- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Moderate: kernel security and bugfix update
Advisory ID:       RHSA-2007:0774-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2007:0774.html
Issue date:        2007-09-04
Updated on:        2007-09-04
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-0558 CVE-2007-1217 
- ---------------------------------------------------------------------1. Summary:

Updated kernel packages that fix several security issues and bugs in the
Red Hat Enterprise Linux 4 kernel are now available.

This security advisory has been rated as having moderate security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a
denial of service or potential remote access. Exploitation would require
the attacker to be able to send arbitrary frames over the ISDN network to
the victim's machine. (CVE-2007-1217, Moderate) 

* a flaw in the perfmon subsystem on ia64 platforms that allowed a local
user to cause a denial of service. (CVE-2006-0558, Moderate)

In addition, the following bugs were addressed:

* a panic after reloading of the LSI Fusion driver.

* a vm performance problem was corrected by balancing inactive page lists.

* added a nodirplus option to address NFSv3 performance issues with large
directories.

* changed the personality handling to disallow personality changes of
setuid and setgid binaries. This ensures they keep any randomization and
Exec-shield protection.

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at

5. Bug IDs fixed (http://bugzilla.redhat.com/):

243257 - CVE-2007-1217 Overflow in CAPI subsystem
248141 - lockup in shrink_zone when node out of memory
250199 - CVE-2006-0558 ia64 crash

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
765a9f014a98b52c6a71b163744eb723  kernel-2.6.9-55.0.6.EL.src.rpm

i386:
5ca649f693fa4dadf3a17cd1c87d3778  kernel-2.6.9-55.0.6.EL.i686.rpm
effa7d30c0e6bed0cba0d0802c7984f4  kernel-debuginfo-2.6.9-55.0.6.EL.i686.rpm
70bc806db1f470c0275761d77b4b2e31  kernel-devel-2.6.9-55.0.6.EL.i686.rpm
461a3363011947ed95a34272427ecc05  kernel-hugemem-2.6.9-55.0.6.EL.i686.rpm
09eea38f8458e99035f01b75bc6c2591  kernel-hugemem-devel-2.6.9-55.0.6.EL.i686.rpm
82836f23fac455e0d8c91d65135406c3  kernel-smp-2.6.9-55.0.6.EL.i686.rpm
9de094acb60ee41456f7dc5d5d5ef425  kernel-smp-devel-2.6.9-55.0.6.EL.i686.rpm
457638d044d30bd6254c09481adfb0d6  kernel-xenU-2.6.9-55.0.6.EL.i686.rpm
cb7178e80a0a1cc311a0e03202762af3  kernel-xenU-devel-2.6.9-55.0.6.EL.i686.rpm

ia64:
a34296fd8eb4b1ea772a97504863db3b  kernel-2.6.9-55.0.6.EL.ia64.rpm
4180c95dd8656f17e23afbacedc536f8  kernel-debuginfo-2.6.9-55.0.6.EL.ia64.rpm
07d2d09a4551b905e6ea43130a918517  kernel-devel-2.6.9-55.0.6.EL.ia64.rpm
93755492c8cafa8b5eba00188ade56f8  kernel-largesmp-2.6.9-55.0.6.EL.ia64.rpm
24223db0f6610aea7f031b7e2b1731c0  kernel-largesmp-devel-2.6.9-55.0.6.EL.ia64.rpm

noarch:
12721d7fbe9f676d333e6bd102450741  kernel-doc-2.6.9-55.0.6.EL.noarch.rpm

ppc:
a7f827d585e7b88e275c4415f921bd22  kernel-2.6.9-55.0.6.EL.ppc64.rpm
9960bec30ae32a6b0ef32291cb5c4c22  kernel-2.6.9-55.0.6.EL.ppc64iseries.rpm
e9e3319cf9daa15c43c63251800f9aa0  kernel-debuginfo-2.6.9-55.0.6.EL.ppc64.rpm
b14d8fb2e253356a66c8ad567c90c3de  kernel-debuginfo-2.6.9-55.0.6.EL.ppc64iseries.rpm
747f20511e832ac72f768181c6323438  kernel-devel-2.6.9-55.0.6.EL.ppc64.rpm
4342ec81fae76e355da332539406f021  kernel-devel-2.6.9-55.0.6.EL.ppc64iseries.rpm
ef695eb5436de012753ed28c479fbacb  kernel-largesmp-2.6.9-55.0.6.EL.ppc64.rpm
e29fc42bce0ce54fba3032cd1ce7a031  kernel-largesmp-devel-2.6.9-55.0.6.EL.ppc64.rpm

