- Issued:
- 2007-10-22
- Updated:
- 2007-10-22
RHSA-2007:0940 - Security Advisory
Synopsis
Important: kernel security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix various security issues in the Red Hat
Enterprise Linux 5 kernel are now available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Description
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the following security issues:
- A flaw was found in the backported stack unwinder fixes in Red Hat
Enterprise Linux 5. On AMD64 and Intel 64 platforms, a local user could
trigger this flaw and cause a denial of service. (CVE-2007-4574, Important)
- A flaw was found in the handling of process death signals. This allowed a
local user to send arbitrary signals to the suid-process executed by that
user. A successful exploitation of this flaw depends on the structure of
the suid-program and its signal handling. (CVE-2007-3848, Important)
- A flaw was found in the Distributed Lock Manager (DLM) in the cluster
manager. This allowed a remote user who is able to connect to the DLM port
to cause a denial of service. (CVE-2007-3380, Important)
- A flaw was found in the aacraid SCSI driver. This allowed a local user to
make ioctl calls to the driver which should otherwise be restricted to
privileged users. (CVE-2007-4308, Moderate)
- A flaw was found in the prio_tree handling of the hugetlb support that
allowed a local user to cause a denial of service. This only affected
kernels with hugetlb support. (CVE-2007-4133, Moderate)
- A flaw was found in the eHCA driver on PowerPC architectures that allowed
a local user to access 60k of physical address space. This address space
could contain sensitive information. (CVE-2007-3850, Moderate)
- A flaw was found in ptrace support that allowed a local user to cause a
denial of service via a NULL pointer dereference. (CVE-2007-3731, Moderate)
- A flaw was found in the usblcd driver that allowed a local user to cause
a denial
of service by writing data to the device node. To exploit this issue, write
access to the device node was needed. (CVE-2007-3513, Moderate)
- A flaw was found in the random number generator implementation that
allowed a local user to cause a denial of service or possibly gain
privileges. If the root user raised the default wakeup threshold over the
size of the output pool, this flaw could be exploited. (CVE-2007-3105, Low)
In addition to the security issues described above, several bug fixes
preventing possible system crashes and data corruption were also included.
Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which contain backported patches to resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 245922 - CVE-2007-3380 A TCP connection to DLM port blocks DLM operations
- BZ - 247728 - CVE-2007-3513 Locally triggerable memory consumption in usblcd
- BZ - 248324 - CVE-2007-3731 NULL pointer dereference triggered by ptrace
- BZ - 248325 - CVE-2007-3105 Bound check ordering issue in random driver
- BZ - 250972 - CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG
- BZ - 252309 - CVE-2007-4308 Missing ioctl() permission checks in aacraid driver
- BZ - 253926 - CVE-2007-4133 prio_tree unit kernel panic
- BZ - 298141 - CVE-2007-4574 EM64T local DoS
- BZ - 308811 - CVE-2007-3850 kernel LTC31426-4k page mapping support for userspace in 64k kernels
CVEs
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kernel-2.6.18-8.1.15.el5.src.rpm | SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967 |
x86_64 | |
kernel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 26bb876e21c8f11ea0177eca32f15c9d8f15d2f1e6f8ec0fa496c5cfe796cbe7 |
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: ed258d16e6acde8a7910608fb9ffb5337f8b1c7b608508c62903fe6abcfe51da |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 005b2d10dd2284371c44b23960e2cb3150dbddb8994832dbba6e64f94fe27e69 |
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 90948d404b73d5dfb81f8aae2d667cc541f3089cc9a182988c68ca20ec76995d |
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 0dcfd18febc0e18367f30553a74f80b26ea7de564fc60ee0116397779c41b0e0 |
ia64 | |
kernel-2.6.18-8.1.15.el5.ia64.rpm | SHA-256: 219b11c1e2b86d21af9c976b1fd5c1190e7787fcbbdd5d881197bf8e31667f1d |
kernel-devel-2.6.18-8.1.15.el5.ia64.rpm | SHA-256: d19005fe7446929589efa8f37efbdc5c9319f8f3f944e167b6da3942147a3414 |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.ia64.rpm | SHA-256: 926e76ec506f50bc8360fa9a16b50253457b97e1c0fcb8a82ea3488eb4afbf54 |
kernel-xen-2.6.18-8.1.15.el5.ia64.rpm | SHA-256: f664c2f09fb644b83aeea0c12f1c4a6314924ecb4d544dab4cfdb61ed9e5443f |
kernel-xen-devel-2.6.18-8.1.15.el5.ia64.rpm | SHA-256: d785472ce072c663f36882f98452d155905dc8c49be04e034460bf1856acf682 |
i386 | |
kernel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 3d3f67e39e0cf3b482aa6f1cd978d8a4e0365f1e68d702c133b2240408fc9ec9 |
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm | SHA-256: fe53cbf04f34eeb47818ee016d52d58709865d95505bc6382e02b1feae98461e |
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 5b3ae7c35508c5be6a35b737e8c1f4cf0a3438b91f49a8b24c8165efa642390c |
kernel-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: fd24b612105f8b26af8a150d9a301ddc4b13f93cb9a7eb81cc2b77b946ec5eaf |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.i386.rpm | SHA-256: 970e1a18c0b395112de9527b7ed5707cebdb08c95fed5b3232ed04278141af8e |
kernel-xen-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 9c080d2508d68399504a7f1ed73eaf90011a3295fa4a3de52f85464709907228 |
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 6bdaa52236b2aab7276ab31e6dbb43345b686be294d672f4b128e804c11640d3 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kernel-2.6.18-8.1.15.el5.src.rpm | SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967 |
x86_64 | |
kernel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 26bb876e21c8f11ea0177eca32f15c9d8f15d2f1e6f8ec0fa496c5cfe796cbe7 |
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: ed258d16e6acde8a7910608fb9ffb5337f8b1c7b608508c62903fe6abcfe51da |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 005b2d10dd2284371c44b23960e2cb3150dbddb8994832dbba6e64f94fe27e69 |
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 90948d404b73d5dfb81f8aae2d667cc541f3089cc9a182988c68ca20ec76995d |
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 0dcfd18febc0e18367f30553a74f80b26ea7de564fc60ee0116397779c41b0e0 |
i386 | |
kernel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 3d3f67e39e0cf3b482aa6f1cd978d8a4e0365f1e68d702c133b2240408fc9ec9 |
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm | SHA-256: fe53cbf04f34eeb47818ee016d52d58709865d95505bc6382e02b1feae98461e |
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 5b3ae7c35508c5be6a35b737e8c1f4cf0a3438b91f49a8b24c8165efa642390c |
kernel-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: fd24b612105f8b26af8a150d9a301ddc4b13f93cb9a7eb81cc2b77b946ec5eaf |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.i386.rpm | SHA-256: 970e1a18c0b395112de9527b7ed5707cebdb08c95fed5b3232ed04278141af8e |
kernel-xen-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 9c080d2508d68399504a7f1ed73eaf90011a3295fa4a3de52f85464709907228 |
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 6bdaa52236b2aab7276ab31e6dbb43345b686be294d672f4b128e804c11640d3 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
kernel-2.6.18-8.1.15.el5.src.rpm | SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967 |
x86_64 | |
kernel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 26bb876e21c8f11ea0177eca32f15c9d8f15d2f1e6f8ec0fa496c5cfe796cbe7 |
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: ed258d16e6acde8a7910608fb9ffb5337f8b1c7b608508c62903fe6abcfe51da |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 005b2d10dd2284371c44b23960e2cb3150dbddb8994832dbba6e64f94fe27e69 |
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 90948d404b73d5dfb81f8aae2d667cc541f3089cc9a182988c68ca20ec76995d |
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 0dcfd18febc0e18367f30553a74f80b26ea7de564fc60ee0116397779c41b0e0 |
i386 | |
kernel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 3d3f67e39e0cf3b482aa6f1cd978d8a4e0365f1e68d702c133b2240408fc9ec9 |
