Skip to navigation

Security Advisory Important: kernel security update

Advisory: RHSA-2007:0672-2
Type: Security Advisory
Severity: Important
Issued on: 2007-08-08
Last updated on: 2007-08-08
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
CVEs (cve.mitre.org): CVE-2006-6054
CVE-2006-6058
CVE-2007-1217
CVE-2007-1353
CVE-2007-1592

Details

Updated kernel packages that fix a number of security issues are now
available for Red Hat Enterprise Linux 2.1 (32-bit architectures).

This security advisory has been rated as having important security impact by
the Red Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

* a flaw in IPv6 flow label handling that allowed a local user to cause a
denial of service (crash). (CVE-2007-1592, Important)

* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a
denial of service or potential privilege escalation. (CVE-2007-1217, Moderate)

* a flaw in the Bluetooth subsystem that allowed a local user to trigger an
information leak. (CVE-2007-1353, Low)

* various flaws in the supported filesystems that allowed a local
privileged user to cause a denial of service. (CVE-2006-6054, CVE-2006-6058,
Low)

Red Hat would like to thank Ilja van Sprundel for reporting an issue fixed
in this erratum.

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to these updated packages, which contain backported fixes to correct these
issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
kernel-2.4.9-e.72.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: e0095f0c0117599facea3858143f0a54
 
IA-32:
kernel-2.4.9-e.72.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3c1762c99272c95caff4920b5c091600
kernel-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: f337123d81f654ebea3a75642a7d8f54
kernel-BOOT-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 5ad8a2db60dd761078b04222c86d3c29
kernel-debug-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a43876b373d14df0924819881add4412
kernel-doc-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 18a991ba3f8bc5b0e058f302b5fc3265
kernel-enterprise-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: f11cbbd7d8e239840a241e28b8da81d9
kernel-headers-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 015d93e6ae6bfdb58440032009c5e2e1
kernel-smp-2.4.9-e.72.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 248b4b045b45a51e3bdc7e6d5f032ab6
kernel-smp-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 4c0389c372bb9686cb8e9a660e6741df
kernel-source-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 07df232ff8d073ff90a84140d9dccef4
kernel-summit-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: d78599b5d5eb0abb3c0d3f1e50795b3b
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
kernel-2.4.9-e.72.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: e0095f0c0117599facea3858143f0a54
 
IA-32:
kernel-2.4.9-e.72.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3c1762c99272c95caff4920b5c091600
kernel-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: f337123d81f654ebea3a75642a7d8f54
kernel-BOOT-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 5ad8a2db60dd761078b04222c86d3c29
kernel-debug-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a43876b373d14df0924819881add4412
kernel-doc-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 18a991ba3f8bc5b0e058f302b5fc3265
kernel-headers-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 015d93e6ae6bfdb58440032009c5e2e1
kernel-smp-2.4.9-e.72.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 248b4b045b45a51e3bdc7e6d5f032ab6
kernel-smp-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 4c0389c372bb9686cb8e9a660e6741df
kernel-source-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 07df232ff8d073ff90a84140d9dccef4
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
kernel-2.4.9-e.72.src.rpm
File outdated by:  RHSA-2009:0001
    MD5: e0095f0c0117599facea3858143f0a54
 
IA-32:
kernel-2.4.9-e.72.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 3c1762c99272c95caff4920b5c091600
kernel-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: f337123d81f654ebea3a75642a7d8f54
kernel-BOOT-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 5ad8a2db60dd761078b04222c86d3c29
kernel-debug-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: a43876b373d14df0924819881add4412
kernel-doc-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 18a991ba3f8bc5b0e058f302b5fc3265
kernel-enterprise-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: f11cbbd7d8e239840a241e28b8da81d9
kernel-headers-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 015d93e6ae6bfdb58440032009c5e2e1
kernel-smp-2.4.9-e.72.athlon.rpm
File outdated by:  RHSA-2009:0001
    MD5: 248b4b045b45a51e3bdc7e6d5f032ab6
kernel-smp-2.4.9-e.72.i686.rpm
File outdated by:  RHSA-2009:0001
    MD5: 4c0389c372bb9686cb8e9a660e6741df
kernel-source-2.4.9-e.72.i386.rpm
File outdated by:  RHSA-2009:0001
    MD5: 07df232ff8d073ff90a84140d9dccef4
 

Bugs fixed (see bugzilla for more information)

217007 - CVE-2006-6058 minix_bmap denial of service
217023 - CVE-2006-6054 ext2_check_page denial of service
231070 - CVE-2007-1217 Overflow in CAPI subsystem
233483 - CVE-2007-1592 IPv6 oops triggerable by any user
234295 - CVE-2007-1353 Bluetooth setsockopt() information leaks


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/