s390:
f8f49e1d1f3b2648dabfbe843b3b93b4  kernel-2.6.9-55.0.6.EL.s390.rpm
b5dbbeb030cfdae3334e93cd6c0a84b9  kernel-debuginfo-2.6.9-55.0.6.EL.s390.rpm
62628af6da559c4f8e8f649ab06ecc07  kernel-devel-2.6.9-55.0.6.EL.s390.rpm

s390x:
28c9fd7c0fa74382229e4c93b915f037  kernel-2.6.9-55.0.6.EL.s390x.rpm
15bebcc1182c9a579463b3462c6bd9e1  kernel-debuginfo-2.6.9-55.0.6.EL.s390x.rpm
5ff9158eea826817e39f5a3f4ae58d57  kernel-devel-2.6.9-55.0.6.EL.s390x.rpm

x86_64:
45b6465b5990b7f15a1bdda3801776ba  kernel-2.6.9-55.0.6.EL.x86_64.rpm
87f0be447ef0130568e819e5e0bd0c4b  kernel-debuginfo-2.6.9-55.0.6.EL.x86_64.rpm
848643171741d18b3d6cac4cd29a3251  kernel-devel-2.6.9-55.0.6.EL.x86_64.rpm
082aee2e6be21e53e51ffcb18f21c5ea  kernel-largesmp-2.6.9-55.0.6.EL.x86_64.rpm
f840a93d76ee2911a0954e114b69843b  kernel-largesmp-devel-2.6.9-55.0.6.EL.x86_64.rpm
8a05d9a9f805c2d72636d4d143e6954f  kernel-smp-2.6.9-55.0.6.EL.x86_64.rpm
9cb515622e094f2aebccfa21844258a5  kernel-smp-devel-2.6.9-55.0.6.EL.x86_64.rpm
7015c4515b1bfdd8058b70a5f3354737  kernel-xenU-2.6.9-55.0.6.EL.x86_64.rpm
a56936184935bc91369d4cb160b1ae72  kernel-xenU-devel-2.6.9-55.0.6.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
765a9f014a98b52c6a71b163744eb723  kernel-2.6.9-55.0.6.EL.src.rpm

i386:
5ca649f693fa4dadf3a17cd1c87d3778  kernel-2.6.9-55.0.6.EL.i686.rpm
effa7d30c0e6bed0cba0d0802c7984f4  kernel-debuginfo-2.6.9-55.0.6.EL.i686.rpm
70bc806db1f470c0275761d77b4b2e31  kernel-devel-2.6.9-55.0.6.EL.i686.rpm
461a3363011947ed95a34272427ecc05  kernel-hugemem-2.6.9-55.0.6.EL.i686.rpm
09eea38f8458e99035f01b75bc6c2591  kernel-hugemem-devel-2.6.9-55.0.6.EL.i686.rpm
82836f23fac455e0d8c91d65135406c3  kernel-smp-2.6.9-55.0.6.EL.i686.rpm
9de094acb60ee41456f7dc5d5d5ef425  kernel-smp-devel-2.6.9-55.0.6.EL.i686.rpm
457638d044d30bd6254c09481adfb0d6  kernel-xenU-2.6.9-55.0.6.EL.i686.rpm
cb7178e80a0a1cc311a0e03202762af3  kernel-xenU-devel-2.6.9-55.0.6.EL.i686.rpm

