Skip to navigation

Security Advisory Important: kernel security update

Advisory: RHSA-2007:0940-7
Type: Security Advisory
Severity: Important
Issued on: 2007-10-22
Last updated on: 2007-10-22
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-3105
CVE-2007-3380
CVE-2007-3513
CVE-2007-3731
CVE-2007-3848
CVE-2007-3850
CVE-2007-4133
CVE-2007-4308
CVE-2007-4574

Details

Updated kernel packages that fix various security issues in the Red Hat
Enterprise Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

* A flaw was found in the backported stack unwinder fixes in Red Hat
Enterprise Linux 5. On AMD64 and Intel 64 platforms, a local user could
trigger this flaw and cause a denial of service. (CVE-2007-4574, Important)

* A flaw was found in the handling of process death signals. This allowed a
local user to send arbitrary signals to the suid-process executed by that
user. A successful exploitation of this flaw depends on the structure of
the suid-program and its signal handling. (CVE-2007-3848, Important)

* A flaw was found in the Distributed Lock Manager (DLM) in the cluster
manager. This allowed a remote user who is able to connect to the DLM port
to cause a denial of service. (CVE-2007-3380, Important)

* A flaw was found in the aacraid SCSI driver. This allowed a local user to
make ioctl calls to the driver which should otherwise be restricted to
privileged users. (CVE-2007-4308, Moderate)

* A flaw was found in the prio_tree handling of the hugetlb support that
allowed a local user to cause a denial of service. This only affected
kernels with hugetlb support. (CVE-2007-4133, Moderate)

* A flaw was found in the eHCA driver on PowerPC architectures that allowed
a local user to access 60k of physical address space. This address space
could contain sensitive information. (CVE-2007-3850, Moderate)

* A flaw was found in ptrace support that allowed a local user to cause a
denial of service via a NULL pointer dereference. (CVE-2007-3731, Moderate)

* A flaw was found in the usblcd driver that allowed a local user to cause
a denial
of service by writing data to the device node. To exploit this issue, write
access to the device node was needed. (CVE-2007-3513, Moderate)

* A flaw was found in the random number generator implementation that
allowed a local user to cause a denial of service or possibly gain
privileges. If the root user raised the default wakeup threshold over the
size of the output pool, this flaw could be exploited. (CVE-2007-3105, Low)

In addition to the security issues described above, several bug fixes
preventing possible system crashes and data corruption were also included.

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which contain backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kernel-2.6.18-8.1.15.el5.src.rpm
File outdated by:  RHSA-2014:0433
    MD5: 96e7f738ecce94568d5bb134189c326c
 
IA-32:
kernel-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: f862f2df0259807e71880bd71b7d459c
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 04fa118c137a7ed248e9c906df961528
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: a2850422391d9909877543b3aca1c16b
kernel-devel-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: fe3e7757c2a305387104d1d3a23eaff4
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 82503886fa27faada673b4c5b51f5e91
kernel-headers-2.6.18-8.1.15.el5.i386.rpm
File outdated by:  RHSA-2014:0433
    MD5: e2d502422d61345c2b5e14397358eccc
kernel-xen-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: ea4b753172c08f45e0d67ac8bdd60bf8
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9c709312d55ca786d01302618aa50309
 
IA-64:
kernel-2.6.18-8.1.15.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: d359d0330e7b6804af362af1eb1adc7d
kernel-devel-2.6.18-8.1.15.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 3376e3721a0409159040aa448d2e7c63
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 82503886fa27faada673b4c5b51f5e91
kernel-headers-2.6.18-8.1.15.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9b176d5a29ee2f4ddfded0e6317b5260
kernel-xen-2.6.18-8.1.15.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: d48babc1ecb538673533d2c00017773f
kernel-xen-devel-2.6.18-8.1.15.el5.ia64.rpm
File outdated by:  RHSA-2014:0433
    MD5: e65b46be5519d6e9cda212a2f52cbc51
 
