Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2007:0940 - Security Advisory
Issued:
2007-10-22
Updated:
2007-10-22

RHSA-2007:0940 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix various security issues in the Red Hat
Enterprise Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

  • A flaw was found in the backported stack unwinder fixes in Red Hat

Enterprise Linux 5. On AMD64 and Intel 64 platforms, a local user could
trigger this flaw and cause a denial of service. (CVE-2007-4574, Important)

  • A flaw was found in the handling of process death signals. This allowed a

local user to send arbitrary signals to the suid-process executed by that
user. A successful exploitation of this flaw depends on the structure of
the suid-program and its signal handling. (CVE-2007-3848, Important)

  • A flaw was found in the Distributed Lock Manager (DLM) in the cluster

manager. This allowed a remote user who is able to connect to the DLM port
to cause a denial of service. (CVE-2007-3380, Important)

  • A flaw was found in the aacraid SCSI driver. This allowed a local user to

make ioctl calls to the driver which should otherwise be restricted to
privileged users. (CVE-2007-4308, Moderate)

  • A flaw was found in the prio_tree handling of the hugetlb support that

allowed a local user to cause a denial of service. This only affected
kernels with hugetlb support. (CVE-2007-4133, Moderate)

  • A flaw was found in the eHCA driver on PowerPC architectures that allowed

a local user to access 60k of physical address space. This address space
could contain sensitive information. (CVE-2007-3850, Moderate)

  • A flaw was found in ptrace support that allowed a local user to cause a

denial of service via a NULL pointer dereference. (CVE-2007-3731, Moderate)

  • A flaw was found in the usblcd driver that allowed a local user to cause

a denial
of service by writing data to the device node. To exploit this issue, write
access to the device node was needed. (CVE-2007-3513, Moderate)

  • A flaw was found in the random number generator implementation that

allowed a local user to cause a denial of service or possibly gain
privileges. If the root user raised the default wakeup threshold over the
size of the output pool, this flaw could be exploited. (CVE-2007-3105, Low)

In addition to the security issues described above, several bug fixes
preventing possible system crashes and data corruption were also included.

Red Hat Enterprise Linux 5 users are advised to upgrade to these packages,
which contain backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 245922 - CVE-2007-3380 A TCP connection to DLM port blocks DLM operations
  • BZ - 247728 - CVE-2007-3513 Locally triggerable memory consumption in usblcd
  • BZ - 248324 - CVE-2007-3731 NULL pointer dereference triggered by ptrace
  • BZ - 248325 - CVE-2007-3105 Bound check ordering issue in random driver
  • BZ - 250972 - CVE-2007-3848 Privilege escalation via PR_SET_PDEATHSIG
  • BZ - 252309 - CVE-2007-4308 Missing ioctl() permission checks in aacraid driver
  • BZ - 253926 - CVE-2007-4133 prio_tree unit kernel panic
  • BZ - 298141 - CVE-2007-4574 EM64T local DoS
  • BZ - 308811 - CVE-2007-3850 kernel LTC31426-4k page mapping support for userspace in 64k kernels

CVEs

  • CVE-2007-3380
  • CVE-2007-3105
  • CVE-2007-4133
  • CVE-2007-3513
  • CVE-2007-3850
  • CVE-2007-4574
  • CVE-2007-3731
  • CVE-2007-4308
  • CVE-2007-3848

