Skip to navigation

Security Advisory kernel security update

Advisory: RHSA-2006:0580-7
Type: Security Advisory
Severity: Moderate
Issued on: 2006-07-13
Last updated on: 2006-07-13
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2005-3055
CVE-2005-3273
CVE-2006-1342
CVE-2006-1343
CVE-2006-1864
CVE-2006-2071
CVE-2006-2444

Details

Updated kernel packages that fix a number of security issues as well as
other bugs are now available for Red Hat Enterprise Linux 2.1 (64 bit
architectures)

This security advisory has been rated as having moderate security impact
by the Red Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

* a flaw in the USB devio handling of device removal that allowed a local
user to cause a denial of service (crash) (CVE-2005-3055, moderate)

* a flaw in ROSE due to missing verification of the ndigis argument of new
routes (CVE-2005-3273, moderate)

* a minor info leak in socket name handling in the network code
(CVE-2006-1342, low)

* a minor info leak in socket option handling in the network code
(CVE-2006-1343, low)

* a directory traversal vulnerability in smbfs that allowed a local user to
escape chroot restrictions for an SMB-mounted filesystem via "..\\"
sequences (CVE-2006-1864, moderate)

* a flaw in the mprotect system call that allowed to give write permission
to a readonly attachment of shared memory (CVE-2006-2071, moderate)

* a flaw in IPv4 netfilter handling for the unlikely use of SNMP NAT
processing that allowed a remote user to cause a denial of service (crash)
or potential memory corruption (CVE-2006-2444, moderate)

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to these updated packages, which contain backported fixes to correct these
issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-64:
kernel-2.4.18-e.63.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 32532fafc62a1f79c87e8a108237eb45
kernel-doc-2.4.18-e.63.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 19dedbf7215f9a415361a7ef3e492e76
kernel-smp-2.4.18-e.63.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 06caba179a589bc80a3dc985a631a235
kernel-source-2.4.18-e.63.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 02e26e237854382d5df668e8dc65c0b3
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
kernel-2.4.18-e.63.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 32532fafc62a1f79c87e8a108237eb45
kernel-doc-2.4.18-e.63.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 19dedbf7215f9a415361a7ef3e492e76
kernel-smp-2.4.18-e.63.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 06caba179a589bc80a3dc985a631a235
kernel-source-2.4.18-e.63.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 02e26e237854382d5df668e8dc65c0b3
 

Bugs fixed (see bugzilla for more information)

155363 - CVE-2005-3273 ROSE ndigis verification
169263 - CVE-2005-3055 async usb devio oops (ipf)
186247 - CVE-2006-1342 Small information leak in SO_ORIGINAL_DST and getname() (CVE-2006-1343)
189439 - CVE-2006-1864 smbfs chroot issue
190077 - CVE-2006-2071 mprotect gives write permission to a readonly attachment
192634 - CVE-2006-2444 SNMP NAT netfilter memory corruption


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/