noarch:
12721d7fbe9f676d333e6bd102450741  kernel-doc-2.6.9-55.0.6.EL.noarch.rpm

x86_64:
45b6465b5990b7f15a1bdda3801776ba  kernel-2.6.9-55.0.6.EL.x86_64.rpm
87f0be447ef0130568e819e5e0bd0c4b  kernel-debuginfo-2.6.9-55.0.6.EL.x86_64.rpm
848643171741d18b3d6cac4cd29a3251  kernel-devel-2.6.9-55.0.6.EL.x86_64.rpm
082aee2e6be21e53e51ffcb18f21c5ea  kernel-largesmp-2.6.9-55.0.6.EL.x86_64.rpm
f840a93d76ee2911a0954e114b69843b  kernel-largesmp-devel-2.6.9-55.0.6.EL.x86_64.rpm
8a05d9a9f805c2d72636d4d143e6954f  kernel-smp-2.6.9-55.0.6.EL.x86_64.rpm
9cb515622e094f2aebccfa21844258a5  kernel-smp-devel-2.6.9-55.0.6.EL.x86_64.rpm
7015c4515b1bfdd8058b70a5f3354737  kernel-xenU-2.6.9-55.0.6.EL.x86_64.rpm
a56936184935bc91369d4cb160b1ae72  kernel-xenU-devel-2.6.9-55.0.6.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
765a9f014a98b52c6a71b163744eb723  kernel-2.6.9-55.0.6.EL.src.rpm

i386:
5ca649f693fa4dadf3a17cd1c87d3778  kernel-2.6.9-55.0.6.EL.i686.rpm
effa7d30c0e6bed0cba0d0802c7984f4  kernel-debuginfo-2.6.9-55.0.6.EL.i686.rpm
70bc806db1f470c0275761d77b4b2e31  kernel-devel-2.6.9-55.0.6.EL.i686.rpm
461a3363011947ed95a34272427ecc05  kernel-hugemem-2.6.9-55.0.6.EL.i686.rpm
09eea38f8458e99035f01b75bc6c2591  kernel-hugemem-devel-2.6.9-55.0.6.EL.i686.rpm
82836f23fac455e0d8c91d65135406c3  kernel-smp-2.6.9-55.0.6.EL.i686.rpm
9de094acb60ee41456f7dc5d5d5ef425  kernel-smp-devel-2.6.9-55.0.6.EL.i686.rpm
457638d044d30bd6254c09481adfb0d6  kernel-xenU-2.6.9-55.0.6.EL.i686.rpm
cb7178e80a0a1cc311a0e03202762af3  kernel-xenU-devel-2.6.9-55.0.6.EL.i686.rpm

ia64:
a34296fd8eb4b1ea772a97504863db3b  kernel-2.6.9-55.0.6.EL.ia64.rpm
4180c95dd8656f17e23afbacedc536f8  kernel-debuginfo-2.6.9-55.0.6.EL.ia64.rpm
07d2d09a4551b905e6ea43130a918517  kernel-devel-2.6.9-55.0.6.EL.ia64.rpm
93755492c8cafa8b5eba00188ade56f8  kernel-largesmp-2.6.9-55.0.6.EL.ia64.rpm
24223db0f6610aea7f031b7e2b1731c0  kernel-largesmp-devel-2.6.9-55.0.6.EL.ia64.rpm

noarch:
12721d7fbe9f676d333e6bd102450741  kernel-doc-2.6.9-55.0.6.EL.noarch.rpm

x86_64:
45b6465b5990b7f15a1bdda3801776ba  kernel-2.6.9-55.0.6.EL.x86_64.rpm
87f0be447ef0130568e819e5e0bd0c4b  kernel-debuginfo-2.6.9-55.0.6.EL.x86_64.rpm
848643171741d18b3d6cac4cd29a3251  kernel-devel-2.6.9-55.0.6.EL.x86_64.rpm
082aee2e6be21e53e51ffcb18f21c5ea  kernel-largesmp-2.6.9-55.0.6.EL.x86_64.rpm
f840a93d76ee2911a0954e114b69843b  kernel-largesmp-devel-2.6.9-55.0.6.EL.x86_64.rpm
8a05d9a9f805c2d72636d4d143e6954f  kernel-smp-2.6.9-55.0.6.EL.x86_64.rpm
9cb515622e094f2aebccfa21844258a5  kernel-smp-devel-2.6.9-55.0.6.EL.x86_64.rpm
7015c4515b1bfdd8058b70a5f3354737  kernel-xenU-2.6.9-55.0.6.EL.x86_64.rpm
a56936184935bc91369d4cb160b1ae72  kernel-xenU-devel-2.6.9-55.0.6.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
765a9f014a98b52c6a71b163744eb723  kernel-2.6.9-55.0.6.EL.src.rpm

i386:
5ca649f693fa4dadf3a17cd1c87d3778  kernel-2.6.9-55.0.6.EL.i686.rpm
effa7d30c0e6bed0cba0d0802c7984f4  kernel-debuginfo-2.6.9-55.0.6.EL.i686.rpm
70bc806db1f470c0275761d77b4b2e31  kernel-devel-2.6.9-55.0.6.EL.i686.rpm
461a3363011947ed95a34272427ecc05  kernel-hugemem-2.6.9-55.0.6.EL.i686.rpm
09eea38f8458e99035f01b75bc6c2591  kernel-hugemem-devel-2.6.9-55.0.6.EL.i686.rpm
82836f23fac455e0d8c91d65135406c3  kernel-smp-2.6.9-55.0.6.EL.i686.rpm
9de094acb60ee41456f7dc5d5d5ef425  kernel-smp-devel-2.6.9-55.0.6.EL.i686.rpm
457638d044d30bd6254c09481adfb0d6  kernel-xenU-2.6.9-55.0.6.EL.i686.rpm
cb7178e80a0a1cc311a0e03202762af3  kernel-xenU-devel-2.6.9-55.0.6.EL.i686.rpm

ia64:
a34296fd8eb4b1ea772a97504863db3b  kernel-2.6.9-55.0.6.EL.ia64.rpm
4180c95dd8656f17e23afbacedc536f8  kernel-debuginfo-2.6.9-55.0.6.EL.ia64.rpm
07d2d09a4551b905e6ea43130a918517  kernel-devel-2.6.9-55.0.6.EL.ia64.rpm
93755492c8cafa8b5eba00188ade56f8  kernel-largesmp-2.6.9-55.0.6.EL.ia64.rpm
24223db0f6610aea7f031b7e2b1731c0  kernel-largesmp-devel-2.6.9-55.0.6.EL.ia64.rpm

noarch:
12721d7fbe9f676d333e6bd102450741  kernel-doc-2.6.9-55.0.6.EL.noarch.rpm

x86_64:
45b6465b5990b7f15a1bdda3801776ba  kernel-2.6.9-55.0.6.EL.x86_64.rpm
87f0be447ef0130568e819e5e0bd0c4b  kernel-debuginfo-2.6.9-55.0.6.EL.x86_64.rpm
848643171741d18b3d6cac4cd29a3251  kernel-devel-2.6.9-55.0.6.EL.x86_64.rpm
082aee2e6be21e53e51ffcb18f21c5ea  kernel-largesmp-2.6.9-55.0.6.EL.x86_64.rpm
f840a93d76ee2911a0954e114b69843b  kernel-largesmp-devel-2.6.9-55.0.6.EL.x86_64.rpm
8a05d9a9f805c2d72636d4d143e6954f  kernel-smp-2.6.9-55.0.6.EL.x86_64.rpm
9cb515622e094f2aebccfa21844258a5  kernel-smp-devel-2.6.9-55.0.6.EL.x86_64.rpm
7015c4515b1bfdd8058b70a5f3354737  kernel-xenU-2.6.9-55.0.6.EL.x86_64.rpm
a56936184935bc91369d4cb160b1ae72  kernel-xenU-devel-2.6.9-55.0.6.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0558
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1217
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.