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-8.1.15.el5.src.rpm SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967
x86_64
kernel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 26bb876e21c8f11ea0177eca32f15c9d8f15d2f1e6f8ec0fa496c5cfe796cbe7
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: ed258d16e6acde8a7910608fb9ffb5337f8b1c7b608508c62903fe6abcfe51da
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 005b2d10dd2284371c44b23960e2cb3150dbddb8994832dbba6e64f94fe27e69
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 90948d404b73d5dfb81f8aae2d667cc541f3089cc9a182988c68ca20ec76995d
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 0dcfd18febc0e18367f30553a74f80b26ea7de564fc60ee0116397779c41b0e0
ia64
kernel-2.6.18-8.1.15.el5.ia64.rpm SHA-256: 219b11c1e2b86d21af9c976b1fd5c1190e7787fcbbdd5d881197bf8e31667f1d
kernel-devel-2.6.18-8.1.15.el5.ia64.rpm SHA-256: d19005fe7446929589efa8f37efbdc5c9319f8f3f944e167b6da3942147a3414
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.ia64.rpm SHA-256: 926e76ec506f50bc8360fa9a16b50253457b97e1c0fcb8a82ea3488eb4afbf54
kernel-xen-2.6.18-8.1.15.el5.ia64.rpm SHA-256: f664c2f09fb644b83aeea0c12f1c4a6314924ecb4d544dab4cfdb61ed9e5443f
kernel-xen-devel-2.6.18-8.1.15.el5.ia64.rpm SHA-256: d785472ce072c663f36882f98452d155905dc8c49be04e034460bf1856acf682
i386
kernel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 3d3f67e39e0cf3b482aa6f1cd978d8a4e0365f1e68d702c133b2240408fc9ec9
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm SHA-256: fe53cbf04f34eeb47818ee016d52d58709865d95505bc6382e02b1feae98461e
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 5b3ae7c35508c5be6a35b737e8c1f4cf0a3438b91f49a8b24c8165efa642390c
kernel-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: fd24b612105f8b26af8a150d9a301ddc4b13f93cb9a7eb81cc2b77b946ec5eaf
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.i386.rpm SHA-256: 970e1a18c0b395112de9527b7ed5707cebdb08c95fed5b3232ed04278141af8e
kernel-xen-2.6.18-8.1.15.el5.i686.rpm SHA-256: 9c080d2508d68399504a7f1ed73eaf90011a3295fa4a3de52f85464709907228
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 6bdaa52236b2aab7276ab31e6dbb43345b686be294d672f4b128e804c11640d3

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-8.1.15.el5.src.rpm SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967
x86_64
kernel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 26bb876e21c8f11ea0177eca32f15c9d8f15d2f1e6f8ec0fa496c5cfe796cbe7
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: ed258d16e6acde8a7910608fb9ffb5337f8b1c7b608508c62903fe6abcfe51da
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 005b2d10dd2284371c44b23960e2cb3150dbddb8994832dbba6e64f94fe27e69
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 90948d404b73d5dfb81f8aae2d667cc541f3089cc9a182988c68ca20ec76995d
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 0dcfd18febc0e18367f30553a74f80b26ea7de564fc60ee0116397779c41b0e0
i386
kernel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 3d3f67e39e0cf3b482aa6f1cd978d8a4e0365f1e68d702c133b2240408fc9ec9
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm SHA-256: fe53cbf04f34eeb47818ee016d52d58709865d95505bc6382e02b1feae98461e
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 5b3ae7c35508c5be6a35b737e8c1f4cf0a3438b91f49a8b24c8165efa642390c
kernel-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: fd24b612105f8b26af8a150d9a301ddc4b13f93cb9a7eb81cc2b77b946ec5eaf
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.i386.rpm SHA-256: 970e1a18c0b395112de9527b7ed5707cebdb08c95fed5b3232ed04278141af8e
kernel-xen-2.6.18-8.1.15.el5.i686.rpm SHA-256: 9c080d2508d68399504a7f1ed73eaf90011a3295fa4a3de52f85464709907228
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 6bdaa52236b2aab7276ab31e6dbb43345b686be294d672f4b128e804c11640d3

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-8.1.15.el5.src.rpm SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967
x86_64
kernel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 26bb876e21c8f11ea0177eca32f15c9d8f15d2f1e6f8ec0fa496c5cfe796cbe7
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: ed258d16e6acde8a7910608fb9ffb5337f8b1c7b608508c62903fe6abcfe51da
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 005b2d10dd2284371c44b23960e2cb3150dbddb8994832dbba6e64f94fe27e69
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 90948d404b73d5dfb81f8aae2d667cc541f3089cc9a182988c68ca20ec76995d
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 0dcfd18febc0e18367f30553a74f80b26ea7de564fc60ee0116397779c41b0e0
i386
kernel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 3d3f67e39e0cf3b482aa6f1cd978d8a4e0365f1e68d702c133b2240408fc9ec9
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm SHA-256: fe53cbf04f34eeb47818ee016d52d58709865d95505bc6382e02b1feae98461e
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 5b3ae7c35508c5be6a35b737e8c1f4cf0a3438b91f49a8b24c8165efa642390c
kernel-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: fd24b612105f8b26af8a150d9a301ddc4b13f93cb9a7eb81cc2b77b946ec5eaf
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.i386.rpm SHA-256: 970e1a18c0b395112de9527b7ed5707cebdb08c95fed5b3232ed04278141af8e
kernel-xen-2.6.18-8.1.15.el5.i686.rpm SHA-256: 9c080d2508d68399504a7f1ed73eaf90011a3295fa4a3de52f85464709907228
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 6bdaa52236b2aab7276ab31e6dbb43345b686be294d672f4b128e804c11640d3