PPC:
kernel-2.6.18-8.1.15.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 075c973a5187cfc363b4039743c851a1
kernel-devel-2.6.18-8.1.15.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 28cb4c0282755727b1d0960b188816a6
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 82503886fa27faada673b4c5b51f5e91
kernel-headers-2.6.18-8.1.15.el5.ppc.rpm
File outdated by:  RHSA-2014:0433
    MD5: 7b52271f10576a5649ae85050732ad62
kernel-headers-2.6.18-8.1.15.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: b66c688e3bae66044baa5f8d987d5606
kernel-kdump-2.6.18-8.1.15.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 2d6a3bed623a2ae016793e99c283dfea
kernel-kdump-devel-2.6.18-8.1.15.el5.ppc64.rpm
File outdated by:  RHSA-2014:0433
    MD5: d5d1dd7a6b076f01338430fc45570192
 
s390x:
kernel-2.6.18-8.1.15.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: e0982a8fa0d9e315cb3b7dc7efcacfde
kernel-devel-2.6.18-8.1.15.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: e0fd341c4267569f79589ed67d151d92
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 82503886fa27faada673b4c5b51f5e91
kernel-headers-2.6.18-8.1.15.el5.s390x.rpm
File outdated by:  RHSA-2014:0433
    MD5: d616fd9a1ecac69f961977ee2e3d0288
 
x86_64:
kernel-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 47227f2902ab9ed3e2bf56836cf3f8c8
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: de0ab04f9ece35d22230277e57ac4163
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 82503886fa27faada673b4c5b51f5e91
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 7b14e095feb0be96ed4335c99aeff961
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 97d1aac9db45b83ef9ab05ccfa6e41d9
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: e1356a3b6a13306a0da4da273b78c8de
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kernel-2.6.18-8.1.15.el5.src.rpm
File outdated by:  RHSA-2014:0433
    MD5: 96e7f738ecce94568d5bb134189c326c
 
IA-32:
kernel-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: f862f2df0259807e71880bd71b7d459c
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 04fa118c137a7ed248e9c906df961528
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: a2850422391d9909877543b3aca1c16b
kernel-devel-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: fe3e7757c2a305387104d1d3a23eaff4
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 82503886fa27faada673b4c5b51f5e91
kernel-headers-2.6.18-8.1.15.el5.i386.rpm
File outdated by:  RHSA-2014:0433
    MD5: e2d502422d61345c2b5e14397358eccc
kernel-xen-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: ea4b753172c08f45e0d67ac8bdd60bf8
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm
File outdated by:  RHSA-2014:0433
    MD5: 9c709312d55ca786d01302618aa50309
 
x86_64:
kernel-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 47227f2902ab9ed3e2bf56836cf3f8c8
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: de0ab04f9ece35d22230277e57ac4163
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
File outdated by:  RHSA-2014:0433
    MD5: 82503886fa27faada673b4c5b51f5e91
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 7b14e095feb0be96ed4335c99aeff961
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: 97d1aac9db45b83ef9ab05ccfa6e41d9
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm
File outdated by:  RHSA-2014:0433
    MD5: e1356a3b6a13306a0da4da273b78c8de
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

245922 - CVE-2007-3380 A TCP connection to DLM port blocks DLM operations
247728 - CVE-2007-3513 Locally triggerable memory consumption in usblcd
248324 - CVE-2007-3731 NULL pointer dereference triggered by ptrace
248325 - CVE-2007-3105 Bound check ordering issue in random driver
250972 - CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG
252309 - CVE-2007-4308 Missing ioctl() permission checks in aacraid driver
253926 - CVE-2007-4133 prio_tree unit kernel panic
298141 - CVE-2007-4574 EM64T local DoS
308811 - CVE-2007-3850 kernel LTC31426-4k page mapping support for userspace in 64k kernels


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/