Skip to navigation

Security Advisory Important: kernel security and bug fix update

Advisory: RHSA-2008:0055-11
Type: Security Advisory
Severity: Important
Issued on: 2008-01-31
Last updated on: 2008-01-31
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.6.z)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.6.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2007-4130
CVE-2007-5500
CVE-2007-6063
CVE-2007-6151
CVE-2007-6206
CVE-2007-6694
CVE-2008-0001

Details

Updated kernel packages that fix several security issues and a bug in the
Red Hat Enterprise Linux 4 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated kernel packages fix the following security issues:

A flaw was found in the virtual filesystem (VFS). A local unprivileged
user could truncate directories to which they had write permission; this
could render the contents of the directory inaccessible. (CVE-2008-0001,
Important)

A flaw was found in the implementation of ptrace. A local unprivileged user
could trigger this flaw and possibly cause a denial of service (system
hang). (CVE-2007-5500, Important)

A flaw was found in the way the Red Hat Enterprise Linux 4 kernel handled
page faults when a CPU used the NUMA method for accessing memory on Itanium
architectures. A local unprivileged user could trigger this flaw and cause
a denial of service (system panic). (CVE-2007-4130, Important)

A possible NULL pointer dereference was found in the chrp_show_cpuinfo
function when using the PowerPC architecture. This may have allowed a local
unprivileged user to cause a denial of service (crash).
(CVE-2007-6694, Moderate)

A flaw was found in the way core dump files were created. If a local user
can get a root-owned process to dump a core file into a directory, which
the user has write access to, they could gain read access to that core
file. This could potentially grant unauthorized access to sensitive
information. (CVE-2007-6206, Moderate)

Two buffer overflow flaws were found in the Linux kernel ISDN subsystem. A
local unprivileged user could use these flaws to cause a denial of
service. (CVE-2007-6063, CVE-2007-6151, Moderate)

As well, these updated packages fix the following bug:

* when moving volumes that contain multiple segments, and a mirror segment
is not the first in the mapping table, running the "pvmove /dev/[device]
/dev/[device]" command caused a kernel panic. A "kernel: Unable to handle
kernel paging request at virtual address [address]" error was logged by
syslog.

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 4)

IA-32:
kernel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: dbeb39f8f8cf642526ed86c65057411b
kernel-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 5d6e359a1e3cb97ca80d9f78cfdec35a
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-hugemem-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 46063e806a28573bb61c6de0b50e1dd6
kernel-hugemem-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: e48f0e201056082818259d69317cd996
kernel-smp-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 56ea2072ec6d2f858225a90c90202e7a
kernel-smp-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 9a8a587b22c234fd40b5d2e80a4ddc3b
kernel-xenU-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 7dbfe61d616f4dcdfea96a0c06c61e68
kernel-xenU-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: d996d262245c396affe997cb44c6cf96
 
x86_64:
kernel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c7d3cb87e77285211f91b0a4bdad4c6f
kernel-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: e02e4ff1f380d24eeb323c6413f72f77
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1592402873d5cf20cb53589f1f758afb
kernel-largesmp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 99ca55be3e5b755952945c07226246ea
kernel-smp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2651ae1190a0aa312402bd21a1077dc6
kernel-smp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c2deddd482fe6d6543d2e1d20491bf04
kernel-xenU-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 375eafddf9a84ab4187e206199863bf0
kernel-xenU-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1156397956ad60c18890634acfb1e6e0
 
Red Hat Enterprise Linux AS (v. 4)

IA-32:
kernel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: dbeb39f8f8cf642526ed86c65057411b
kernel-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 5d6e359a1e3cb97ca80d9f78cfdec35a
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-hugemem-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 46063e806a28573bb61c6de0b50e1dd6
kernel-hugemem-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: e48f0e201056082818259d69317cd996
kernel-smp-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 56ea2072ec6d2f858225a90c90202e7a
kernel-smp-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 9a8a587b22c234fd40b5d2e80a4ddc3b
kernel-xenU-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 7dbfe61d616f4dcdfea96a0c06c61e68
kernel-xenU-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: d996d262245c396affe997cb44c6cf96
 