RedHat: Moderate: kernel security and bugfix update

Updated kernel packages that fix several security issues and bugs in the Red Hat Enterprise Linux 4 kernel are now available. This security advisory has been rated as having mode...

Summary



Summary

The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the security issues described below: * a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a denial of service or potential remote access. Exploitation would require the attacker to be able to send arbitrary frames over the ISDN network to the victim's machine. (CVE-2007-1217, Moderate) * a flaw in the perfmon subsystem on ia64 platforms that allowed a local user to cause a denial of service. (CVE-2006-0558, Moderate) In addition, the following bugs were addressed: * a panic after reloading of the LSI Fusion driver. * a vm performance problem was corrected by balancing inactive page lists. * added a nodirplus option to address NFSv3 performance issues with large directories. * changed the personality handling to disallow personality changes of setuid and setgid binaries. This ensures they keep any randomization and Exec-shield protection. All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at
5. Bug IDs fixed (http://bugzilla.redhat.com/):
243257 - CVE-2007-1217 Overflow in CAPI subsystem 248141 - lockup in shrink_zone when node out of memory 250199 - CVE-2006-0558 ia64 crash
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS: 765a9f014a98b52c6a71b163744eb723 kernel-2.6.9-55.0.6.EL.src.rpm
i386: 5ca649f693fa4dadf3a17cd1c87d3778 kernel-2.6.9-55.0.6.EL.i686.rpm effa7d30c0e6bed0cba0d0802c7984f4 kernel-debuginfo-2.6.9-55.0.6.EL.i686.rpm 70bc806db1f470c0275761d77b4b2e31 kernel-devel-2.6.9-55.0.6.EL.i686.rpm 461a3363011947ed95a34272427ecc05 kernel-hugemem-2.6.9-55.0.6.EL.i686.rpm 09eea38f8458e99035f01b75bc6c2591 kernel-hugemem-devel-2.6.9-55.0.6.EL.i686.rpm 82836f23fac455e0d8c91d65135406c3 kernel-smp-2.6.9-55.0.6.EL.i686.rpm 9de094acb60ee41456f7dc5d5d5ef425 kernel-smp-devel-2.6.9-55.0.6.EL.i686.rpm 457638d044d30bd6254c09481adfb0d6 kernel-xenU-2.6.9-55.0.6.EL.i686.rpm cb7178e80a0a1cc311a0e03202762af3 kernel-xenU-devel-2.6.9-55.0.6.EL.i686.rpm
ia64: a34296fd8eb4b1ea772a97504863db3b kernel-2.6.9-55.0.6.EL.ia64.rpm 4180c95dd8656f17e23afbacedc536f8 kernel-debuginfo-2.6.9-55.0.6.EL.ia64.rpm 07d2d09a4551b905e6ea43130a918517 kernel-devel-2.6.9-55.0.6.EL.ia64.rpm 93755492c8cafa8b5eba00188ade56f8 kernel-largesmp-2.6.9-55.0.6.EL.ia64.rpm 24223db0f6610aea7f031b7e2b1731c0 kernel-largesmp-devel-2.6.9-55.0.6.EL.ia64.rpm
