[RHSA-2007:0436-01] Important: Updated kernel packages for Red Hat Enterprise Linux 3 Update 9

bugzilla at redhat.com bugzilla at redhat.com
Mon Jun 11 17:53:39 UTC 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: Updated kernel packages for Red Hat Enterprise Linux 3 Update 9
Advisory ID:       RHSA-2007:0436-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0436.html
Issue date:        2007-06-07
Updated on:        2007-06-11
Product:           Red Hat Enterprise Linux
Keywords:          taroon kernel update
Obsoletes:         RHSA-2006:0710
CVE Names:         CVE-2006-5823 CVE-2006-6054 CVE-2007-1592 
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 3.  This is the ninth
regular update.

This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the ninth regular kernel update to Red Hat Enterprise Linux 3.

There were no new features introduced by this update.  The only changes
that have been included address critical customer needs or security
issues (elaborated below).

Key areas affected by fixes in this update include the networking
subsystem, dcache handling, the ext2 and ext3 file systems, the USB
subsystem, ACPI handling, and the audit subsystem.  There were also
several isolated fixes in the tg3, e1000, megaraid_sas, and aacraid
device drivers.

The following security bugs were fixed in this update:

  * a flaw in the cramfs file system that allowed invalid compressed
     data to cause memory corruption (CVE-2006-5823, low)

  * a flaw in the ext2 file system that allowed an invalid inode size
     to cause a denial of service (system hang)  (CVE-2006-6054, low)

  * a flaw in IPV6 flow label handling that allowed a local user to
     cause a denial of service (crash)  (CVE-2007-1592, important)

Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

128616 - acl permissions over nfs
137374 - Need fix for: [NETFILTER]: Fix checksum bug for multicast/broadcast packets on postrouting hook.
144794 - tg3 driver on BCM5703X won't load. Says tg3: Could not obtain valid ethernet address, aborting.
164855 - u5 patch that turned on Dprintk's in arch/x86_64/kernel/smpboot.c
171007 - powermate module does not recognize Griffin Powermate device
173350 - jbd I/O errors after ext3 orphan processing on readonly device
177300 - hugetlb_get_unmapped_area may overflow in X86_64 compat mode
189052 - Kernel panic on shutdown or poweroff on SMP
192796 - cut/paste bug in kscand
199542 - Data corruption after IO error on swap (RHEL3)
209154 - High speed USB HID devices not working in RHEL3
216960 - CVE-2006-5823 zlib_inflate memory corruption
217022 - CVE-2006-6054 ext2_check_page denial of service
217930 - [RHEL3] Netdump for 8139cp driver
224600 - running 32-bit executables on x86_64/ia64/s390x causes negative "vm_committed_space" value
226895 - Kernel oops when loading ipmi_si module
231912 - Laus doesn't audit detach event
232221 - Laus dev.audit.attach-all doesn't attach to init
232336 - Enable use of PAL_HALT_LIGHT for idle loop as non-default option
233262 - ipv6 OOPS triggerable by any user

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm
c79722a872a08eb82398a58749f270cf  kernel-2.4.21-50.EL.src.rpm

i386:
7cfbe7d0110e0c1381b73177104119ec  kernel-2.4.21-50.EL.athlon.rpm
7203347beb0c4659f63bebb1e487b009  kernel-2.4.21-50.EL.i686.rpm
5c994b0987b31010cb0a825e022aee84  kernel-BOOT-2.4.21-50.EL.i386.rpm
fae1d5c55370b3247bdaeb8c554d0ce5  kernel-debuginfo-2.4.21-50.EL.athlon.rpm
aba8af6dc7681e0ec6296478caa5afbe  kernel-debuginfo-2.4.21-50.EL.i386.rpm
dfeb338d473d9f4ea25e4c5f009f93a4  kernel-debuginfo-2.4.21-50.EL.i686.rpm
277167db623567d2772f53c9442aab79  kernel-doc-2.4.21-50.EL.i386.rpm
fe20ef598810be1ee1eb5a7b34994e63  kernel-hugemem-2.4.21-50.EL.i686.rpm
4c19a2a12f011afbcf8ee09dfe19d9b5  kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm
1ceae1fcc0a9d53ee80ca959f077d1bf  kernel-smp-2.4.21-50.EL.athlon.rpm
71e88c7296ff3dacdccfdac4e3071df2  kernel-smp-2.4.21-50.EL.i686.rpm
59b44b72919e9aa6ca57bd5eaafd686b  kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm
57239b02735863035421e6b4f9152790  kernel-smp-unsupported-2.4.21-50.EL.i686.rpm
2e0d8c5c9d320ba251483de4ebb30d68  kernel-source-2.4.21-50.EL.i386.rpm
1543ab5008587ee48e77f6ff55e3b69e  kernel-unsupported-2.4.21-50.EL.athlon.rpm
f6b4df392ef5cdc8760377f802d8d0d8  kernel-unsupported-2.4.21-50.EL.i686.rpm

ia64:
4ecbfd266438b2f64846b583608886f3  kernel-2.4.21-50.EL.ia64.rpm
26e27e76ff1b0034115ea29ed665f5d3  kernel-debuginfo-2.4.21-50.EL.ia64.rpm
29ad4e24dbfdfdc3898ed12a960c7fac  kernel-doc-2.4.21-50.EL.ia64.rpm
bc1684ae959c30fa809b0ed9304b0aad  kernel-source-2.4.21-50.EL.ia64.rpm
cde442e6c7fba9087ac7c92ee40748e3  kernel-unsupported-2.4.21-50.EL.ia64.rpm

ppc:
2f7744a0ce4d5828b24dfb11f3582f62  kernel-2.4.21-50.EL.ppc64iseries.rpm
0deb3e0d8635dd62587ab8cc5dd15b4f  kernel-2.4.21-50.EL.ppc64pseries.rpm
e5fcea12133e5a85b23ae7cf828293c1  kernel-debuginfo-2.4.21-50.EL.ppc64.rpm
c7ecd608935b1b1207f35d1b8b9cb034  kernel-debuginfo-2.4.21-50.EL.ppc64iseries.rpm
7217c44962ebcd635ac4db43cd85ece5  kernel-debuginfo-2.4.21-50.EL.ppc64pseries.rpm
b72e3d9dfbcdc60ef35784860f1aefe7  kernel-doc-2.4.21-50.EL.ppc64.rpm
e066a029b086eca8621082f6113aca8b  kernel-source-2.4.21-50.EL.ppc64.rpm
ade7659061ea001fc8dccf356350584e  kernel-unsupported-2.4.21-50.EL.ppc64iseries.rpm
908c4d68a46a7731a639efde75bfe8be  kernel-unsupported-2.4.21-50.EL.ppc64pseries.rpm

s390:
7cc098163ea8521e71fa5cb9599e430a  kernel-2.4.21-50.EL.s390.rpm
f471fbb4022ea086cb3dd9715be0904e  kernel-debuginfo-2.4.21-50.EL.s390.rpm
8d4aede1a46ed6da1e6162cc67cb13ce  kernel-doc-2.4.21-50.EL.s390.rpm
f57c2055269270541629220914a7bfd1  kernel-source-2.4.21-50.EL.s390.rpm
9bd2949e1681035d8d9ae7667a09a43b  kernel-unsupported-2.4.21-50.EL.s390.rpm

s390x:
76811eb47f700e3abb5058b271db6098  kernel-2.4.21-50.EL.s390x.rpm
a4767cbfb6887b6d538a9380aecd6478  kernel-debuginfo-2.4.21-50.EL.s390x.rpm
349a97363d9b77d2397f59bf1719cc80  kernel-doc-2.4.21-50.EL.s390x.rpm
cf755ee59b7fa3e5cc50267eae6efb3d  kernel-source-2.4.21-50.EL.s390x.rpm
3b4a567c303cd51b61e9f77dc2eea76a  kernel-unsupported-2.4.21-50.EL.s390x.rpm

x86_64:
da285ae8b8a1d4dc3fe0411861488119  kernel-2.4.21-50.EL.ia32e.rpm
5f7e05a4ca91441fdd52d79da1886dfe  kernel-2.4.21-50.EL.x86_64.rpm
9e2be2ea882e105ea3926d41bf1442be  kernel-debuginfo-2.4.21-50.EL.ia32e.rpm
a7b578a947b841e1334135c97fa0d390  kernel-debuginfo-2.4.21-50.EL.x86_64.rpm
fe43cb360a3130855db0404bda411cd1  kernel-doc-2.4.21-50.EL.x86_64.rpm
6ca6c1e84c6f11ac9dc40c27d40b9473  kernel-smp-2.4.21-50.EL.x86_64.rpm
9d3594ab2e34a316668685dbe2ed4511  kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm
5e2951403ef3036cd82b70fc91e86100  kernel-source-2.4.21-50.EL.x86_64.rpm
372d28ebf73a915bb4fdf8b4433910ac  kernel-unsupported-2.4.21-50.EL.ia32e.rpm
90fb18a58a605af3337fcaf7e69b8010  kernel-unsupported-2.4.21-50.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm
c79722a872a08eb82398a58749f270cf  kernel-2.4.21-50.EL.src.rpm

i386:
7cfbe7d0110e0c1381b73177104119ec  kernel-2.4.21-50.EL.athlon.rpm
7203347beb0c4659f63bebb1e487b009  kernel-2.4.21-50.EL.i686.rpm
5c994b0987b31010cb0a825e022aee84  kernel-BOOT-2.4.21-50.EL.i386.rpm
fae1d5c55370b3247bdaeb8c554d0ce5  kernel-debuginfo-2.4.21-50.EL.athlon.rpm
aba8af6dc7681e0ec6296478caa5afbe  kernel-debuginfo-2.4.21-50.EL.i386.rpm
dfeb338d473d9f4ea25e4c5f009f93a4  kernel-debuginfo-2.4.21-50.EL.i686.rpm
277167db623567d2772f53c9442aab79  kernel-doc-2.4.21-50.EL.i386.rpm
fe20ef598810be1ee1eb5a7b34994e63  kernel-hugemem-2.4.21-50.EL.i686.rpm
4c19a2a12f011afbcf8ee09dfe19d9b5  kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm
1ceae1fcc0a9d53ee80ca959f077d1bf  kernel-smp-2.4.21-50.EL.athlon.rpm
71e88c7296ff3dacdccfdac4e3071df2  kernel-smp-2.4.21-50.EL.i686.rpm
59b44b72919e9aa6ca57bd5eaafd686b  kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm
57239b02735863035421e6b4f9152790  kernel-smp-unsupported-2.4.21-50.EL.i686.rpm
2e0d8c5c9d320ba251483de4ebb30d68  kernel-source-2.4.21-50.EL.i386.rpm
1543ab5008587ee48e77f6ff55e3b69e  kernel-unsupported-2.4.21-50.EL.athlon.rpm
f6b4df392ef5cdc8760377f802d8d0d8  kernel-unsupported-2.4.21-50.EL.i686.rpm

x86_64:
da285ae8b8a1d4dc3fe0411861488119  kernel-2.4.21-50.EL.ia32e.rpm
5f7e05a4ca91441fdd52d79da1886dfe  kernel-2.4.21-50.EL.x86_64.rpm
9e2be2ea882e105ea3926d41bf1442be  kernel-debuginfo-2.4.21-50.EL.ia32e.rpm
a7b578a947b841e1334135c97fa0d390  kernel-debuginfo-2.4.21-50.EL.x86_64.rpm
fe43cb360a3130855db0404bda411cd1  kernel-doc-2.4.21-50.EL.x86_64.rpm
6ca6c1e84c6f11ac9dc40c27d40b9473  kernel-smp-2.4.21-50.EL.x86_64.rpm
9d3594ab2e34a316668685dbe2ed4511  kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm
5e2951403ef3036cd82b70fc91e86100  kernel-source-2.4.21-50.EL.x86_64.rpm
372d28ebf73a915bb4fdf8b4433910ac  kernel-unsupported-2.4.21-50.EL.ia32e.rpm
90fb18a58a605af3337fcaf7e69b8010  kernel-unsupported-2.4.21-50.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm
c79722a872a08eb82398a58749f270cf  kernel-2.4.21-50.EL.src.rpm