IA-64:
kernel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: af5acde269630a641033b1f876e1920a
kernel-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 9cf6c15f9d383accbe82771ceae5e7b3
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ffb06ee0dc9947e7e793c99c2ce9d721
kernel-largesmp-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: fb299f05d8dc90b33557911b677abc9d
 
PPC:
kernel-2.6.9-67.0.4.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 4d12e2d19da2fc355625538c30fd2587
kernel-2.6.9-67.0.4.EL.ppc64iseries.rpm
File outdated by:  RHBA-2011:1796
    MD5: bfec2c0d8e6defd1b5170bb8fb8d4a16
kernel-devel-2.6.9-67.0.4.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: d4968d4681448eead96de1fd1d01d49a
kernel-devel-2.6.9-67.0.4.EL.ppc64iseries.rpm
File outdated by:  RHBA-2011:1796
    MD5: 855df92fce887c2c2cfa1597a5b22a87
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 823a8e09e1e7376384e89c3d989336d3
kernel-largesmp-devel-2.6.9-67.0.4.EL.ppc64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 90879aa715a26d3f3ab127ea9d8f9862
 
s390:
kernel-2.6.9-67.0.4.EL.s390.rpm
File outdated by:  RHBA-2011:1796
    MD5: 840e0392536fee5823fcef1589436f28
kernel-devel-2.6.9-67.0.4.EL.s390.rpm
File outdated by:  RHBA-2011:1796
    MD5: 3daa6f162b179a06bdaea64101d266f0
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
 
s390x:
kernel-2.6.9-67.0.4.EL.s390x.rpm
File outdated by:  RHBA-2011:1796
    MD5: 66304b6f9eaba36f99d6d8055267f9be
kernel-devel-2.6.9-67.0.4.EL.s390x.rpm
File outdated by:  RHBA-2011:1796
    MD5: 8f1d5ae6c989db0f1a4ec115635dfc62
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
 
x86_64:
kernel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c7d3cb87e77285211f91b0a4bdad4c6f
kernel-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: e02e4ff1f380d24eeb323c6413f72f77
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1592402873d5cf20cb53589f1f758afb
kernel-largesmp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 99ca55be3e5b755952945c07226246ea
kernel-smp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2651ae1190a0aa312402bd21a1077dc6
kernel-smp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c2deddd482fe6d6543d2e1d20491bf04
kernel-xenU-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 375eafddf9a84ab4187e206199863bf0
kernel-xenU-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1156397956ad60c18890634acfb1e6e0
 
Red Hat Enterprise Linux AS (v. 4.6.z)

IA-32:
kernel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: dbeb39f8f8cf642526ed86c65057411b
kernel-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 5d6e359a1e3cb97ca80d9f78cfdec35a
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-hugemem-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 46063e806a28573bb61c6de0b50e1dd6
kernel-hugemem-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: e48f0e201056082818259d69317cd996
kernel-smp-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 56ea2072ec6d2f858225a90c90202e7a
kernel-smp-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 9a8a587b22c234fd40b5d2e80a4ddc3b
kernel-xenU-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 7dbfe61d616f4dcdfea96a0c06c61e68
kernel-xenU-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: d996d262245c396affe997cb44c6cf96
 
IA-64:
kernel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHSA-2008:0607
    MD5: af5acde269630a641033b1f876e1920a
kernel-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 9cf6c15f9d383accbe82771ceae5e7b3
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHSA-2008:0607
    MD5: ffb06ee0dc9947e7e793c99c2ce9d721
kernel-largesmp-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHSA-2008:0607
    MD5: fb299f05d8dc90b33557911b677abc9d
 