noarch: 12721d7fbe9f676d333e6bd102450741 kernel-doc-2.6.9-55.0.6.EL.noarch.rpm
ppc: a7f827d585e7b88e275c4415f921bd22 kernel-2.6.9-55.0.6.EL.ppc64.rpm 9960bec30ae32a6b0ef32291cb5c4c22 kernel-2.6.9-55.0.6.EL.ppc64iseries.rpm e9e3319cf9daa15c43c63251800f9aa0 kernel-debuginfo-2.6.9-55.0.6.EL.ppc64.rpm b14d8fb2e253356a66c8ad567c90c3de kernel-debuginfo-2.6.9-55.0.6.EL.ppc64iseries.rpm 747f20511e832ac72f768181c6323438 kernel-devel-2.6.9-55.0.6.EL.ppc64.rpm 4342ec81fae76e355da332539406f021 kernel-devel-2.6.9-55.0.6.EL.ppc64iseries.rpm ef695eb5436de012753ed28c479fbacb kernel-largesmp-2.6.9-55.0.6.EL.ppc64.rpm e29fc42bce0ce54fba3032cd1ce7a031 kernel-largesmp-devel-2.6.9-55.0.6.EL.ppc64.rpm
s390: f8f49e1d1f3b2648dabfbe843b3b93b4 kernel-2.6.9-55.0.6.EL.s390.rpm b5dbbeb030cfdae3334e93cd6c0a84b9 kernel-debuginfo-2.6.9-55.0.6.EL.s390.rpm 62628af6da559c4f8e8f649ab06ecc07 kernel-devel-2.6.9-55.0.6.EL.s390.rpm
s390x: 28c9fd7c0fa74382229e4c93b915f037 kernel-2.6.9-55.0.6.EL.s390x.rpm 15bebcc1182c9a579463b3462c6bd9e1 kernel-debuginfo-2.6.9-55.0.6.EL.s390x.rpm 5ff9158eea826817e39f5a3f4ae58d57 kernel-devel-2.6.9-55.0.6.EL.s390x.rpm
x86_64: 45b6465b5990b7f15a1bdda3801776ba kernel-2.6.9-55.0.6.EL.x86_64.rpm 87f0be447ef0130568e819e5e0bd0c4b kernel-debuginfo-2.6.9-55.0.6.EL.x86_64.rpm 848643171741d18b3d6cac4cd29a3251 kernel-devel-2.6.9-55.0.6.EL.x86_64.rpm 082aee2e6be21e53e51ffcb18f21c5ea kernel-largesmp-2.6.9-55.0.6.EL.x86_64.rpm f840a93d76ee2911a0954e114b69843b kernel-largesmp-devel-2.6.9-55.0.6.EL.x86_64.rpm 8a05d9a9f805c2d72636d4d143e6954f kernel-smp-2.6.9-55.0.6.EL.x86_64.rpm 9cb515622e094f2aebccfa21844258a5 kernel-smp-devel-2.6.9-55.0.6.EL.x86_64.rpm 7015c4515b1bfdd8058b70a5f3354737 kernel-xenU-2.6.9-55.0.6.EL.x86_64.rpm a56936184935bc91369d4cb160b1ae72 kernel-xenU-devel-2.6.9-55.0.6.EL.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: 765a9f014a98b52c6a71b163744eb723 kernel-2.6.9-55.0.6.EL.src.rpm
i386: 5ca649f693fa4dadf3a17cd1c87d3778 kernel-2.6.9-55.0.6.EL.i686.rpm effa7d30c0e6bed0cba0d0802c7984f4 kernel-debuginfo-2.6.9-55.0.6.EL.i686.rpm 70bc806db1f470c0275761d77b4b2e31 kernel-devel-2.6.9-55.0.6.EL.i686.rpm 461a3363011947ed95a34272427ecc05 kernel-hugemem-2.6.9-55.0.6.EL.i686.rpm 09eea38f8458e99035f01b75bc6c2591 kernel-hugemem-devel-2.6.9-55.0.6.EL.i686.rpm 82836f23fac455e0d8c91d65135406c3 kernel-smp-2.6.9-55.0.6.EL.i686.rpm 9de094acb60ee41456f7dc5d5d5ef425 kernel-smp-devel-2.6.9-55.0.6.EL.i686.rpm 457638d044d30bd6254c09481adfb0d6 kernel-xenU-2.6.9-55.0.6.EL.i686.rpm cb7178e80a0a1cc311a0e03202762af3 kernel-xenU-devel-2.6.9-55.0.6.EL.i686.rpm
