Skip to navigation

Security Advisory Moderate: kernel security and bug fix update

Advisory: RHSA-2007:0595-2
Type: Security Advisory
Severity: Moderate
Issued on: 2007-07-09
Last updated on: 2007-07-09
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-3107

Details

Updated kernel packages that fix a security issue and a bug in the Red Hat
Enterprise Linux 5 kernel are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain a fix for the following security issue:

* a flaw in the signal handling on PowerPC-based systems that allowed a
local user to cause a denial of service (floating point corruption).
(CVE-2007-3107, Moderate).

In addition to the security issue described above, a fix for the following
have been included:

* a bug that can lead to data corruption with ServerWorks IDE controllers.

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which contain backported patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
kernel-2.6.18-8.1.8.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: ccbe8192d28c5643e24f0d59dd3ffd67
 
IA-32:
kernel-PAE-devel-2.6.18-8.1.8.el5.i686.rpm     MD5: 0c9e09e0836b39880581e3abdec33c39
kernel-devel-2.6.18-8.1.8.el5.i686.rpm     MD5: 64c31079a5643fd9327edcfe8e191469
kernel-xen-devel-2.6.18-8.1.8.el5.i686.rpm     MD5: 5b4b876f17154fa1fd744a8db5dc4eea
 
x86_64:
kernel-devel-2.6.18-8.1.8.el5.x86_64.rpm     MD5: 081997d16bf02e9ea9ed70644cb09676
kernel-xen-devel-2.6.18-8.1.8.el5.x86_64.rpm     MD5: 7a6a9de800775c5b96051bf207a96ea5
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-8.1.8.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: ccbe8192d28c5643e24f0d59dd3ffd67
 
IA-32:
kernel-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3e58eb32058190282456b5fd50d1d0a9
kernel-PAE-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e86c8a399ec8e9c61cd3a06ef5fcc72c
kernel-PAE-devel-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0c9e09e0836b39880581e3abdec33c39
kernel-devel-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 64c31079a5643fd9327edcfe8e191469
kernel-doc-2.6.18-8.1.8.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7399c28871d391fccb59014103bdefe4
kernel-headers-2.6.18-8.1.8.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 369b98eb100f0fea6080e04dc56b28ba
kernel-xen-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a6acf16511257758eabd2befb5498b53
kernel-xen-devel-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5b4b876f17154fa1fd744a8db5dc4eea
 
IA-64:
kernel-2.6.18-8.1.8.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 700f83613226861d1a92e57860a112f0
kernel-devel-2.6.18-8.1.8.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: e052a3ab0c0cd9eaee269410319bf760
kernel-doc-2.6.18-8.1.8.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7399c28871d391fccb59014103bdefe4
kernel-headers-2.6.18-8.1.8.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c0fe8cb785e4f81994e941968f182771
kernel-xen-2.6.18-8.1.8.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7d3d52bf96815398149f56bb14fb6ce5
kernel-xen-devel-2.6.18-8.1.8.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9a88436ef78a5c7b3daeeaf1602a0f9c
 
PPC:
kernel-2.6.18-8.1.8.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: c9141104da9444d3f45acad60ad5d1c4
kernel-devel-2.6.18-8.1.8.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 4d0413de0b40d0eeec27ab192b28aff0
kernel-doc-2.6.18-8.1.8.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7399c28871d391fccb59014103bdefe4
kernel-headers-2.6.18-8.1.8.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: 8b4ad434207dce9f47074e207c11a3be
kernel-headers-2.6.18-8.1.8.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f75b27870021e1472f936ca89d2e4a3c
kernel-kdump-2.6.18-8.1.8.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 0ebf821ec8c1da7c455dbfb2ae6e1d8b
kernel-kdump-devel-2.6.18-8.1.8.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bd6eb05a3964db319c6434c7b128c76e
 
s390x:
kernel-2.6.18-8.1.8.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 52b735abcc9ece904b64dc64d43e2d4a
kernel-devel-2.6.18-8.1.8.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 2670a4156ec41e85c8b1fed153856cce
kernel-doc-2.6.18-8.1.8.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7399c28871d391fccb59014103bdefe4
kernel-headers-2.6.18-8.1.8.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: fb7e7eadd1ca1cb7587c20b159c8ffe2
 
x86_64:
kernel-2.6.18-8.1.8.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 030ea917650057deafe66c292d7ab56d
kernel-devel-2.6.18-8.1.8.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 081997d16bf02e9ea9ed70644cb09676
kernel-doc-2.6.18-8.1.8.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7399c28871d391fccb59014103bdefe4
kernel-headers-2.6.18-8.1.8.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: abb52e09d47b6810e595d400530a7610
kernel-xen-2.6.18-8.1.8.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: aa4d7fb67b3578c13ee304bcbb54c304
kernel-xen-devel-2.6.18-8.1.8.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7a6a9de800775c5b96051bf207a96ea5
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-8.1.8.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: ccbe8192d28c5643e24f0d59dd3ffd67
 
IA-32:
kernel-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3e58eb32058190282456b5fd50d1d0a9
kernel-PAE-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: e86c8a399ec8e9c61cd3a06ef5fcc72c
kernel-doc-2.6.18-8.1.8.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7399c28871d391fccb59014103bdefe4
kernel-headers-2.6.18-8.1.8.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 369b98eb100f0fea6080e04dc56b28ba
kernel-xen-2.6.18-8.1.8.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: a6acf16511257758eabd2befb5498b53
 
x86_64:
kernel-2.6.18-8.1.8.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 030ea917650057deafe66c292d7ab56d
kernel-doc-2.6.18-8.1.8.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: 7399c28871d391fccb59014103bdefe4
kernel-headers-2.6.18-8.1.8.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: abb52e09d47b6810e595d400530a7610
kernel-xen-2.6.18-8.1.8.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: aa4d7fb67b3578c13ee304bcbb54c304
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

245580 - CVE-2007-3107 Data buffer miscompare on PowerPC when running HTX


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/