-2006-2271, moderate)

* a flaw in the handling of COOKIE_ECHO and HEARTBEAT control chunks of
SCTP that allowed a remote user to cause a denial of service (panic)
(CVE-2006-2272, moderate)

* a flaw in the handling of DATA fragments of SCTP that allowed a remote
user to cause a denial of service (infinite recursion and crash)
(CVE-2006-2274, moderate)


All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
kernel-2.6.9-34.0.1.EL.src.rpm
File outdated by:  RHBA-2011:1796
    MD5: d43492e556689a0607d7bafd927024b7
 
IA-32:
kernel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 34813080d97fdd6f647fd7d4f809c7fc
kernel-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: e78b9ccc0c954cff7cb40e6f02b24674
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-hugemem-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3c00e3363ab92e43224a3017fb7bb4a3
kernel-hugemem-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 861c261dc99531fecc8b90a579e3d406
kernel-smp-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: ac1a65bd4766603619c7871c8454312d
kernel-smp-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 20bb2e56287af558784e341a22ecc899
 
x86_64:
kernel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 055f1e2e0ec115d813792811018da5e6
kernel-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ab2acc3e78f549776c01be84b8aae710
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-largesmp-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4c09ae42fe85e7fa0699cde07b163802
kernel-largesmp-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3bb0bc6a400c3bd7faebe3070402f356
kernel-smp-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: f11147d14d9f88a9760aa67af12d7d6c
kernel-smp-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c411c259c433dd3fe50222a5a3ebc472
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
kernel-2.6.9-34.0.1.EL.src.rpm
File outdated by:  RHBA-2011:1796
    MD5: d43492e556689a0607d7bafd927024b7
 
IA-32:
kernel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 34813080d97fdd6f647fd7d4f809c7fc
kernel-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: e78b9ccc0c954cff7cb40e6f02b24674
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-hugemem-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3c00e3363ab92e43224a3017fb7bb4a3
kernel-hugemem-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 861c261dc99531fecc8b90a579e3d406
kernel-smp-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: ac1a65bd4766603619c7871c8454312d
kernel-smp-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 20bb2e56287af558784e341a22ecc899
 
IA-64:
kernel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: bb16d7851570a9973acc285b1c10d4c5
kernel-devel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 20207fbb33c783bad9de5c2d8d8b9a07
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-largesmp-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3a4a43172ab8119ffcec9a28abce6a69
kernel-largesmp-devel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 58810e499bf182b64a4a11b2391e04b3
 
PPC:
kernel-2.6.9-34.0.1.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 50f16a3bc3db576300e8ed39b7e58696
kernel-2.6.9-34.0.1.EL.ppc64iseries.rpm
File outdated by:  RHBA-2011:1796
    MD5: 40f0c5f7d16d02e70f7058572c59829d
kernel-devel-2.6.9-34.0.1.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 80b022ce31c0fd4fe94742f36e528d75
kernel-devel-2.6.9-34.0.1.EL.ppc64iseries.rpm
File outdated by:  RHBA-2011:1796
    MD5: 65479dc320135ebefacb42c27ded8277
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-largesmp-2.6.9-34.0.1.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1e22096056638a03e4c473a0d0158268
kernel-largesmp-devel-2.6.9-34.0.1.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 224188bba442a6b6109689afb7bba903
 
s390:
kernel-2.6.9-34.0.1.EL.s390.rpm
File outdated by:  RHBA-2011:1796
    MD5: 8ddc9750a621e3ea4142d1adfd06a5c5
kernel-devel-2.6.9-34.0.1.EL.s390.rpm
File outdated by:  RHBA-2011:1796
    MD5: ba2a9b707ce91af1e7ae817b726ed6c5
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
 
s390x:
kernel-2.6.9-34.0.1.EL.s390x.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4bf39050d27a794cc1df5b3eb916484a
kernel-devel-2.6.9-34.0.1.EL.s390x.rpm
File outdated by:  RHBA-2011:1796
    MD5: e959fb20625849eccbd399958265fe84
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
 
x86_64:
kernel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 055f1e2e0ec115d813792811018da5e6
kernel-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ab2acc3e78f549776c01be84b8aae710
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-largesmp-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4c09ae42fe85e7fa0699cde07b163802
kernel-largesmp-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3bb0bc6a400c3bd7faebe3070402f356
kernel-smp-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: f11147d14d9f88a9760aa67af12d7d6c
kernel-smp-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c411c259c433dd3fe50222a5a3ebc472
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
kernel-2.6.9-34.0.1.EL.src.rpm
File outdated by:  RHBA-2011:1796
    MD5: d43492e556689a0607d7bafd927024b7
 
IA-32:
kernel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 34813080d97fdd6f647fd7d4f809c7fc
kernel-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: e78b9ccc0c954cff7cb40e6f02b24674
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-hugemem-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3c00e3363ab92e43224a3017fb7bb4a3
kernel-hugemem-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 861c261dc99531fecc8b90a579e3d406
kernel-smp-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: ac1a65bd4766603619c7871c8454312d
kernel-smp-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 20bb2e56287af558784e341a22ecc899
 
IA-64:
kernel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: bb16d7851570a9973acc285b1c10d4c5
kernel-devel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 20207fbb33c783bad9de5c2d8d8b9a07
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-largesmp-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3a4a43172ab8119ffcec9a28abce6a69
kernel-largesmp-devel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 58810e499bf182b64a4a11b2391e04b3
 
x86_64:
kernel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 055f1e2e0ec115d813792811018da5e6
kernel-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ab2acc3e78f549776c01be84b8aae710
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-largesmp-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4c09ae42fe85e7fa0699cde07b163802
kernel-largesmp-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3bb0bc6a400c3bd7faebe3070402f356
kernel-smp-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: f11147d14d9f88a9760aa67af12d7d6c
kernel-smp-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c411c259c433dd3fe50222a5a3ebc472
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
kernel-2.6.9-34.0.1.EL.src.rpm
File outdated by:  RHBA-2011:1796
    MD5: d43492e556689a0607d7bafd927024b7
 
IA-32:
kernel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 34813080d97fdd6f647fd7d4f809c7fc
kernel-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: e78b9ccc0c954cff7cb40e6f02b24674
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-hugemem-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3c00e3363ab92e43224a3017fb7bb4a3
kernel-hugemem-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 861c261dc99531fecc8b90a579e3d406
kernel-smp-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: ac1a65bd4766603619c7871c8454312d
kernel-smp-devel-2.6.9-34.0.1.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 20bb2e56287af558784e341a22ecc899
 
IA-64:
kernel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: bb16d7851570a9973acc285b1c10d4c5
kernel-devel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 20207fbb33c783bad9de5c2d8d8b9a07
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-largesmp-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3a4a43172ab8119ffcec9a28abce6a69
kernel-largesmp-devel-2.6.9-34.0.1.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 58810e499bf182b64a4a11b2391e04b3
 
x86_64:
kernel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 055f1e2e0ec115d813792811018da5e6
kernel-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ab2acc3e78f549776c01be84b8aae710
kernel-doc-2.6.9-34.0.1.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4969d66062c65e2f969a5b23f3d038fb
kernel-largesmp-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4c09ae42fe85e7fa0699cde07b163802
kernel-largesmp-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3bb0bc6a400c3bd7faebe3070402f356
kernel-smp-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: f11147d14d9f88a9760aa67af12d7d6c
kernel-smp-devel-2.6.9-34.0.1.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c411c259c433dd3fe50222a5a3ebc472
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

168791 - CVE-2006-1528 Possible local crash by dio/mmap sg driver
170772 - CVE-2005-2973 ipv6 infinite loop
171383 - CVE-2005-3272 bridge poisoning
175769 - CVE-2005-3359 incorrect inrement/decrement in atm module leads to panic
181795 - CVE-2006-0555 NFS client panic using O_DIRECT
183489 - CVE-2006-0741 bad elf entry address (CVE-2006-0744)
187841 - CVE-2006-1855 Old thread debugging causes false BUG() in choose_new_parent
188466 - CVE-2006-1522 DoS/bug in keyring code (security/keys/)
189260 - CVE-2006-1862 The lsof command triggers a kernel oops under heavy load
189346 - CVE-2006-1525 ip_route_input() panic
189435 - CVE-2006-1864 smbfs chroot issue
190460 - CVE-2006-1527 netfilter/sctp: lockup in sctp_new()
191201 - CVE-2006-2271 SCTP ECNE chunk handling DoS
191202 - CVE-2006-2272 SCTP incoming COOKIE_ECHO and HEARTBEAT packets DoS
191258 - CVE-2006-2274 SCTP DATA fragments DoS
191524 - CVE-2006-1856 LSM missing readv/writev


References


Keywords

kernel, nahant, update


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/