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-8.1.15.el5.src.rpm SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967
s390x
kernel-2.6.18-8.1.15.el5.s390x.rpm SHA-256: 88da4bb200d192dfeb1ddf53c8c5cd9e5a70c72e387976a3d9230836981d5cde
kernel-devel-2.6.18-8.1.15.el5.s390x.rpm SHA-256: ea201dfa69c8c9330dbe6ee878a03efd12c8b986b9701377cd3d36b6edf6c92c
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.s390x.rpm SHA-256: a48b73ee1ade07f62ecc807eb8116c03a3e7eea99437877a5cde904eb68494a9

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-8.1.15.el5.src.rpm SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967
ppc
kernel-2.6.18-8.1.15.el5.ppc64.rpm SHA-256: f0fad744935fffaea40129dfe0a62b79113760e6c97788a0a4ae28dd1e51d95e
kernel-devel-2.6.18-8.1.15.el5.ppc64.rpm SHA-256: 8efc30b33ad7754607cde0585102bb62de8f31dbc5a85fdcda858cf29943e3c3
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.ppc.rpm SHA-256: da45901a80dea3da78d3206de64af900c4b0e1112e866a075387e5c6f5ec0a98
kernel-headers-2.6.18-8.1.15.el5.ppc64.rpm SHA-256: f623b6db7b5f4ced9a4cf47193f859b7309d4f9c660f0fa28b517093ecb2607f
kernel-kdump-2.6.18-8.1.15.el5.ppc64.rpm SHA-256: 350c3359b0e571d483a00574f4d3168f76171acb7ece56aa08f14d21e65bf8ef
kernel-kdump-devel-2.6.18-8.1.15.el5.ppc64.rpm SHA-256: c686de3d648764f7bb240b2b79c9851c2ec89c6da10e61f3163db1458720554d

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-8.1.15.el5.src.rpm SHA-256: 708c74bf972fde6bcc920f9652cce59039414f990b7a8f9d755c86e5aca2b967
x86_64
kernel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 26bb876e21c8f11ea0177eca32f15c9d8f15d2f1e6f8ec0fa496c5cfe796cbe7
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: ed258d16e6acde8a7910608fb9ffb5337f8b1c7b608508c62903fe6abcfe51da
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 005b2d10dd2284371c44b23960e2cb3150dbddb8994832dbba6e64f94fe27e69
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 90948d404b73d5dfb81f8aae2d667cc541f3089cc9a182988c68ca20ec76995d
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm SHA-256: 0dcfd18febc0e18367f30553a74f80b26ea7de564fc60ee0116397779c41b0e0
i386
kernel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 3d3f67e39e0cf3b482aa6f1cd978d8a4e0365f1e68d702c133b2240408fc9ec9
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm SHA-256: fe53cbf04f34eeb47818ee016d52d58709865d95505bc6382e02b1feae98461e
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 5b3ae7c35508c5be6a35b737e8c1f4cf0a3438b91f49a8b24c8165efa642390c
kernel-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: fd24b612105f8b26af8a150d9a301ddc4b13f93cb9a7eb81cc2b77b946ec5eaf
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm SHA-256: f1ea44af106130d8cd1706cd6abcf277fa3a24ef5f08554257660963958aa35d
kernel-headers-2.6.18-8.1.15.el5.i386.rpm SHA-256: 970e1a18c0b395112de9527b7ed5707cebdb08c95fed5b3232ed04278141af8e
kernel-xen-2.6.18-8.1.15.el5.i686.rpm SHA-256: 9c080d2508d68399504a7f1ed73eaf90011a3295fa4a3de52f85464709907228
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm SHA-256: 6bdaa52236b2aab7276ab31e6dbb43345b686be294d672f4b128e804c11640d3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility