-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Important: Updated kernel packages for Red Hat Enterprise Linux 3 Update 9 Advisory ID: RHSA-2007:0436-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0436.html Issue date: 2007-06-07 Updated on: 2007-06-11 Product: Red Hat Enterprise Linux Keywords: taroon kernel update Obsoletes: RHSA-2006:0710 CVE Names: CVE-2006-5823 CVE-2006-6054 CVE-2007-1592 - ---------------------------------------------------------------------
1. Summary:
Updated kernel packages are now available as part of ongoing support and maintenance of Red Hat Enterprise Linux version 3. This is the ninth regular update.
This security advisory has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
The Linux kernel handles the basic functions of the operating system.
This is the ninth regular kernel update to Red Hat Enterprise Linux 3.
There were no new features introduced by this update. The only changes that have been included address critical customer needs or security issues (elaborated below).
Key areas affected by fixes in this update include the networking subsystem, dcache handling, the ext2 and ext3 file systems, the USB subsystem, ACPI handling, and the audit subsystem. There were also several isolated fixes in the tg3, e1000, megaraid_sas, and aacraid device drivers.
The following security bugs were fixed in this update:
* a flaw in the cramfs file system that allowed invalid compressed data to cause memory corruption (CVE-2006-5823, low)
* a flaw in the ext2 file system that allowed an invalid inode size to cause a denial of service (system hang) (CVE-2006-6054, low)
* a flaw in IPV6 flow label handling that allowed a local user to cause a denial of service (crash) (CVE-2007-1592, important)
Note: The kernel-unsupported package contains various drivers and modules that are unsupported and therefore might contain security problems that have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.
4. Solution:
Before applying this update, make sure that all previously released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
128616 - acl permissions over nfs 137374 - Need fix for: [NETFILTER]: Fix checksum bug for multicast/broadcast packets on postrouting hook. 144794 - tg3 driver on BCM5703X won't load. Says tg3: Could not obtain valid ethernet address, aborting. 164855 - u5 patch that turned on Dprintk's in arch/x86_64/kernel/smpboot.c 171007 - powermate module does not recognize Griffin Powermate device 173350 - jbd I/O errors after ext3 orphan processing on readonly device 177300 - hugetlb_get_unmapped_area may overflow in X86_64 compat mode 189052 - Kernel panic on shutdown or poweroff on SMP 192796 - cut/paste bug in kscand 199542 - Data corruption after IO error on swap (RHEL3) 209154 - High speed USB HID devices not working in RHEL3 216960 - CVE-2006-5823 zlib_inflate memory corruption 217022 - CVE-2006-6054 ext2_check_page denial of service 217930 - [RHEL3] Netdump for 8139cp driver 224600 - running 32-bit executables on x86_64/ia64/s390x causes negative "vm_committed_space" value 226895 - Kernel oops when loading ipmi_si module 231912 - Laus doesn't audit detach event 232221 - Laus dev.audit.attach-all doesn't attach to init 232336 - Enable use of PAL_HALT_LIGHT for idle loop as non-default option 233262 - ipv6 OOPS triggerable by any user
6. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm c79722a872a08eb82398a58749f270cf kernel-2.4.21-50.EL.src.rpm
i386: 7cfbe7d0110e0c1381b73177104119ec kernel-2.4.21-50.EL.athlon.rpm 7203347beb0c4659f63bebb1e487b009 kernel-2.4.21-50.EL.i686.rpm 5c994b0987b31010cb0a825e022aee84 kernel-BOOT-2.4.21-50.EL.i386.rpm fae1d5c55370b3247bdaeb8c554d0ce5 kernel-debuginfo-2.4.21-50.EL.athlon.rpm aba8af6dc7681e0ec6296478caa5afbe kernel-debuginfo-2.4.21-50.EL.i386.rpm dfeb338d473d9f4ea25e4c5f009f93a4 kernel-debuginfo-2.4.21-50.EL.i686.rpm 277167db623567d2772f53c9442aab79 kernel-doc-2.4.21-50.EL.i386.rpm fe20ef598810be1ee1eb5a7b34994e63 kernel-hugemem-2.4.21-50.EL.i686.rpm 4c19a2a12f011afbcf8ee09dfe19d9b5 kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm 1ceae1fcc0a9d53ee80ca959f077d1bf kernel-smp-2.4.21-50.EL.athlon.rpm 71e88c7296ff3dacdccfdac4e3071df2 kernel-smp-2.4.21-50.EL.i686.rpm 59b44b72919e9aa6ca57bd5eaafd686b kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm 57239b02735863035421e6b4f9152790 kernel-smp-unsupported-2.4.21-50.EL.i686.rpm 2e0d8c5c9d320ba251483de4ebb30d68 kernel-source-2.4.21-50.EL.i386.rpm 1543ab5008587ee48e77f6ff55e3b69e kernel-unsupported-2.4.21-50.EL.athlon.rpm f6b4df392ef5cdc8760377f802d8d0d8 kernel-unsupported-2.4.21-50.EL.i686.rpm
ia64: 4ecbfd266438b2f64846b583608886f3 kernel-2.4.21-50.EL.ia64.rpm 26e27e76ff1b0034115ea29ed665f5d3 kernel-debuginfo-2.4.21-50.EL.ia64.rpm 29ad4e24dbfdfdc3898ed12a960c7fac kernel-doc-2.4.21-50.EL.ia64.rpm bc1684ae959c30fa809b0ed9304b0aad kernel-source-2.4.21-50.EL.ia64.rpm cde442e6c7fba9087ac7c92ee40748e3 kernel-unsupported-2.4.21-50.EL.ia64.rpm
ppc: 2f7744a0ce4d5828b24dfb11f3582f62 kernel-2.4.21-50.EL.ppc64iseries.rpm 0deb3e0d8635dd62587ab8cc5dd15b4f kernel-2.4.21-50.EL.ppc64pseries.rpm e5fcea12133e5a85b23ae7cf828293c1 kernel-debuginfo-2.4.21-50.EL.ppc64.rpm c7ecd608935b1b1207f35d1b8b9cb034 kernel-debuginfo-2.4.21-50.EL.ppc64iseries.rpm 7217c44962ebcd635ac4db43cd85ece5 kernel-debuginfo-2.4.21-50.EL.ppc64pseries.rpm b72e3d9dfbcdc60ef35784860f1aefe7 kernel-doc-2.4.21-50.EL.ppc64.rpm e066a029b086eca8621082f6113aca8b kernel-source-2.4.21-50.EL.ppc64.rpm ade7659061ea001fc8dccf356350584e kernel-unsupported-2.4.21-50.EL.ppc64iseries.rpm 908c4d68a46a7731a639efde75bfe8be kernel-unsupported-2.4.21-50.EL.ppc64pseries.rpm
s390: 7cc098163ea8521e71fa5cb9599e430a kernel-2.4.21-50.EL.s390.rpm f471fbb4022ea086cb3dd9715be0904e kernel-debuginfo-2.4.21-50.EL.s390.rpm 8d4aede1a46ed6da1e6162cc67cb13ce kernel-doc-2.4.21-50.EL.s390.rpm f57c2055269270541629220914a7bfd1 kernel-source-2.4.21-50.EL.s390.rpm 9bd2949e1681035d8d9ae7667a09a43b kernel-unsupported-2.4.21-50.EL.s390.rpm
s390x: 76811eb47f700e3abb5058b271db6098 kernel-2.4.21-50.EL.s390x.rpm a4767cbfb6887b6d538a9380aecd6478 kernel-debuginfo-2.4.21-50.EL.s390x.rpm 349a97363d9b77d2397f59bf1719cc80 kernel-doc-2.4.21-50.EL.s390x.rpm cf755ee59b7fa3e5cc50267eae6efb3d kernel-source-2.4.21-50.EL.s390x.rpm 3b4a567c303cd51b61e9f77dc2eea76a kernel-unsupported-2.4.21-50.EL.s390x.rpm
x86_64: da285ae8b8a1d4dc3fe0411861488119 kernel-2.4.21-50.EL.ia32e.rpm 5f7e05a4ca91441fdd52d79da1886dfe kernel-2.4.21-50.EL.x86_64.rpm 9e2be2ea882e105ea3926d41bf1442be kernel-debuginfo-2.4.21-50.EL.ia32e.rpm a7b578a947b841e1334135c97fa0d390 kernel-debuginfo-2.4.21-50.EL.x86_64.rpm fe43cb360a3130855db0404bda411cd1 kernel-doc-2.4.21-50.EL.x86_64.rpm 6ca6c1e84c6f11ac9dc40c27d40b9473 kernel-smp-2.4.21-50.EL.x86_64.rpm 9d3594ab2e34a316668685dbe2ed4511 kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm 5e2951403ef3036cd82b70fc91e86100 kernel-source-2.4.21-50.EL.x86_64.rpm 372d28ebf73a915bb4fdf8b4433910ac kernel-unsupported-2.4.21-50.EL.ia32e.rpm 90fb18a58a605af3337fcaf7e69b8010 kernel-unsupported-2.4.21-50.EL.x86_64.rpm
Red Hat Desktop version 3:
SRPMS: kernel-2.4.21-50.EL.src.rpm c79722a872a08eb82398a58749f270cf kernel-2.4.21-50.EL.src.rpm
i386: 7cfbe7d0110e0c1381b73177104119ec kernel-2.4.21-50.EL.athlon.rpm 7203347beb0c4659f63bebb1e487b009 kernel-2.4.21-50.EL.i686.rpm 5c994b0987b31010cb0a825e022aee84 kernel-BOOT-2.4.21-50.EL.i386.rpm fae1d5c55370b3247bdaeb8c554d0ce5 kernel-debuginfo-2.4.21-50.EL.athlon.rpm aba8af6dc7681e0ec6296478caa5afbe kernel-debuginfo-2.4.21-50.EL.i386.rpm dfeb338d473d9f4ea25e4c5f009f93a4 kernel-debuginfo-2.4.21-50.EL.i686.rpm 277167db623567d2772f53c9442aab79 kernel-doc-2.4.21-50.EL.i386.rpm fe20ef598810be1ee1eb5a7b34994e63 kernel-hugemem-2.4.21-50.EL.i686.rpm 4c19a2a12f011afbcf8ee09dfe19d9b5 kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm 1ceae1fcc0a9d53ee80ca959f077d1bf kernel-smp-2.4.21-50.EL.athlon.rpm 71e88c7296ff3dacdccfdac4e3071df2 kernel-smp-2.4.21-50.EL.i686.rpm 59b44b72919e9aa6ca57bd5eaafd686b kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm 57239b02735863035421e6b4f9152790 kernel-smp-unsupported-2.4.21-50.EL.i686.rpm 2e0d8c5c9d320ba251483de4ebb30d68 kernel-source-2.4.21-50.EL.i386.rpm 1543ab5008587ee48e77f6ff55e3b69e kernel-unsupported-2.4.21-50.EL.athlon.rpm f6b4df392ef5cdc8760377f802d8d0d8 kernel-unsupported-2.4.21-50.EL.i686.rpm
x86_64: da285ae8b8a1d4dc3fe0411861488119 kernel-2.4.21-50.EL.ia32e.rpm 5f7e05a4ca91441fdd52d79da1886dfe kernel-2.4.21-50.EL.x86_64.rpm 9e2be2ea882e105ea3926d41bf1442be kernel-debuginfo-2.4.21-50.EL.ia32e.rpm a7b578a947b841e1334135c97fa0d390 kernel-debuginfo-2.4.21-50.EL.x86_64.rpm fe43cb360a3130855db0404bda411cd1 kernel-doc-2.4.21-50.EL.x86_64.rpm 6ca6c1e84c6f11ac9dc40c27d40b9473 kernel-smp-2.4.21-50.EL.x86_64.rpm 9d3594ab2e34a316668685dbe2ed4511 kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm 5e2951403ef3036cd82b70fc91e86100 kernel-source-2.4.21-50.EL.x86_64.rpm 372d28ebf73a915bb4fdf8b4433910ac kernel-unsupported-2.4.21-50.EL.ia32e.rpm 90fb18a58a605af3337fcaf7e69b8010 kernel-unsupported-2.4.21-50.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm c79722a872a08eb82398a58749f270cf kernel-2.4.21-50.EL.src.rpm
i386: 7cfbe7d0110e0c1381b73177104119ec kernel-2.4.21-50.EL.athlon.rpm 7203347beb0c4659f63bebb1e487b009 kernel-2.4.21-50.EL.i686.rpm 5c994b0987b31010cb0a825e022aee84 kernel-BOOT-2.4.21-50.EL.i386.rpm fae1d5c55370b3247bdaeb8c554d0ce5 kernel-debuginfo-2.4.21-50.EL.athlon.rpm aba8af6dc7681e0ec6296478caa5afbe kernel-debuginfo-2.4.21-50.EL.i386.rpm dfeb338d473d9f4ea25e4c5f009f93a4 kernel-debuginfo-2.4.21-50.EL.i686.rpm 277167db623567d2772f53c9442aab79 kernel-doc-2.4.21-50.EL.i386.rpm fe20ef598810be1ee1eb5a7b34994e63 kernel-hugemem-2.4.21-50.EL.i686.rpm 4c19a2a12f011afbcf8ee09dfe19d9b5 kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm 1ceae1fcc0a9d53ee80ca959f077d1bf kernel-smp-2.4.21-50.EL.athlon.rpm 71e88c7296ff3dacdccfdac4e3071df2 kernel-smp-2.4.21-50.EL.i686.rpm 59b44b72919e9aa6ca57bd5eaafd686b kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm 57239b02735863035421e6b4f9152790 kernel-smp-unsupported-2.4.21-50.EL.i686.rpm 2e0d8c5c9d320ba251483de4ebb30d68 kernel-source-2.4.21-50.EL.i386.rpm 1543ab5008587ee48e77f6ff55e3b69e kernel-unsupported-2.4.21-50.EL.athlon.rpm f6b4df392ef5cdc8760377f802d8d0d8 kernel-unsupported-2.4.21-50.EL.i686.rpm
ia64: 4ecbfd266438b2f64846b583608886f3 kernel-2.4.21-50.EL.ia64.rpm 26e27e76ff1b0034115ea29ed665f5d3 kernel-debuginfo-2.4.21-50.EL.ia64.rpm 29ad4e24dbfdfdc3898ed12a960c7fac kernel-doc-2.4.21-50.EL.ia64.rpm bc1684ae959c30fa809b0ed9304b0aad kernel-source-2.4.21-50.EL.ia64.rpm cde442e6c7fba9087ac7c92ee40748e3 kernel-unsupported-2.4.21-50.EL.ia64.rpm
x86_64: da285ae8b8a1d4dc3fe0411861488119 kernel-2.4.21-50.EL.ia32e.rpm 5f7e05a4ca91441fdd52d79da1886dfe kernel-2.4.21-50.EL.x86_64.rpm 9e2be2ea882e105ea3926d41bf1442be kernel-debuginfo-2.4.21-50.EL.ia32e.rpm a7b578a947b841e1334135c97fa0d390 kernel-debuginfo-2.4.21-50.EL.x86_64.rpm fe43cb360a3130855db0404bda411cd1 kernel-doc-2.4.21-50.EL.x86_64.rpm 6ca6c1e84c6f11ac9dc40c27d40b9473 kernel-smp-2.4.21-50.EL.x86_64.rpm 9d3594ab2e34a316668685dbe2ed4511 kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm 5e2951403ef3036cd82b70fc91e86100 kernel-source-2.4.21-50.EL.x86_64.rpm 372d28ebf73a915bb4fdf8b4433910ac kernel-unsupported-2.4.21-50.EL.ia32e.rpm 90fb18a58a605af3337fcaf7e69b8010 kernel-unsupported-2.4.21-50.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm c79722a872a08eb82398a58749f270cf kernel-2.4.21-50.EL.src.rpm
i386: 7cfbe7d0110e0c1381b73177104119ec kernel-2.4.21-50.EL.athlon.rpm 7203347beb0c4659f63bebb1e487b009 kernel-2.4.21-50.EL.i686.rpm 5c994b0987b31010cb0a825e022aee84 kernel-BOOT-2.4.21-50.EL.i386.rpm fae1d5c55370b3247bdaeb8c554d0ce5 kernel-debuginfo-2.4.21-50.EL.athlon.rpm aba8af6dc7681e0ec6296478caa5afbe kernel-debuginfo-2.4.21-50.EL.i386.rpm dfeb338d473d9f4ea25e4c5f009f93a4 kernel-debuginfo-2.4.21-50.EL.i686.rpm 277167db623567d2772f53c9442aab79 kernel-doc-2.4.21-50.EL.i386.rpm fe20ef598810be1ee1eb5a7b34994e63 kernel-hugemem-2.4.21-50.EL.i686.rpm 4c19a2a12f011afbcf8ee09dfe19d9b5 kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm 1ceae1fcc0a9d53ee80ca959f077d1bf kernel-smp-2.4.21-50.EL.athlon.rpm 71e88c7296ff3dacdccfdac4e3071df2 kernel-smp-2.4.21-50.EL.i686.rpm 59b44b72919e9aa6ca57bd5eaafd686b kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm 57239b02735863035421e6b4f9152790 kernel-smp-unsupported-2.4.21-50.EL.i686.rpm 2e0d8c5c9d320ba251483de4ebb30d68 kernel-source-2.4.21-50.EL.i386.rpm 1543ab5008587ee48e77f6ff55e3b69e kernel-unsupported-2.4.21-50.EL.athlon.rpm f6b4df392ef5cdc8760377f802d8d0d8 kernel-unsupported-2.4.21-50.EL.i686.rpm
ia64: 4ecbfd266438b2f64846b583608886f3 kernel-2.4.21-50.EL.ia64.rpm 26e27e76ff1b0034115ea29ed665f5d3 kernel-debuginfo-2.4.21-50.EL.ia64.rpm 29ad4e24dbfdfdc3898ed12a960c7fac kernel-doc-2.4.21-50.EL.ia64.rpm bc1684ae959c30fa809b0ed9304b0aad kernel-source-2.4.21-50.EL.ia64.rpm cde442e6c7fba9087ac7c92ee40748e3 kernel-unsupported-2.4.21-50.EL.ia64.rpm
x86_64: da285ae8b8a1d4dc3fe0411861488119 kernel-2.4.21-50.EL.ia32e.rpm 5f7e05a4ca91441fdd52d79da1886dfe kernel-2.4.21-50.EL.x86_64.rpm 9e2be2ea882e105ea3926d41bf1442be kernel-debuginfo-2.4.21-50.EL.ia32e.rpm a7b578a947b841e1334135c97fa0d390 kernel-debuginfo-2.4.21-50.EL.x86_64.rpm fe43cb360a3130855db0404bda411cd1 kernel-doc-2.4.21-50.EL.x86_64.rpm 6ca6c1e84c6f11ac9dc40c27d40b9473 kernel-smp-2.4.21-50.EL.x86_64.rpm 9d3594ab2e34a316668685dbe2ed4511 kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm 5e2951403ef3036cd82b70fc91e86100 kernel-source-2.4.21-50.EL.x86_64.rpm 372d28ebf73a915bb4fdf8b4433910ac kernel-unsupported-2.4.21-50.EL.ia32e.rpm 90fb18a58a605af3337fcaf7e69b8010 kernel-unsupported-2.4.21-50.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5823 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592 http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFGbYwhXlSAg2UNWIIRAu21AJ4u7MYtxy5/U0mOX2xTWtLf2sy+rACeN9zM +sZgNmsh32K6L0l5/v0eeOI= =Omh9 -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|