noarch: 12721d7fbe9f676d333e6bd102450741 kernel-doc-2.6.9-55.0.6.EL.noarch.rpm
x86_64: 45b6465b5990b7f15a1bdda3801776ba kernel-2.6.9-55.0.6.EL.x86_64.rpm 87f0be447ef0130568e819e5e0bd0c4b kernel-debuginfo-2.6.9-55.0.6.EL.x86_64.rpm 848643171741d18b3d6cac4cd29a3251 kernel-devel-2.6.9-55.0.6.EL.x86_64.rpm 082aee2e6be21e53e51ffcb18f21c5ea kernel-largesmp-2.6.9-55.0.6.EL.x86_64.rpm f840a93d76ee2911a0954e114b69843b kernel-largesmp-devel-2.6.9-55.0.6.EL.x86_64.rpm 8a05d9a9f805c2d72636d4d143e6954f kernel-smp-2.6.9-55.0.6.EL.x86_64.rpm 9cb515622e094f2aebccfa21844258a5 kernel-smp-devel-2.6.9-55.0.6.EL.x86_64.rpm 7015c4515b1bfdd8058b70a5f3354737 kernel-xenU-2.6.9-55.0.6.EL.x86_64.rpm a56936184935bc91369d4cb160b1ae72 kernel-xenU-devel-2.6.9-55.0.6.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: 765a9f014a98b52c6a71b163744eb723 kernel-2.6.9-55.0.6.EL.src.rpm
i386: 5ca649f693fa4dadf3a17cd1c87d3778 kernel-2.6.9-55.0.6.EL.i686.rpm effa7d30c0e6bed0cba0d0802c7984f4 kernel-debuginfo-2.6.9-55.0.6.EL.i686.rpm 70bc806db1f470c0275761d77b4b2e31 kernel-devel-2.6.9-55.0.6.EL.i686.rpm 461a3363011947ed95a34272427ecc05 kernel-hugemem-2.6.9-55.0.6.EL.i686.rpm 09eea38f8458e99035f01b75bc6c2591 kernel-hugemem-devel-2.6.9-55.0.6.EL.i686.rpm 82836f23fac455e0d8c91d65135406c3 kernel-smp-2.6.9-55.0.6.EL.i686.rpm 9de094acb60ee41456f7dc5d5d5ef425 kernel-smp-devel-2.6.9-55.0.6.EL.i686.rpm 457638d044d30bd6254c09481adfb0d6 kernel-xenU-2.6.9-55.0.6.EL.i686.rpm cb7178e80a0a1cc311a0e03202762af3 kernel-xenU-devel-2.6.9-55.0.6.EL.i686.rpm
ia64: a34296fd8eb4b1ea772a97504863db3b kernel-2.6.9-55.0.6.EL.ia64.rpm 4180c95dd8656f17e23afbacedc536f8 kernel-debuginfo-2.6.9-55.0.6.EL.ia64.rpm 07d2d09a4551b905e6ea43130a918517 kernel-devel-2.6.9-55.0.6.EL.ia64.rpm 93755492c8cafa8b5eba00188ade56f8 kernel-largesmp-2.6.9-55.0.6.EL.ia64.rpm 24223db0f6610aea7f031b7e2b1731c0 kernel-largesmp-devel-2.6.9-55.0.6.EL.ia64.rpm
noarch: 12721d7fbe9f676d333e6bd102450741 kernel-doc-2.6.9-55.0.6.EL.noarch.rpm
x86_64: 45b6465b5990b7f15a1bdda3801776ba kernel-2.6.9-55.0.6.EL.x86_64.rpm 87f0be447ef0130568e819e5e0bd0c4b kernel-debuginfo-2.6.9-55.0.6.EL.x86_64.rpm 848643171741d18b3d6cac4cd29a3251 kernel-devel-2.6.9-55.0.6.EL.x86_64.rpm 082aee2e6be21e53e51ffcb18f21c5ea kernel-largesmp-2.6.9-55.0.6.EL.x86_64.rpm f840a93d76ee2911a0954e114b69843b kernel-largesmp-devel-2.6.9-55.0.6.EL.x86_64.rpm 8a05d9a9f805c2d72636d4d143e6954f kernel-smp-2.6.9-55.0.6.EL.x86_64.rpm 9cb515622e094f2aebccfa21844258a5 kernel-smp-devel-2.6.9-55.0.6.EL.x86_64.rpm 7015c4515b1bfdd8058b70a5f3354737 kernel-xenU-2.6.9-55.0.6.EL.x86_64.rpm a56936184935bc91369d4cb160b1ae72 kernel-xenU-devel-2.6.9-55.0.6.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: 765a9f014a98b52c6a71b163744eb723 kernel-2.6.9-55.0.6.EL.src.rpm