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm | SHA-256: fe53cbf04f34eeb47818ee016d52d58709865d95505bc6382e02b1feae98461e |
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 5b3ae7c35508c5be6a35b737e8c1f4cf0a3438b91f49a8b24c8165efa642390c |
kernel-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: fd24b612105f8b26af8a150d9a301ddc4b13f93cb9a7eb81cc2b77b946ec5eaf |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.i386.rpm | SHA-256: 970e1a18c0b395112de9527b7ed5707cebdb08c95fed5b3232ed04278141af8e |
kernel-xen-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 9c080d2508d68399504a7f1ed73eaf90011a3295fa4a3de52f85464709907228 |
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 6bdaa52236b2aab7276ab31e6dbb43345b686be294d672f4b128e804c11640d3 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
kernel-2.6.18-8.1.15.el5.src.rpm | SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967 |
s390x | |
kernel-2.6.18-8.1.15.el5.s390x.rpm | SHA-256: 88da4bb200d192dfeb1ddf53c8c5cd9e5a70c72e387976a3d9230836981d5cde |
kernel-devel-2.6.18-8.1.15.el5.s390x.rpm | SHA-256: ea201dfa69c8c9330dbe6ee878a03efd12c8b986b9701377cd3d36b6edf6c92c |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.s390x.rpm | SHA-256: a48b73ee1ade07f62ecc807eb8116c03a3e7eea99437877a5cde904eb68494a9 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
kernel-2.6.18-8.1.15.el5.src.rpm | SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967 |
ppc | |
kernel-2.6.18-8.1.15.el5.ppc64.rpm | SHA-256: f0fad744935fffaea40129dfe0a62b79113760e6c97788a0a4ae28dd1e51d95e |
kernel-devel-2.6.18-8.1.15.el5.ppc64.rpm | SHA-256: 8efc30b33ad7754607cde0585102bb62de8f31dbc5a85fdcda858cf29943e3c3 |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.ppc.rpm | SHA-256: da45901a80dea3da78d3206de64af900c4b0e1112e866a075387e5c6f5ec0a98 |
kernel-headers-2.6.18-8.1.15.el5.ppc64.rpm | SHA-256: f623b6db7b5f4ced9a4cf47193f859b7309d4f9c660f0fa28b517093ecb2607f |
kernel-kdump-2.6.18-8.1.15.el5.ppc64.rpm | SHA-256: 350c3359b0e571d483a00574f4d3168f76171acb7ece56aa08f14d21e65bf8ef |
kernel-kdump-devel-2.6.18-8.1.15.el5.ppc64.rpm | SHA-256: c686de3d648764f7bb240b2b79c9851c2ec89c6da10e61f3163db1458720554d |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
kernel-2.6.18-8.1.15.el5.src.rpm | SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967 |
x86_64 | |
kernel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 26bb876e21c8f11ea0177eca32f15c9d8f15d2f1e6f8ec0fa496c5cfe796cbe7 |
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: ed258d16e6acde8a7910608fb9ffb5337f8b1c7b608508c62903fe6abcfe51da |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 005b2d10dd2284371c44b23960e2cb3150dbddb8994832dbba6e64f94fe27e69 |
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 90948d404b73d5dfb81f8aae2d667cc541f3089cc9a182988c68ca20ec76995d |
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm | SHA-256: 0dcfd18febc0e18367f30553a74f80b26ea7de564fc60ee0116397779c41b0e0 |
i386 | |
kernel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 3d3f67e39e0cf3b482aa6f1cd978d8a4e0365f1e68d702c133b2240408fc9ec9 |
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm | SHA-256: fe53cbf04f34eeb47818ee016d52d58709865d95505bc6382e02b1feae98461e |
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 5b3ae7c35508c5be6a35b737e8c1f4cf0a3438b91f49a8b24c8165efa642390c |
kernel-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: fd24b612105f8b26af8a150d9a301ddc4b13f93cb9a7eb81cc2b77b946ec5eaf |
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm | SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d |
kernel-headers-2.6.18-8.1.15.el5.i386.rpm | SHA-256: 970e1a18c0b395112de9527b7ed5707cebdb08c95fed5b3232ed04278141af8e |
kernel-xen-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 9c080d2508d68399504a7f1ed73eaf90011a3295fa4a3de52f85464709907228 |
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm | SHA-256: 6bdaa52236b2aab7276ab31e6dbb43345b686be294d672f4b128e804c11640d3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.