i386:
7cfbe7d0110e0c1381b73177104119ec  kernel-2.4.21-50.EL.athlon.rpm
7203347beb0c4659f63bebb1e487b009  kernel-2.4.21-50.EL.i686.rpm
5c994b0987b31010cb0a825e022aee84  kernel-BOOT-2.4.21-50.EL.i386.rpm
fae1d5c55370b3247bdaeb8c554d0ce5  kernel-debuginfo-2.4.21-50.EL.athlon.rpm
aba8af6dc7681e0ec6296478caa5afbe  kernel-debuginfo-2.4.21-50.EL.i386.rpm
dfeb338d473d9f4ea25e4c5f009f93a4  kernel-debuginfo-2.4.21-50.EL.i686.rpm
277167db623567d2772f53c9442aab79  kernel-doc-2.4.21-50.EL.i386.rpm
fe20ef598810be1ee1eb5a7b34994e63  kernel-hugemem-2.4.21-50.EL.i686.rpm
4c19a2a12f011afbcf8ee09dfe19d9b5  kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm
1ceae1fcc0a9d53ee80ca959f077d1bf  kernel-smp-2.4.21-50.EL.athlon.rpm
71e88c7296ff3dacdccfdac4e3071df2  kernel-smp-2.4.21-50.EL.i686.rpm
59b44b72919e9aa6ca57bd5eaafd686b  kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm
57239b02735863035421e6b4f9152790  kernel-smp-unsupported-2.4.21-50.EL.i686.rpm
2e0d8c5c9d320ba251483de4ebb30d68  kernel-source-2.4.21-50.EL.i386.rpm
1543ab5008587ee48e77f6ff55e3b69e  kernel-unsupported-2.4.21-50.EL.athlon.rpm
f6b4df392ef5cdc8760377f802d8d0d8  kernel-unsupported-2.4.21-50.EL.i686.rpm

ia64:
4ecbfd266438b2f64846b583608886f3  kernel-2.4.21-50.EL.ia64.rpm
26e27e76ff1b0034115ea29ed665f5d3  kernel-debuginfo-2.4.21-50.EL.ia64.rpm
29ad4e24dbfdfdc3898ed12a960c7fac  kernel-doc-2.4.21-50.EL.ia64.rpm
bc1684ae959c30fa809b0ed9304b0aad  kernel-source-2.4.21-50.EL.ia64.rpm
cde442e6c7fba9087ac7c92ee40748e3  kernel-unsupported-2.4.21-50.EL.ia64.rpm

x86_64:
da285ae8b8a1d4dc3fe0411861488119  kernel-2.4.21-50.EL.ia32e.rpm
5f7e05a4ca91441fdd52d79da1886dfe  kernel-2.4.21-50.EL.x86_64.rpm
9e2be2ea882e105ea3926d41bf1442be  kernel-debuginfo-2.4.21-50.EL.ia32e.rpm
a7b578a947b841e1334135c97fa0d390  kernel-debuginfo-2.4.21-50.EL.x86_64.rpm
fe43cb360a3130855db0404bda411cd1  kernel-doc-2.4.21-50.EL.x86_64.rpm
6ca6c1e84c6f11ac9dc40c27d40b9473  kernel-smp-2.4.21-50.EL.x86_64.rpm
9d3594ab2e34a316668685dbe2ed4511  kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm
5e2951403ef3036cd82b70fc91e86100  kernel-source-2.4.21-50.EL.x86_64.rpm
372d28ebf73a915bb4fdf8b4433910ac  kernel-unsupported-2.4.21-50.EL.ia32e.rpm
90fb18a58a605af3337fcaf7e69b8010  kernel-unsupported-2.4.21-50.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm
c79722a872a08eb82398a58749f270cf  kernel-2.4.21-50.EL.src.rpm

i386:
7cfbe7d0110e0c1381b73177104119ec  kernel-2.4.21-50.EL.athlon.rpm
7203347beb0c4659f63bebb1e487b009  kernel-2.4.21-50.EL.i686.rpm
5c994b0987b31010cb0a825e022aee84  kernel-BOOT-2.4.21-50.EL.i386.rpm
fae1d5c55370b3247bdaeb8c554d0ce5  kernel-debuginfo-2.4.21-50.EL.athlon.rpm
aba8af6dc7681e0ec6296478caa5afbe  kernel-debuginfo-2.4.21-50.EL.i386.rpm
dfeb338d473d9f4ea25e4c5f009f93a4  kernel-debuginfo-2.4.21-50.EL.i686.rpm
277167db623567d2772f53c9442aab79  kernel-doc-2.4.21-50.EL.i386.rpm
fe20ef598810be1ee1eb5a7b34994e63  kernel-hugemem-2.4.21-50.EL.i686.rpm
4c19a2a12f011afbcf8ee09dfe19d9b5  kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm
1ceae1fcc0a9d53ee80ca959f077d1bf  kernel-smp-2.4.21-50.EL.athlon.rpm
71e88c7296ff3dacdccfdac4e3071df2  kernel-smp-2.4.21-50.EL.i686.rpm
59b44b72919e9aa6ca57bd5eaafd686b  kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm
57239b02735863035421e6b4f9152790  kernel-smp-unsupported-2.4.21-50.EL.i686.rpm
2e0d8c5c9d320ba251483de4ebb30d68  kernel-source-2.4.21-50.EL.i386.rpm
1543ab5008587ee48e77f6ff55e3b69e  kernel-unsupported-2.4.21-50.EL.athlon.rpm
f6b4df392ef5cdc8760377f802d8d0d8  kernel-unsupported-2.4.21-50.EL.i686.rpm

ia64:
4ecbfd266438b2f64846b583608886f3  kernel-2.4.21-50.EL.ia64.rpm
26e27e76ff1b0034115ea29ed665f5d3  kernel-debuginfo-2.4.21-50.EL.ia64.rpm
29ad4e24dbfdfdc3898ed12a960c7fac  kernel-doc-2.4.21-50.EL.ia64.rpm
bc1684ae959c30fa809b0ed9304b0aad  kernel-source-2.4.21-50.EL.ia64.rpm
cde442e6c7fba9087ac7c92ee40748e3  kernel-unsupported-2.4.21-50.EL.ia64.rpm

x86_64:
da285ae8b8a1d4dc3fe0411861488119  kernel-2.4.21-50.EL.ia32e.rpm
5f7e05a4ca91441fdd52d79da1886dfe  kernel-2.4.21-50.EL.x86_64.rpm
9e2be2ea882e105ea3926d41bf1442be  kernel-debuginfo-2.4.21-50.EL.ia32e.rpm
a7b578a947b841e1334135c97fa0d390  kernel-debuginfo-2.4.21-50.EL.x86_64.rpm
fe43cb360a3130855db0404bda411cd1  kernel-doc-2.4.21-50.EL.x86_64.rpm
6ca6c1e84c6f11ac9dc40c27d40b9473  kernel-smp-2.4.21-50.EL.x86_64.rpm
9d3594ab2e34a316668685dbe2ed4511  kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm
5e2951403ef3036cd82b70fc91e86100  kernel-source-2.4.21-50.EL.x86_64.rpm
372d28ebf73a915bb4fdf8b4433910ac  kernel-unsupported-2.4.21-50.EL.ia32e.rpm
90fb18a58a605af3337fcaf7e69b8010  kernel-unsupported-2.4.21-50.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGbYwhXlSAg2UNWIIRAu21AJ4u7MYtxy5/U0mOX2xTWtLf2sy+rACeN9zM
+sZgNmsh32K6L0l5/v0eeOI=
=Omh9
-----END PGP SIGNATURE-----






More information about the Enterprise-watch-list mailing list