Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2007:0169-2
Type: Security Advisory
Severity: Important
Issued on: 2007-04-30
Last updated on: 2007-04-30
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-0771
CVE-2007-1000
CVE-2007-1388

Details

Updated kernel packages that fix security issues and bugs in the Red Hat
Enterprise Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

* a flaw in the IPv6 socket option handling that allowed a local user to
read arbitrary kernel memory (CVE-2007-1000, Important).

* a flaw in the IPv6 socket option handling that allowed a local user to
cause a denial of service (CVE-2007-1388, Important).

* a flaw in the utrace support that allowed a local user to cause a denial
of service (CVE-2007-0771, Important).

In addition to the security issues described above, a fix for a memory leak
in the audit subsystem and a fix for a data corruption bug on s390 systems
have been included.

Red Hat Enterprise Linux 5 users are advised to upgrade to these erratum
packages, which are not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
kernel-2.6.18-8.1.3.el5.src.rpm
File outdated by:  RHSA-2007:0595
    MD5: 3c466904fa90211ae8c91ff44e2e3479
 
IA-32:
kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2007:0595
    MD5: 5a85b33458c3da9278d6764ec27db662
kernel-devel-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2007:0595
    MD5: f3217c3cbd58fe01fbd2ef91861bad1f
kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2007:0595
    MD5: 904609f545a4340bd43c4bdae81bf4c9
 
x86_64:
kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2007:0595
    MD5: 151aebb51912d6eff5da61d861e3f13c
kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2007:0595
    MD5: 029c968689872c95b1d23943219987df
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-8.1.3.el5.src.rpm
File outdated by:  RHSA-2007:0595
    MD5: 3c466904fa90211ae8c91ff44e2e3479
 
IA-32:
kernel-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7f4b16f00764c2194825135f8b45d834
kernel-PAE-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 18c491ace9f7d997944c8a027ae5c886
kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5a85b33458c3da9278d6764ec27db662
kernel-devel-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: f3217c3cbd58fe01fbd2ef91861bad1f
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a7d3de91629f5a1f9ba478b5b0d954b
kernel-headers-2.6.18-8.1.3.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6f136ba7ead0bf5d1f489e21e7fb8908
kernel-xen-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1667b437e4a9e71d7bf464c1b4e09643
kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 904609f545a4340bd43c4bdae81bf4c9
 
IA-64:
kernel-2.6.18-8.1.3.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 15db1e41d717917b4b77be48134f8ba5
kernel-devel-2.6.18-8.1.3.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d745ba171295dca480b440ddb2982642
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a7d3de91629f5a1f9ba478b5b0d954b
kernel-headers-2.6.18-8.1.3.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 26bb0bd6ec743dcf551d069348335064
kernel-xen-2.6.18-8.1.3.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7d87f21cfccc266f5d6210f72304ffa0
kernel-xen-devel-2.6.18-8.1.3.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: b5c9d813ed78a30d37a1f9b25160f727
 
PPC:
kernel-2.6.18-8.1.3.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1251fd856e805c4e2b7257f153dfc83b
kernel-devel-2.6.18-8.1.3.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9f25a700177733b5b98a2a82f8069aa7
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a7d3de91629f5a1f9ba478b5b0d954b
kernel-headers-2.6.18-8.1.3.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 111dd2f2c54487fc31bc0b8996c238c9
kernel-headers-2.6.18-8.1.3.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 71a843834e5c63149d0c4821492c22c1
kernel-kdump-2.6.18-8.1.3.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: ddc7f5422532ac2d2861a3ee13aa2852
kernel-kdump-devel-2.6.18-8.1.3.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: d81cd3aec1759206e26e22f54614b6e0
 
s390x:
kernel-2.6.18-8.1.3.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 906237fa0cfdedea4c691483f7e4c499
kernel-devel-2.6.18-8.1.3.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6f134d9385e2c3a7b60ea0b373e8d093
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a7d3de91629f5a1f9ba478b5b0d954b
kernel-headers-2.6.18-8.1.3.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7895302f72c5563ce6d1531897ad9dd1
 
x86_64:
kernel-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 20c52dc29ee42c2fdbf7e5e1ffc656a5
kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 151aebb51912d6eff5da61d861e3f13c
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a7d3de91629f5a1f9ba478b5b0d954b
kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 23016741076b2d003106b9444245b236
kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3cc1c159de5f22822ee4b711e7637012
kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 029c968689872c95b1d23943219987df
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-8.1.3.el5.src.rpm
File outdated by:  RHSA-2007:0595
    MD5: 3c466904fa90211ae8c91ff44e2e3479
 
IA-32:
kernel-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7f4b16f00764c2194825135f8b45d834
kernel-PAE-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 18c491ace9f7d997944c8a027ae5c886
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a7d3de91629f5a1f9ba478b5b0d954b
kernel-headers-2.6.18-8.1.3.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6f136ba7ead0bf5d1f489e21e7fb8908
kernel-xen-2.6.18-8.1.3.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 1667b437e4a9e71d7bf464c1b4e09643
 
x86_64:
kernel-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 20c52dc29ee42c2fdbf7e5e1ffc656a5
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a7d3de91629f5a1f9ba478b5b0d954b
kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 23016741076b2d003106b9444245b236
kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3cc1c159de5f22822ee4b711e7637012
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

228816 - CVE-2007-0771 utrace regression / denial of service
232255 - CVE-2007-1388 NULL pointer dereference in do_ipv6_setsockopt
232257 - CVE-2007-1000 NULL pointer hole in ipv6
233157 - Kernel memory leak in audit subsystem


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/