PPC:
kernel-2.6.9-67.0.4.EL.ppc64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 4d12e2d19da2fc355625538c30fd2587
kernel-2.6.9-67.0.4.EL.ppc64iseries.rpm
File outdated by:  RHSA-2008:0607
    MD5: bfec2c0d8e6defd1b5170bb8fb8d4a16
kernel-devel-2.6.9-67.0.4.EL.ppc64.rpm
File outdated by:  RHSA-2008:0607
    MD5: d4968d4681448eead96de1fd1d01d49a
kernel-devel-2.6.9-67.0.4.EL.ppc64iseries.rpm
File outdated by:  RHSA-2008:0607
    MD5: 855df92fce887c2c2cfa1597a5b22a87
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.ppc64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 823a8e09e1e7376384e89c3d989336d3
kernel-largesmp-devel-2.6.9-67.0.4.EL.ppc64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 90879aa715a26d3f3ab127ea9d8f9862
 
s390:
kernel-2.6.9-67.0.4.EL.s390.rpm
File outdated by:  RHSA-2008:0607
    MD5: 840e0392536fee5823fcef1589436f28
kernel-devel-2.6.9-67.0.4.EL.s390.rpm
File outdated by:  RHSA-2008:0607
    MD5: 3daa6f162b179a06bdaea64101d266f0
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
 
s390x:
kernel-2.6.9-67.0.4.EL.s390x.rpm
File outdated by:  RHSA-2008:0607
    MD5: 66304b6f9eaba36f99d6d8055267f9be
kernel-devel-2.6.9-67.0.4.EL.s390x.rpm
File outdated by:  RHSA-2008:0607
    MD5: 8f1d5ae6c989db0f1a4ec115635dfc62
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
 
x86_64:
kernel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: c7d3cb87e77285211f91b0a4bdad4c6f
kernel-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: e02e4ff1f380d24eeb323c6413f72f77
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 1592402873d5cf20cb53589f1f758afb
kernel-largesmp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 99ca55be3e5b755952945c07226246ea
kernel-smp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 2651ae1190a0aa312402bd21a1077dc6
kernel-smp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: c2deddd482fe6d6543d2e1d20491bf04
kernel-xenU-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 375eafddf9a84ab4187e206199863bf0
kernel-xenU-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 1156397956ad60c18890634acfb1e6e0
 
Red Hat Enterprise Linux ES (v. 4)

IA-32:
kernel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: dbeb39f8f8cf642526ed86c65057411b
kernel-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 5d6e359a1e3cb97ca80d9f78cfdec35a
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-hugemem-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 46063e806a28573bb61c6de0b50e1dd6
kernel-hugemem-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: e48f0e201056082818259d69317cd996
kernel-smp-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 56ea2072ec6d2f858225a90c90202e7a
kernel-smp-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 9a8a587b22c234fd40b5d2e80a4ddc3b
kernel-xenU-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 7dbfe61d616f4dcdfea96a0c06c61e68
kernel-xenU-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: d996d262245c396affe997cb44c6cf96
 
IA-64:
kernel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: af5acde269630a641033b1f876e1920a
kernel-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 9cf6c15f9d383accbe82771ceae5e7b3
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ffb06ee0dc9947e7e793c99c2ce9d721
kernel-largesmp-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: fb299f05d8dc90b33557911b677abc9d
 
x86_64:
kernel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c7d3cb87e77285211f91b0a4bdad4c6f
kernel-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: e02e4ff1f380d24eeb323c6413f72f77
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1592402873d5cf20cb53589f1f758afb
kernel-largesmp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 99ca55be3e5b755952945c07226246ea
kernel-smp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2651ae1190a0aa312402bd21a1077dc6
kernel-smp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c2deddd482fe6d6543d2e1d20491bf04
kernel-xenU-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 375eafddf9a84ab4187e206199863bf0
kernel-xenU-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1156397956ad60c18890634acfb1e6e0
 
Red Hat Enterprise Linux ES (v. 4.6.z)

IA-32:
kernel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: dbeb39f8f8cf642526ed86c65057411b
kernel-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 5d6e359a1e3cb97ca80d9f78cfdec35a
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-hugemem-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 46063e806a28573bb61c6de0b50e1dd6
kernel-hugemem-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: e48f0e201056082818259d69317cd996
kernel-smp-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 56ea2072ec6d2f858225a90c90202e7a
kernel-smp-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 9a8a587b22c234fd40b5d2e80a4ddc3b
kernel-xenU-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: 7dbfe61d616f4dcdfea96a0c06c61e68
kernel-xenU-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHSA-2008:0607
    MD5: d996d262245c396affe997cb44c6cf96
 
IA-64:
kernel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHSA-2008:0607
    MD5: af5acde269630a641033b1f876e1920a
kernel-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 9cf6c15f9d383accbe82771ceae5e7b3
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHSA-2008:0607
    MD5: ffb06ee0dc9947e7e793c99c2ce9d721
kernel-largesmp-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHSA-2008:0607
    MD5: fb299f05d8dc90b33557911b677abc9d
 
x86_64:
kernel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: c7d3cb87e77285211f91b0a4bdad4c6f
kernel-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: e02e4ff1f380d24eeb323c6413f72f77
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHSA-2008:0607
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 1592402873d5cf20cb53589f1f758afb
kernel-largesmp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 99ca55be3e5b755952945c07226246ea
kernel-smp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 2651ae1190a0aa312402bd21a1077dc6
kernel-smp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: c2deddd482fe6d6543d2e1d20491bf04
kernel-xenU-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 375eafddf9a84ab4187e206199863bf0
kernel-xenU-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHSA-2008:0607
    MD5: 1156397956ad60c18890634acfb1e6e0
 
Red Hat Enterprise Linux WS (v. 4)

IA-32:
kernel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: dbeb39f8f8cf642526ed86c65057411b
kernel-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 5d6e359a1e3cb97ca80d9f78cfdec35a
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-hugemem-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 46063e806a28573bb61c6de0b50e1dd6
kernel-hugemem-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: e48f0e201056082818259d69317cd996
kernel-smp-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 56ea2072ec6d2f858225a90c90202e7a
kernel-smp-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 9a8a587b22c234fd40b5d2e80a4ddc3b
kernel-xenU-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: 7dbfe61d616f4dcdfea96a0c06c61e68
kernel-xenU-devel-2.6.9-67.0.4.EL.i686.rpm
File outdated by:  RHBA-2011:1796
    MD5: d996d262245c396affe997cb44c6cf96
 
IA-64:
kernel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: af5acde269630a641033b1f876e1920a
kernel-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 9cf6c15f9d383accbe82771ceae5e7b3
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: ffb06ee0dc9947e7e793c99c2ce9d721
kernel-largesmp-devel-2.6.9-67.0.4.EL.ia64.rpm
File outdated by:  RHBA-2011:1796
    MD5: fb299f05d8dc90b33557911b677abc9d
 
x86_64:
kernel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c7d3cb87e77285211f91b0a4bdad4c6f
kernel-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: e02e4ff1f380d24eeb323c6413f72f77
kernel-doc-2.6.9-67.0.4.EL.noarch.rpm
File outdated by:  RHBA-2011:1796
    MD5: 74ddd181bb33e62b5c09a3346512550e
kernel-largesmp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1592402873d5cf20cb53589f1f758afb
kernel-largesmp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 99ca55be3e5b755952945c07226246ea
kernel-smp-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 2651ae1190a0aa312402bd21a1077dc6
kernel-smp-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: c2deddd482fe6d6543d2e1d20491bf04
kernel-xenU-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 375eafddf9a84ab4187e206199863bf0
kernel-xenU-devel-2.6.9-67.0.4.EL.x86_64.rpm
File outdated by:  RHBA-2011:1796
    MD5: 1156397956ad60c18890634acfb1e6e0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

179665 - CVE-2007-4130 panic caused by set_mempolicy with MPOL_BIND
382161 - CVE-2007-5500 kernel hang via userspace PTRACE+waitid
392101 - CVE-2007-6063 Linux Kernel isdn_net_setcfg buffer overflow
396751 - CVE-2007-6694 /proc/cpuinfo DoS on some ppc machines
396861 - CVE-2007-6206 Issue with core dump owner
425111 - CVE-2007-6151 I4L: fix isdn_ioctl memory issue
428637 - pvmove causes kernel panic
428791 - CVE-2008-0001 kernel: filesystem corruption by unprivileged user via directory truncation


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/