i386: 5ca649f693fa4dadf3a17cd1c87d3778 kernel-2.6.9-55.0.6.EL.i686.rpm effa7d30c0e6bed0cba0d0802c7984f4 kernel-debuginfo-2.6.9-55.0.6.EL.i686.rpm 70bc806db1f470c0275761d77b4b2e31 kernel-devel-2.6.9-55.0.6.EL.i686.rpm 461a3363011947ed95a34272427ecc05 kernel-hugemem-2.6.9-55.0.6.EL.i686.rpm 09eea38f8458e99035f01b75bc6c2591 kernel-hugemem-devel-2.6.9-55.0.6.EL.i686.rpm 82836f23fac455e0d8c91d65135406c3 kernel-smp-2.6.9-55.0.6.EL.i686.rpm 9de094acb60ee41456f7dc5d5d5ef425 kernel-smp-devel-2.6.9-55.0.6.EL.i686.rpm 457638d044d30bd6254c09481adfb0d6 kernel-xenU-2.6.9-55.0.6.EL.i686.rpm cb7178e80a0a1cc311a0e03202762af3 kernel-xenU-devel-2.6.9-55.0.6.EL.i686.rpm
ia64: a34296fd8eb4b1ea772a97504863db3b kernel-2.6.9-55.0.6.EL.ia64.rpm 4180c95dd8656f17e23afbacedc536f8 kernel-debuginfo-2.6.9-55.0.6.EL.ia64.rpm 07d2d09a4551b905e6ea43130a918517 kernel-devel-2.6.9-55.0.6.EL.ia64.rpm 93755492c8cafa8b5eba00188ade56f8 kernel-largesmp-2.6.9-55.0.6.EL.ia64.rpm 24223db0f6610aea7f031b7e2b1731c0 kernel-largesmp-devel-2.6.9-55.0.6.EL.ia64.rpm
noarch: 12721d7fbe9f676d333e6bd102450741 kernel-doc-2.6.9-55.0.6.EL.noarch.rpm
x86_64: 45b6465b5990b7f15a1bdda3801776ba kernel-2.6.9-55.0.6.EL.x86_64.rpm 87f0be447ef0130568e819e5e0bd0c4b kernel-debuginfo-2.6.9-55.0.6.EL.x86_64.rpm 848643171741d18b3d6cac4cd29a3251 kernel-devel-2.6.9-55.0.6.EL.x86_64.rpm 082aee2e6be21e53e51ffcb18f21c5ea kernel-largesmp-2.6.9-55.0.6.EL.x86_64.rpm f840a93d76ee2911a0954e114b69843b kernel-largesmp-devel-2.6.9-55.0.6.EL.x86_64.rpm 8a05d9a9f805c2d72636d4d143e6954f kernel-smp-2.6.9-55.0.6.EL.x86_64.rpm 9cb515622e094f2aebccfa21844258a5 kernel-smp-devel-2.6.9-55.0.6.EL.x86_64.rpm 7015c4515b1bfdd8058b70a5f3354737 kernel-xenU-2.6.9-55.0.6.EL.x86_64.rpm a56936184935bc91369d4cb160b1ae72 kernel-xenU-devel-2.6.9-55.0.6.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0558 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1217 http://www.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2007:0774-01
Advisory URL: https://access.redhat.com/errata/RHSA-2007:0774.html
Issued Date: : 2007-09-04
Updated on: 2007-09-04
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-0558 CVE-2007-1217 Updated kernel packages that fix several security issues and bugs in the Red Hat Enterprise Linux 4 kernel are now available. This security advisory has been rated as having moderate security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64


Bugs Fixed


Related News