drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme im Kernel
Name: |
Mehrere Probleme im Kernel |
|
ID: |
RHSA-2007:0673-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Mi, 8. August 2007, 21:09 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592 |
|
Applikationen: |
Linux |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Important: kernel security update Advisory ID: RHSA-2007:0673-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0673.html Issue date: 2007-08-08 Updated on: 2007-08-08 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-6054 CVE-2007-1217 CVE-2007-1592 CVE-2007-1353 - ---------------------------------------------------------------------
1. Summary:
Updated kernel packages that fix a number of security issues are now available for Red Hat Enterprise Linux 2.1 (64-bit architectures).
This security advisory has been rated as having important security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - ia64 Red Hat Linux Advanced Workstation 2.1 - ia64
3. Problem description:
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described below:
* a flaw in IPV6 flow label handling that allowed a local user to cause a denial of service (crash). (CVE-2007-1592, Important)
* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a denial of service or potential privilege escalation. (CVE-2007-1217, Moderate)
* a flaw in the Bluetooth subsystem that allowed a local user to trigger an information leak. (CVE-2007-1353, Low)
* a flaw in the supported filesystems that allowed a local privileged user to cause a denial of service. (CVE-2006-6054, Low)
Red Hat would like to thank Ilja van Sprundel for reporting an issue fixed in this erratum.
All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels to these updated packages, which contain backported fixes to correct these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
217024 - CVE-2006-6054 ext2_check_page denial of service 231071 - CVE-2007-1217 Overflow in CAPI subsystem 233484 - CVE-2007-1592 IPv6 oops triggerable by any user 234296 - CVE-2007-1353 Bluetooth setsockopt() information leaks
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :
SRPMS: kernel-2.4.18-e.65.src.rpm 92ccbe1005a2ad74fffc3e944f5d19c2 kernel-2.4.18-e.65.src.rpm
ia64: 8e5d03bf4e79cf7b0cfd6911d3667160 kernel-2.4.18-e.65.ia64.rpm d82cbe75c5f32bff36a65d5a5d52a0ee kernel-doc-2.4.18-e.65.ia64.rpm 6093b3a6bae88873c8f0f13755d5eb47 kernel-smp-2.4.18-e.65.ia64.rpm 72346a0b751537cc181f226caed806bb kernel-source-2.4.18-e.65.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS: kernel-2.4.18-e.65.src.rpm 92ccbe1005a2ad74fffc3e944f5d19c2 kernel-2.4.18-e.65.src.rpm
ia64: 8e5d03bf4e79cf7b0cfd6911d3667160 kernel-2.4.18-e.65.ia64.rpm d82cbe75c5f32bff36a65d5a5d52a0ee kernel-doc-2.4.18-e.65.ia64.rpm 6093b3a6bae88873c8f0f13755d5eb47 kernel-smp-2.4.18-e.65.ia64.rpm 72346a0b751537cc181f226caed806bb kernel-source-2.4.18-e.65.ia64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1217 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1353 http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFGuhOzXlSAg2UNWIIRAvGVAJ92pOmN8QINKsl5+y5+gk8oe2nAdgCeLwkb hkJ2NLK0R9jbUxjB5JSLtUg= =S9ng -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|
|
|
|