- Issued:
- 2007-06-14
- Updated:
- 2007-06-14
RHSA-2007:0376 - Security Advisory
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix security issues and bugs in the Red Hat
Enterprise Linux 5 kernel are now available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Description
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the following security issues:
- a flaw in the mount handling routine for 64-bit systems that allowed a
local user to cause denial of service (CVE-2006-7203, Important).
- a flaw in the PPP over Ethernet implementation that allowed a remote user
to cause a denial of service (CVE-2007-2525, Important).
- a flaw in the Bluetooth subsystem that allowed a local user to trigger an
information leak (CVE-2007-1353, Low).
- a bug in the random number generator that prevented the manual seeding of
the entropy pool (CVE-2007-2453, Low).
In addition to the security issues described above, fixes for the following
have been included:
- a race condition between ext3_link/unlink that could create an orphan
inode list corruption.
- a bug in the e1000 driver that could lead to a watchdog timeout panic.
Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which contain backported patches to correct these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 238048 - watchdog timeout panic in e1000 driver
- BZ - 240456 - CVE-2006-7203 oops in compat_sys_mount() when data pointer is NULL
- BZ - 241862 - CVE-2007-1353 Bluetooth setsockopt() information leaks
- BZ - 241863 - CVE-2007-2525 PPPoE socket PPPIOCGCHAN denial of service
- BZ - 241888 - CVE-2007-2453 Slightly degraded pool mixing for entropy extraction
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kernel-2.6.18-8.1.6.el5.src.rpm | SHA-256: d2a4ddca1c6e711f311f28ec83473aa3d9ce29c3d5a7f383b33e66daa3c8fb08 |
x86_64 | |
kernel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 7d1a60925a2fc2b4ad8960f79942fed7f26927c085aac434b7e0e8ea5360bb31 |
kernel-devel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 6787b1a838a7da5722cad7ec5ac38254b8e07ad5d166a7ce1bd9363afb6e64a9 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: f1e2631a3758f1ec1d002708607fa184b3e6eb37c7dbdfb66a1eace6f77fe57c |
kernel-xen-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 08466f2b1b49acf14b4dbdb97f9a9f707e188aa5df53be232c993c86ffd07ef1 |
kernel-xen-devel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 6991335b2326a04047ae40fbf9a1a7bcc37553d0b42d0ed9b31c5e469f717672 |
ia64 | |
kernel-2.6.18-8.1.6.el5.ia64.rpm | SHA-256: 26f3e4742603ae093f5a8c6ac25aab95f964bc76d0f788ad85e294c7089fd6b9 |
kernel-devel-2.6.18-8.1.6.el5.ia64.rpm | SHA-256: 920cd090831fcd6200aa8a2ea1dfffb14b62def2ff422638c4bcd4755e1c5227 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.ia64.rpm | SHA-256: 649da53b9aaadbf2ab806c2e926e737b0517acb777777103e4dffc99e0ab8772 |
kernel-xen-2.6.18-8.1.6.el5.ia64.rpm | SHA-256: 5f3a8e93af9c7116ee88e58b9e2cdab4fd7ed68e149b968ea7631de1483aa4e4 |
kernel-xen-devel-2.6.18-8.1.6.el5.ia64.rpm | SHA-256: 74210e19fae8ba867345b7f76866925379640c9d24a6cc2e75c4a060af7b4c76 |
i386 | |
kernel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 3c6513532bbc0408e7d4b84374ec991f9f3a00585b6b922b4f4f42c8db951f30 |
kernel-PAE-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 848520cf57a2ae58025ca26ec2ffa0c62105fd39e0259e5d0bc34e46d13d1468 |
kernel-PAE-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: a18c10a972e39af52e3b68c801af5bbfc4b4c751acfcf2462a978986114cd9a2 |
kernel-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 97fad47ba481e5bd19fcca93ddbaaa80f2f558ce72292ccc1f807dbc5d24d422 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.i386.rpm | SHA-256: fbe8785db731d2cadb53a5952112a26c5542855e9beacc40f1352040e42ca1a2 |
kernel-xen-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 0157036a2c6b41de95da3fa554f03208f330f181e576574fe718ceb853af7897 |
kernel-xen-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: bdb34e8151e595207720daf0903daefb3e9eb5f04ecc09e0b5a17365eeaa7c08 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kernel-2.6.18-8.1.6.el5.src.rpm | SHA-256: d2a4ddca1c6e711f311f28ec83473aa3d9ce29c3d5a7f383b33e66daa3c8fb08 |
x86_64 | |
kernel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 7d1a60925a2fc2b4ad8960f79942fed7f26927c085aac434b7e0e8ea5360bb31 |
kernel-devel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 6787b1a838a7da5722cad7ec5ac38254b8e07ad5d166a7ce1bd9363afb6e64a9 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: f1e2631a3758f1ec1d002708607fa184b3e6eb37c7dbdfb66a1eace6f77fe57c |
kernel-xen-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 08466f2b1b49acf14b4dbdb97f9a9f707e188aa5df53be232c993c86ffd07ef1 |
kernel-xen-devel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 6991335b2326a04047ae40fbf9a1a7bcc37553d0b42d0ed9b31c5e469f717672 |
i386 | |
kernel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 3c6513532bbc0408e7d4b84374ec991f9f3a00585b6b922b4f4f42c8db951f30 |
kernel-PAE-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 848520cf57a2ae58025ca26ec2ffa0c62105fd39e0259e5d0bc34e46d13d1468 |
kernel-PAE-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: a18c10a972e39af52e3b68c801af5bbfc4b4c751acfcf2462a978986114cd9a2 |
kernel-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 97fad47ba481e5bd19fcca93ddbaaa80f2f558ce72292ccc1f807dbc5d24d422 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.i386.rpm | SHA-256: fbe8785db731d2cadb53a5952112a26c5542855e9beacc40f1352040e42ca1a2 |
kernel-xen-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 0157036a2c6b41de95da3fa554f03208f330f181e576574fe718ceb853af7897 |
kernel-xen-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: bdb34e8151e595207720daf0903daefb3e9eb5f04ecc09e0b5a17365eeaa7c08 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
kernel-2.6.18-8.1.6.el5.src.rpm | SHA-256: d2a4ddca1c6e711f311f28ec83473aa3d9ce29c3d5a7f383b33e66daa3c8fb08 |
x86_64 | |
kernel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 7d1a60925a2fc2b4ad8960f79942fed7f26927c085aac434b7e0e8ea5360bb31 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: f1e2631a3758f1ec1d002708607fa184b3e6eb37c7dbdfb66a1eace6f77fe57c |
kernel-xen-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 08466f2b1b49acf14b4dbdb97f9a9f707e188aa5df53be232c993c86ffd07ef1 |
i386 | |
kernel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 3c6513532bbc0408e7d4b84374ec991f9f3a00585b6b922b4f4f42c8db951f30 |
kernel-PAE-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 848520cf57a2ae58025ca26ec2ffa0c62105fd39e0259e5d0bc34e46d13d1468 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.i386.rpm | SHA-256: fbe8785db731d2cadb53a5952112a26c5542855e9beacc40f1352040e42ca1a2 |
