Skip to navigation

Security Advisory Important: kernel security update

Advisory: RHSA-2007:0936-2
Type: Security Advisory
Severity: Important
Issued on: 2007-09-27
Last updated on: 2007-09-27
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-4573

Details

Updated kernel packages that fix a security issue in the Red Hat Enterprise
Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

A flaw was found in the IA32 system call emulation provided on AMD64 and
Intel 64 platforms. An improperly validated 64-bit value could be stored in
the %RAX register, which could trigger an out-of-bounds system call table
access. An untrusted local user could exploit this flaw to run code in the
kernel (ie a root privilege escalation). (CVE-2007-4573).

Red Hat would like to thank Wojciech Purczynski for reporting this issue.

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which contain a backported patch to correct this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-8.1.14.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: e864e7c886ad6bd8a466d601e124d173
 
IA-32:
kernel-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c5708f61da5a1cd657387fd668c09070
kernel-PAE-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bff45b4bb682aac45063413899a06576
kernel-PAE-devel-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: babeefe626d9cfa77e916def06eebca8
kernel-devel-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5e4a74221dc2d89eb61687483d765da7
kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c126057734f1b94f43174a83ab6614a9
kernel-headers-2.6.18-8.1.14.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a6500224f3247fb02eb15fdf1dcf7fa
kernel-xen-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6e6ff28d8bc48e9227bd15e30fe6a222
kernel-xen-devel-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3d8089808868c8848160c50f9836c50d
 
IA-64:
kernel-2.6.18-8.1.14.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 04f3f9061fdd5dd13976ec24d6490f3c
kernel-devel-2.6.18-8.1.14.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: f1ea0fc12a5f524207b352bb2797797b
kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c126057734f1b94f43174a83ab6614a9
kernel-headers-2.6.18-8.1.14.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: bf20f192973330148a4e39fb01ebb2ac
kernel-xen-2.6.18-8.1.14.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 043bea776071be0fbec7bfcb2ca26c71
kernel-xen-devel-2.6.18-8.1.14.el5.ia64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 642a0cc7fb33898b1c8e29c0b3b2144d
 
PPC:
kernel-2.6.18-8.1.14.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: fd1014c95cdafb8f2f5821edb8fe3e3e
kernel-devel-2.6.18-8.1.14.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6f90335fc97510f00d412433d2cac5d6
kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c126057734f1b94f43174a83ab6614a9
kernel-headers-2.6.18-8.1.14.el5.ppc.rpm
File outdated by:  RHSA-2014:0285
    MD5: b198a4254da4be818b65568f43a1d13f
kernel-headers-2.6.18-8.1.14.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 912b2826d06f1ec64c5285d210cdcda3
kernel-kdump-2.6.18-8.1.14.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 9bcded50fdf04a34cf068be0205751ba
kernel-kdump-devel-2.6.18-8.1.14.el5.ppc64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 18c9d8881fb4ac39b9a147f75aec7d8b
 
s390x:
kernel-2.6.18-8.1.14.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: e9e962c7ef8589a669ff3491bd65d294
kernel-devel-2.6.18-8.1.14.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: b3a54a09be16b1a727e54364755514f4
kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c126057734f1b94f43174a83ab6614a9
kernel-headers-2.6.18-8.1.14.el5.s390x.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5f94fecd0b8622617fb48c49819b97bb
 
x86_64:
kernel-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 768d7dcf7eed6bbf7add28d46237d3e5
kernel-devel-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 181e5913174d98cc4bb0f919ddc770b2
kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c126057734f1b94f43174a83ab6614a9
kernel-headers-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 60bd95d21e87bf5f8b7cd6b2eae982e1
kernel-xen-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 413f70b178c8374137d3305ea1a4cc36
kernel-xen-devel-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5f7ffa8121bb45510b25110973ff677f
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-8.1.14.el5.src.rpm
File outdated by:  RHSA-2014:0285
    MD5: e864e7c886ad6bd8a466d601e124d173
 
IA-32:
kernel-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: c5708f61da5a1cd657387fd668c09070
kernel-PAE-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: bff45b4bb682aac45063413899a06576
kernel-PAE-devel-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: babeefe626d9cfa77e916def06eebca8
kernel-devel-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5e4a74221dc2d89eb61687483d765da7
kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c126057734f1b94f43174a83ab6614a9
kernel-headers-2.6.18-8.1.14.el5.i386.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3a6500224f3247fb02eb15fdf1dcf7fa
kernel-xen-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 6e6ff28d8bc48e9227bd15e30fe6a222
kernel-xen-devel-2.6.18-8.1.14.el5.i686.rpm
File outdated by:  RHSA-2014:0285
    MD5: 3d8089808868c8848160c50f9836c50d
 
x86_64:
kernel-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 768d7dcf7eed6bbf7add28d46237d3e5
kernel-devel-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 181e5913174d98cc4bb0f919ddc770b2
kernel-doc-2.6.18-8.1.14.el5.noarch.rpm
File outdated by:  RHSA-2014:0285
    MD5: c126057734f1b94f43174a83ab6614a9
kernel-headers-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 60bd95d21e87bf5f8b7cd6b2eae982e1
kernel-xen-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 413f70b178c8374137d3305ea1a4cc36
kernel-xen-devel-2.6.18-8.1.14.el5.x86_64.rpm
File outdated by:  RHSA-2014:0285
    MD5: 5f7ffa8121bb45510b25110973ff677f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

294541 - CVE-2007-4573 x86_64 syscall vulnerability


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/