Skip to navigation

Security Advisory Important: kernel security update

Advisory: RHSA-2007:0673-2
Type: Security Advisory
Severity: Important
Issued on: 2007-08-08
Last updated on: 2007-08-08
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2006-6054
CVE-2007-1217
CVE-2007-1353
CVE-2007-1592

Details

Updated kernel packages that fix a number of security issues are now
available for Red Hat Enterprise Linux 2.1 (64-bit architectures).

This security advisory has been rated as having important security impact by
the Red Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

* a flaw in IPV6 flow label handling that allowed a local user to
cause a denial of service (crash). (CVE-2007-1592, Important)

* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a
denial of service or potential privilege escalation. (CVE-2007-1217, Moderate)

* a flaw in the Bluetooth subsystem that allowed a local user to trigger an
information leak. (CVE-2007-1353, Low)

* a flaw in the supported filesystems that allowed a local privileged user
to cause a denial of service. (CVE-2006-6054, Low)

Red Hat would like to thank Ilja van Sprundel for reporting an issue fixed
in this erratum.

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to these updated packages, which contain backported fixes to correct these
issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
kernel-2.4.18-e.65.src.rpm
File outdated by:  RHSA-2008:0787
    MD5: 92ccbe1005a2ad74fffc3e944f5d19c2
 
IA-64:
kernel-2.4.18-e.65.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 8e5d03bf4e79cf7b0cfd6911d3667160
kernel-doc-2.4.18-e.65.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: d82cbe75c5f32bff36a65d5a5d52a0ee
kernel-smp-2.4.18-e.65.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 6093b3a6bae88873c8f0f13755d5eb47
kernel-source-2.4.18-e.65.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 72346a0b751537cc181f226caed806bb
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
kernel-2.4.18-e.65.src.rpm
File outdated by:  RHSA-2008:0787
    MD5: 92ccbe1005a2ad74fffc3e944f5d19c2
 
IA-64:
kernel-2.4.18-e.65.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 8e5d03bf4e79cf7b0cfd6911d3667160
kernel-doc-2.4.18-e.65.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: d82cbe75c5f32bff36a65d5a5d52a0ee
kernel-smp-2.4.18-e.65.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 6093b3a6bae88873c8f0f13755d5eb47
kernel-source-2.4.18-e.65.ia64.rpm
File outdated by:  RHSA-2008:0787
    MD5: 72346a0b751537cc181f226caed806bb
 

Bugs fixed (see bugzilla for more information)

217024 - CVE-2006-6054 ext2_check_page denial of service
231071 - CVE-2007-1217 Overflow in CAPI subsystem
233484 - CVE-2007-1592 IPv6 oops triggerable by any user
234296 - CVE-2007-1353 Bluetooth setsockopt() information leaks


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/