Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2007:0169 - Security Advisory
Issued:
2007-04-30
Updated:
2007-04-30

RHSA-2007:0169 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix security issues and bugs in the Red Hat
Enterprise Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

  • a flaw in the IPv6 socket option handling that allowed a local user to

read arbitrary kernel memory (CVE-2007-1000, Important).

  • a flaw in the IPv6 socket option handling that allowed a local user to

cause a denial of service (CVE-2007-1388, Important).

  • a flaw in the utrace support that allowed a local user to cause a denial

of service (CVE-2007-0771, Important).

In addition to the security issues described above, a fix for a memory leak
in the audit subsystem and a fix for a data corruption bug on s390 systems
have been included.

Red Hat Enterprise Linux 5 users are advised to upgrade to these erratum
packages, which are not vulnerable to these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 228816 - CVE-2007-0771 utrace regression / denial of service
  • BZ - 232255 - CVE-2007-1388 NULL pointer dereference in do_ipv6_setsockopt
  • BZ - 232257 - CVE-2007-1000 NULL pointer hole in ipv6
  • BZ - 233157 - Kernel memory leak in audit subsystem

CVEs

  • CVE-2007-1000
  • CVE-2007-1388
  • CVE-2007-0771

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-8.1.3.el5.src.rpm SHA-256: 027809bc7cc02e83ce8d1a21f26bab1ad58801994c60d7e5ac2f3473b5d399f1
x86_64
kernel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 38dd3f8ddd60596c3cbaf7e2feb2cc0e3046318cac3f162c6870d156d30e3b62
kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 22aa65c876179a68ce05967dabf9ae5045a6bf74a9b9fe5f7308b329227c55eb
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 12df8d5488dff5d7d676d868db02cac83d6da03dd5d1dc618da4b03004ab96c2
kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: d0cbf2ccefa0e2046393b76f5f8a214fb1ae816c45752e12e51f5f248f593be8
kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 214f8ea5800a574f5e03f9b4e0dd3a9a6e67d91ca9ca01a30eaffdda4205ae7d
ia64
kernel-2.6.18-8.1.3.el5.ia64.rpm SHA-256: 4b22645bd9d4bf8701ea245a2841bd156beb7263d4ca3fee7feffea1d899731b
kernel-devel-2.6.18-8.1.3.el5.ia64.rpm SHA-256: 60a8897a5dbb3bb3a5be69458f3282fa03f07168b98043c1349f78a6170f3dc1
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.ia64.rpm SHA-256: 529008918fba08611ee0af5cfeded3e290352ef05566ef4aa869c714e5692681
kernel-xen-2.6.18-8.1.3.el5.ia64.rpm SHA-256: 1f1f85308ab21b1a7823e502200605b1710d139f92648712b4d8bdcb9133f92a
kernel-xen-devel-2.6.18-8.1.3.el5.ia64.rpm SHA-256: b4e7595810a800f03b112a510aa10a9f3c5452f491d6cc1372027c685b699127
i386
kernel-2.6.18-8.1.3.el5.i686.rpm SHA-256: d6fa4ee900c9473b6945c07f14445d6cc51bd5865ad77c3bdb85fd0af7aad755
kernel-PAE-2.6.18-8.1.3.el5.i686.rpm SHA-256: c2f172643abe5f1590eea86fc0927eece9e0043a327f6181c447ad4e2f86d456
kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: 752ce74ff7ac8e275cd9c2659a282ab9c3be035c412076695d70f2fa12a461cc
kernel-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: c22c158f935ff76220fd39f73a7244b368179af5f7ffa43eb4d6ae426bb1ac76
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.i386.rpm SHA-256: 0d68c1e504baae408494f612ecb1331f14662541908a163d6f590ff03d361714
kernel-xen-2.6.18-8.1.3.el5.i686.rpm SHA-256: f025c673be3d58c9c58b58ddd8a7964bb7ccddc1aabe1ee278c0fbfb0abd55cb
kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: 720d77ab0545e81b8031eef01e214d9c9ac794a8e2f5bcc660a6875a1960bf8e

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-8.1.3.el5.src.rpm SHA-256: 027809bc7cc02e83ce8d1a21f26bab1ad58801994c60d7e5ac2f3473b5d399f1
x86_64
kernel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 38dd3f8ddd60596c3cbaf7e2feb2cc0e3046318cac3f162c6870d156d30e3b62
kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 22aa65c876179a68ce05967dabf9ae5045a6bf74a9b9fe5f7308b329227c55eb
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 12df8d5488dff5d7d676d868db02cac83d6da03dd5d1dc618da4b03004ab96c2
kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: d0cbf2ccefa0e2046393b76f5f8a214fb1ae816c45752e12e51f5f248f593be8
kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 214f8ea5800a574f5e03f9b4e0dd3a9a6e67d91ca9ca01a30eaffdda4205ae7d
i386
kernel-2.6.18-8.1.3.el5.i686.rpm SHA-256: d6fa4ee900c9473b6945c07f14445d6cc51bd5865ad77c3bdb85fd0af7aad755
kernel-PAE-2.6.18-8.1.3.el5.i686.rpm SHA-256: c2f172643abe5f1590eea86fc0927eece9e0043a327f6181c447ad4e2f86d456
kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: 752ce74ff7ac8e275cd9c2659a282ab9c3be035c412076695d70f2fa12a461cc
kernel-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: c22c158f935ff76220fd39f73a7244b368179af5f7ffa43eb4d6ae426bb1ac76
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.i386.rpm SHA-256: 0d68c1e504baae408494f612ecb1331f14662541908a163d6f590ff03d361714
kernel-xen-2.6.18-8.1.3.el5.i686.rpm SHA-256: f025c673be3d58c9c58b58ddd8a7964bb7ccddc1aabe1ee278c0fbfb0abd55cb
kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: 720d77ab0545e81b8031eef01e214d9c9ac794a8e2f5bcc660a6875a1960bf8e

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-8.1.3.el5.src.rpm SHA-256: 027809bc7cc02e83ce8d1a21f26bab1ad58801994c60d7e5ac2f3473b5d399f1
x86_64
kernel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 38dd3f8ddd60596c3cbaf7e2feb2cc0e3046318cac3f162c6870d156d30e3b62
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 12df8d5488dff5d7d676d868db02cac83d6da03dd5d1dc618da4b03004ab96c2
kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: d0cbf2ccefa0e2046393b76f5f8a214fb1ae816c45752e12e51f5f248f593be8
i386
kernel-2.6.18-8.1.3.el5.i686.rpm SHA-256: d6fa4ee900c9473b6945c07f14445d6cc51bd5865ad77c3bdb85fd0af7aad755
kernel-PAE-2.6.18-8.1.3.el5.i686.rpm SHA-256: c2f172643abe5f1590eea86fc0927eece9e0043a327f6181c447ad4e2f86d456
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.i386.rpm SHA-256: 0d68c1e504baae408494f612ecb1331f14662541908a163d6f590ff03d361714
kernel-xen-2.6.18-8.1.3.el5.i686.rpm SHA-256: f025c673be3d58c9c58b58ddd8a7964bb7ccddc1aabe1ee278c0fbfb0abd55cb

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-8.1.3.el5.src.rpm SHA-256: 027809bc7cc02e83ce8d1a21f26bab1ad58801994c60d7e5ac2f3473b5d399f1
s390x
kernel-2.6.18-8.1.3.el5.s390x.rpm SHA-256: ee37cfb52f066f7d2b8aa282868c4b61072ded25857e8dcb2db774fd373c507a
kernel-devel-2.6.18-8.1.3.el5.s390x.rpm SHA-256: d1d6eb8f2f02a5fcd8fab609bc1537e1fbac5012fe1792028977a5213b8137f4
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.s390x.rpm SHA-256: 61590560670e693e4b6ea0c35ea55d8000a67c095bf19c30485ba579ddcd92e9

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-8.1.3.el5.src.rpm SHA-256: 027809bc7cc02e83ce8d1a21f26bab1ad58801994c60d7e5ac2f3473b5d399f1
ppc
kernel-2.6.18-8.1.3.el5.ppc64.rpm SHA-256: 2c238a36eaea7dfeef5ccca26a56556bb52c62d06f8eaab3eb972bf59276790e
kernel-devel-2.6.18-8.1.3.el5.ppc64.rpm SHA-256: c429ffd34922025c86f0f308144210db1368ade28c4b95ae2f463f96be552267
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.ppc.rpm SHA-256: 354dc738f54ca92159a9e8b8dc7cd8dd8e8db25127908b23d18426f5fc02a1d9
kernel-headers-2.6.18-8.1.3.el5.ppc64.rpm SHA-256: d5cbcaead82283bd40f77b76f11783b665b0503eece22f0f2fcea1565df0c038
kernel-kdump-2.6.18-8.1.3.el5.ppc64.rpm SHA-256: f936d51e0ce5f949c82f4b72cc85128987d1c0575b453ca224b1d845b8d02394
kernel-kdump-devel-2.6.18-8.1.3.el5.ppc64.rpm SHA-256: 07ae428e9c9f23c967f74d672aade0a9b34520fad3246229d810bc1479e1fbd2

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-8.1.3.el5.src.rpm SHA-256: 027809bc7cc02e83ce8d1a21f26bab1ad58801994c60d7e5ac2f3473b5d399f1
x86_64
kernel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 38dd3f8ddd60596c3cbaf7e2feb2cc0e3046318cac3f162c6870d156d30e3b62
kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 22aa65c876179a68ce05967dabf9ae5045a6bf74a9b9fe5f7308b329227c55eb
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 12df8d5488dff5d7d676d868db02cac83d6da03dd5d1dc618da4b03004ab96c2
kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: d0cbf2ccefa0e2046393b76f5f8a214fb1ae816c45752e12e51f5f248f593be8
kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm SHA-256: 214f8ea5800a574f5e03f9b4e0dd3a9a6e67d91ca9ca01a30eaffdda4205ae7d
i386
kernel-2.6.18-8.1.3.el5.i686.rpm SHA-256: d6fa4ee900c9473b6945c07f14445d6cc51bd5865ad77c3bdb85fd0af7aad755
kernel-PAE-2.6.18-8.1.3.el5.i686.rpm SHA-256: c2f172643abe5f1590eea86fc0927eece9e0043a327f6181c447ad4e2f86d456
kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: 752ce74ff7ac8e275cd9c2659a282ab9c3be035c412076695d70f2fa12a461cc
kernel-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: c22c158f935ff76220fd39f73a7244b368179af5f7ffa43eb4d6ae426bb1ac76
kernel-doc-2.6.18-8.1.3.el5.noarch.rpm SHA-256: 937e51a6965898ddc6de610f2ab299ffb163335622ba81967746328dbc6b15ad
kernel-headers-2.6.18-8.1.3.el5.i386.rpm SHA-256: 0d68c1e504baae408494f612ecb1331f14662541908a163d6f590ff03d361714
kernel-xen-2.6.18-8.1.3.el5.i686.rpm SHA-256: f025c673be3d58c9c58b58ddd8a7964bb7ccddc1aabe1ee278c0fbfb0abd55cb
kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm SHA-256: 720d77ab0545e81b8031eef01e214d9c9ac794a8e2f5bcc660a6875a1960bf8e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter