Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2007:0099 - Security Advisory
Issued:
2007-03-14
Updated:
2007-03-14

RHSA-2007:0099 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix security issues and bugs in the Red Hat
Enterprise Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

  • a flaw in the key serial number collision avoidance algorithm of the

keyctl subsystem that allowed a local user to cause a denial of service
(CVE-2007-0006, Important)

  • a flaw in the Omnikey CardMan 4040 driver that allowed a local user to

execute arbitrary code with kernel privileges. In order to exploit this
issue, the Omnikey CardMan 4040 PCMCIA card must be present and the local
user must have access rights to the character device created by the driver.
(CVE-2007-0005, Moderate)

  • a flaw in the core-dump handling that allowed a local user to create core

dumps from unreadable binaries via PT_INTERP. (CVE-2007-0958, Low)

In addition to the security issues described above, a fix for a kernel
panic in the powernow-k8 module, and a fix for a kernel panic when booting
the Xen domain-0 on system with large memory installations have been included.

Red Hat would like to thank Daniel Roethlisberger for reporting an issue
fixed in this erratum.

Red Hat Enterprise Linux 5 users are advised to upgrade their kernels to
the packages associated with their machine architecture and configurations
as listed in this erratum.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 229883 - CVE-2007-0006 Key serial number collision problem
  • BZ - 229884 - CVE-2007-0005 Buffer Overflow in Omnikey CardMan 4040 cmx driver
  • BZ - 229885 - CVE-2007-0958 core-dumping unreadable binaries via PT_INTERP

CVEs

  • CVE-2007-0006
  • CVE-2007-0958
  • CVE-2007-0005

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-8.1.1.el5.src.rpm SHA-256: 08b687d71725abacd7b514ef0c7790fb47ec760748c26408b36c9a9d23601ecb
x86_64
kernel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 76da417845ef726434b95df0abb56fed8a4d1cdbe19a6d2d4e9b11379f791244
kernel-devel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 3bbd47b15cd9df2567334aa799888f9bf8043e38925cabc743f4547beb1fdbcf
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 2914015d71371138cd76eddacb40e1d0161f386b9246456661c0524fb64e3d0b
kernel-xen-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 3f22c063a55facf34ec1a95c8f1abbffeca21c3baab781769d8e6e2d4c0ca046
kernel-xen-devel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: ed3deb7c554c467b8c320b9ae149faa8d0ffd63a28fec930cfdeb56b5dbd4c7c
ia64
kernel-2.6.18-8.1.1.el5.ia64.rpm SHA-256: 6c2f53d4051c6717d2587a0c5bde83e697bcbc055d94b815aeee18dd254bbde3
kernel-devel-2.6.18-8.1.1.el5.ia64.rpm SHA-256: 35cb8ecc4da6ce1d285594c4fabdeb2f4246c126ec609062f5ecf5d50f2240c0
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.ia64.rpm SHA-256: c635fbc77d57a72c981bdde0862539b90a1836f65a076b21eea4b43b94a733cc
kernel-xen-2.6.18-8.1.1.el5.ia64.rpm SHA-256: 9d4f66d0464fe7cdc2a46b99f7b0002a5f15aefbb6c5015317fb578efd2bf33c
kernel-xen-devel-2.6.18-8.1.1.el5.ia64.rpm SHA-256: f8c0bd82a8a6a0ef4d37b246e8fe8fd0f4b69c5417753f313780fc27ba419166
i386
kernel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 3efdf880a420498b5c6d034b09edce54269d241bfbe78efb035b5eb669699efe
kernel-PAE-2.6.18-8.1.1.el5.i686.rpm SHA-256: 444b5be5d063d2b522418eaafad621112eb93ffc9e27fc4038efdfd5fd023f51
kernel-PAE-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 4d3a3ce90f169d917c9ecc2b65b6cfbbcc3e2f15ae2e1758ff23bef29e27585b
kernel-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 90fb25550e7ec623f5bf279485d55c75127f902b1c69b359eb39e9f2a381bb4e
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.i386.rpm SHA-256: 76148df8916d745dde34c3c0738ae86777e3c107ef3b2318760ef86b16e4f178
kernel-xen-2.6.18-8.1.1.el5.i686.rpm SHA-256: 3dd541c438b98dc0a829f141a4126a17bdcd99c74ec18dd96baaaf925779278e
kernel-xen-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: ed606ec0d3c8e622495b7f64fe73aa2a0483be01c8e032a479afb9981003291d