kernel-xen-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 0157036a2c6b41de95da3fa554f03208f330f181e576574fe718ceb853af7897 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
kernel-2.6.18-8.1.6.el5.src.rpm | SHA-256: d2a4ddca1c6e711f311f28ec83473aa3d9ce29c3d5a7f383b33e66daa3c8fb08 |
s390x | |
kernel-2.6.18-8.1.6.el5.s390x.rpm | SHA-256: 2c5cb4be4ea80f60ad02dda6e2191f14921dc491810a493cb049fb445d1f5ab7 |
kernel-devel-2.6.18-8.1.6.el5.s390x.rpm | SHA-256: 6be8758d603f2f4aecc050ee066ed3eb093926de2df3b59cbc6983c2514f84bc |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.s390x.rpm | SHA-256: fbe59adaa04ba87bea8c48d7330ac7520e7355d0ba282438e0a35a5115017177 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
kernel-2.6.18-8.1.6.el5.src.rpm | SHA-256: d2a4ddca1c6e711f311f28ec83473aa3d9ce29c3d5a7f383b33e66daa3c8fb08 |
ppc | |
kernel-2.6.18-8.1.6.el5.ppc64.rpm | SHA-256: 1c6d76b946a9c97b9cb3511948315153eafe85a8b449caa763ab906f6aabaf4e |
kernel-devel-2.6.18-8.1.6.el5.ppc64.rpm | SHA-256: a9ad960125a9dcc1e2c129a76eade4b295f1d477691848b7334170c776b649be |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.ppc.rpm | SHA-256: 5bcde60b9af6455d1c0cd6e51502f1b07d9c99a4ed54462c5ca76f8e621498e3 |
kernel-headers-2.6.18-8.1.6.el5.ppc64.rpm | SHA-256: a9c8621d600b699a400ef37d9f74f467cfb321a2db4c356f3314aac6171d42aa |
kernel-kdump-2.6.18-8.1.6.el5.ppc64.rpm | SHA-256: ddbc7d6bb505cef13ff2752e42648d5a8d4de6ecb7f71c3deaefcfddf0f9d88b |
kernel-kdump-devel-2.6.18-8.1.6.el5.ppc64.rpm | SHA-256: b284ca730fd9aff7a0624105d5be9264a033e20465a342efe18532dfe212bac3 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
kernel-2.6.18-8.1.6.el5.src.rpm | SHA-256: d2a4ddca1c6e711f311f28ec83473aa3d9ce29c3d5a7f383b33e66daa3c8fb08 |
x86_64 | |
kernel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 7d1a60925a2fc2b4ad8960f79942fed7f26927c085aac434b7e0e8ea5360bb31 |
kernel-devel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 6787b1a838a7da5722cad7ec5ac38254b8e07ad5d166a7ce1bd9363afb6e64a9 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: f1e2631a3758f1ec1d002708607fa184b3e6eb37c7dbdfb66a1eace6f77fe57c |
kernel-xen-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 08466f2b1b49acf14b4dbdb97f9a9f707e188aa5df53be232c993c86ffd07ef1 |
kernel-xen-devel-2.6.18-8.1.6.el5.x86_64.rpm | SHA-256: 6991335b2326a04047ae40fbf9a1a7bcc37553d0b42d0ed9b31c5e469f717672 |
i386 | |
kernel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 3c6513532bbc0408e7d4b84374ec991f9f3a00585b6b922b4f4f42c8db951f30 |
kernel-PAE-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 848520cf57a2ae58025ca26ec2ffa0c62105fd39e0259e5d0bc34e46d13d1468 |
kernel-PAE-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: a18c10a972e39af52e3b68c801af5bbfc4b4c751acfcf2462a978986114cd9a2 |
kernel-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 97fad47ba481e5bd19fcca93ddbaaa80f2f558ce72292ccc1f807dbc5d24d422 |
kernel-doc-2.6.18-8.1.6.el5.noarch.rpm | SHA-256: 8075cd2d89561da0ed4e1b93c3f774a4356722af8458b4df56ef0a20755d3b3f |
kernel-headers-2.6.18-8.1.6.el5.i386.rpm | SHA-256: fbe8785db731d2cadb53a5952112a26c5542855e9beacc40f1352040e42ca1a2 |
kernel-xen-2.6.18-8.1.6.el5.i686.rpm | SHA-256: 0157036a2c6b41de95da3fa554f03208f330f181e576574fe718ceb853af7897 |
kernel-xen-devel-2.6.18-8.1.6.el5.i686.rpm | SHA-256: bdb34e8151e595207720daf0903daefb3e9eb5f04ecc09e0b5a17365eeaa7c08 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.