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-8.1.1.el5.src.rpm SHA-256: 08b687d71725abacd7b514ef0c7790fb47ec760748c26408b36c9a9d23601ecb
x86_64
kernel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 76da417845ef726434b95df0abb56fed8a4d1cdbe19a6d2d4e9b11379f791244
kernel-devel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 3bbd47b15cd9df2567334aa799888f9bf8043e38925cabc743f4547beb1fdbcf
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 2914015d71371138cd76eddacb40e1d0161f386b9246456661c0524fb64e3d0b
kernel-xen-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 3f22c063a55facf34ec1a95c8f1abbffeca21c3baab781769d8e6e2d4c0ca046
kernel-xen-devel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: ed3deb7c554c467b8c320b9ae149faa8d0ffd63a28fec930cfdeb56b5dbd4c7c
i386
kernel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 3efdf880a420498b5c6d034b09edce54269d241bfbe78efb035b5eb669699efe
kernel-PAE-2.6.18-8.1.1.el5.i686.rpm SHA-256: 444b5be5d063d2b522418eaafad621112eb93ffc9e27fc4038efdfd5fd023f51
kernel-PAE-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 4d3a3ce90f169d917c9ecc2b65b6cfbbcc3e2f15ae2e1758ff23bef29e27585b
kernel-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 90fb25550e7ec623f5bf279485d55c75127f902b1c69b359eb39e9f2a381bb4e
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.i386.rpm SHA-256: 76148df8916d745dde34c3c0738ae86777e3c107ef3b2318760ef86b16e4f178
kernel-xen-2.6.18-8.1.1.el5.i686.rpm SHA-256: 3dd541c438b98dc0a829f141a4126a17bdcd99c74ec18dd96baaaf925779278e
kernel-xen-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: ed606ec0d3c8e622495b7f64fe73aa2a0483be01c8e032a479afb9981003291d

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-8.1.1.el5.src.rpm SHA-256: 08b687d71725abacd7b514ef0c7790fb47ec760748c26408b36c9a9d23601ecb
x86_64
kernel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 76da417845ef726434b95df0abb56fed8a4d1cdbe19a6d2d4e9b11379f791244
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 2914015d71371138cd76eddacb40e1d0161f386b9246456661c0524fb64e3d0b
kernel-xen-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 3f22c063a55facf34ec1a95c8f1abbffeca21c3baab781769d8e6e2d4c0ca046
i386
kernel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 3efdf880a420498b5c6d034b09edce54269d241bfbe78efb035b5eb669699efe
kernel-PAE-2.6.18-8.1.1.el5.i686.rpm SHA-256: 444b5be5d063d2b522418eaafad621112eb93ffc9e27fc4038efdfd5fd023f51
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.i386.rpm SHA-256: 76148df8916d745dde34c3c0738ae86777e3c107ef3b2318760ef86b16e4f178
kernel-xen-2.6.18-8.1.1.el5.i686.rpm SHA-256: 3dd541c438b98dc0a829f141a4126a17bdcd99c74ec18dd96baaaf925779278e

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-8.1.1.el5.src.rpm SHA-256: 08b687d71725abacd7b514ef0c7790fb47ec760748c26408b36c9a9d23601ecb
s390x
kernel-2.6.18-8.1.1.el5.s390x.rpm SHA-256: cac6c46825dcac60e7c88ef9151a0db897a0373f37d53afe1e3a055f919784dc
kernel-devel-2.6.18-8.1.1.el5.s390x.rpm SHA-256: a91ce36111b8c5ecb21c222530fc2cc6e181480a87753ed4addbde7fb2688c40
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.s390x.rpm SHA-256: 8c008b31c34a83e6a839293382cb1f64a6d7143843eb16c830dd5436ebd9eb43

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-8.1.1.el5.src.rpm SHA-256: 08b687d71725abacd7b514ef0c7790fb47ec760748c26408b36c9a9d23601ecb
ppc
kernel-2.6.18-8.1.1.el5.ppc64.rpm SHA-256: a2fd4374d9e3c89df2ebfd72c9925b057e62e809d0fc8a0321488f1de4d3c373
kernel-devel-2.6.18-8.1.1.el5.ppc64.rpm SHA-256: 1e4d147c8fcf78d25ccd80be6ab0376e271faa7bc9ce25713217f5b213eaca6a
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.ppc.rpm SHA-256: 72ce718d1ef38abf4b20ec697468fa994cd601e872b2c52f76bb1ada755fb36c
kernel-headers-2.6.18-8.1.1.el5.ppc64.rpm SHA-256: b79b9903177ae6bfeef508ae266e43cdd122a3ad6192670f728f46a92e85334e
kernel-kdump-2.6.18-8.1.1.el5.ppc64.rpm SHA-256: d8b81eebddc5d8f0e3edb3e5227d739395bab23096671cba260d3bf79b6cf16e
kernel-kdump-devel-2.6.18-8.1.1.el5.ppc64.rpm SHA-256: 989f2f8f372f28b93dc3877c0158a5ff8f62776f2207cc223df93f6f34aa9c71

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-8.1.1.el5.src.rpm SHA-256: 08b687d71725abacd7b514ef0c7790fb47ec760748c26408b36c9a9d23601ecb
x86_64
kernel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 76da417845ef726434b95df0abb56fed8a4d1cdbe19a6d2d4e9b11379f791244
kernel-devel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 3bbd47b15cd9df2567334aa799888f9bf8043e38925cabc743f4547beb1fdbcf
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 2914015d71371138cd76eddacb40e1d0161f386b9246456661c0524fb64e3d0b
kernel-xen-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: 3f22c063a55facf34ec1a95c8f1abbffeca21c3baab781769d8e6e2d4c0ca046
kernel-xen-devel-2.6.18-8.1.1.el5.x86_64.rpm SHA-256: ed3deb7c554c467b8c320b9ae149faa8d0ffd63a28fec930cfdeb56b5dbd4c7c
i386
kernel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 3efdf880a420498b5c6d034b09edce54269d241bfbe78efb035b5eb669699efe
kernel-PAE-2.6.18-8.1.1.el5.i686.rpm SHA-256: 444b5be5d063d2b522418eaafad621112eb93ffc9e27fc4038efdfd5fd023f51
kernel-PAE-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 4d3a3ce90f169d917c9ecc2b65b6cfbbcc3e2f15ae2e1758ff23bef29e27585b
kernel-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: 90fb25550e7ec623f5bf279485d55c75127f902b1c69b359eb39e9f2a381bb4e
kernel-doc-2.6.18-8.1.1.el5.noarch.rpm SHA-256: 2d6e17211cc44927c103db9f56a38fdb755bd75a83f879718522918fd0306300
kernel-headers-2.6.18-8.1.1.el5.i386.rpm SHA-256: 76148df8916d745dde34c3c0738ae86777e3c107ef3b2318760ef86b16e4f178
kernel-xen-2.6.18-8.1.1.el5.i686.rpm SHA-256: 3dd541c438b98dc0a829f141a4126a17bdcd99c74ec18dd96baaaf925779278e
kernel-xen-devel-2.6.18-8.1.1.el5.i686.rpm SHA-256: ed606ec0d3c8e622495b7f64fe73aa2a0483be01c8e032a479afb9981003291d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility