- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Important: kernel security and bug fix update
Advisory ID:       RHSA-2007:0169-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2007:0169.html
Issue date:        2007-04-30
Updated on:        2007-04-30
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-0771 CVE-2007-1000 CVE-2007-1388 
- ---------------------------------------------------------------------1. Summary:

Updated kernel packages that fix security issues and bugs in the Red Hat
Enterprise Linux 5 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

* a flaw in the IPv6 socket option handling that allowed a local user to
read arbitrary kernel memory (CVE-2007-1000, Important).

* a flaw in the IPv6 socket option handling that allowed a local user to
cause a denial of service (CVE-2007-1388, Important).

* a flaw in the utrace support that allowed a local user to cause a denial
of service (CVE-2007-0771, Important).

In addition to the security issues described above, a fix for a memory leak
in the audit subsystem and a fix for a data corruption bug on s390 systems
have been included.

Red Hat Enterprise Linux 5 users are advised to upgrade to these erratum
packages, which are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at

5. Bug IDs fixed (http://bugzilla.redhat.com/):

228816 - CVE-2007-0771 utrace regression / denial of service
232255 - CVE-2007-1388 NULL pointer dereference in do_ipv6_setsockopt
232257 - CVE-2007-1000 NULL pointer hole in ipv6
233157 - Kernel memory leak in audit subsystem

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
3c466904fa90211ae8c91ff44e2e3479  kernel-2.6.18-8.1.3.el5.src.rpm

i386:
7f4b16f00764c2194825135f8b45d834  kernel-2.6.18-8.1.3.el5.i686.rpm
18c491ace9f7d997944c8a027ae5c886  kernel-PAE-2.6.18-8.1.3.el5.i686.rpm
a8dc403492b46d0caf2a861b481ed75f  kernel-PAE-debuginfo-2.6.18-8.1.3.el5.i686.rpm
ac75ece38e5454e6e63cad8b78573898  kernel-debuginfo-2.6.18-8.1.3.el5.i686.rpm
f6ae46ba6c056f19f28c062a7e163932  kernel-debuginfo-common-2.6.18-8.1.3.el5.i686.rpm
6f136ba7ead0bf5d1f489e21e7fb8908  kernel-headers-2.6.18-8.1.3.el5.i386.rpm
1667b437e4a9e71d7bf464c1b4e09643  kernel-xen-2.6.18-8.1.3.el5.i686.rpm
b16322b7b73c1760e397343e22ea3030  kernel-xen-debuginfo-2.6.18-8.1.3.el5.i686.rpm

noarch:
3a7d3de91629f5a1f9ba478b5b0d954b  kernel-doc-2.6.18-8.1.3.el5.noarch.rpm

x86_64:
20c52dc29ee42c2fdbf7e5e1ffc656a5  kernel-2.6.18-8.1.3.el5.x86_64.rpm
a3517d2020951926db180e94019ee02a  kernel-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm
a67481bf533c2d506a6c33bf92570cde  kernel-debuginfo-common-2.6.18-8.1.3.el5.x86_64.rpm
23016741076b2d003106b9444245b236  kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm
3cc1c159de5f22822ee4b711e7637012  kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm
f611dd23d4c0311a0e2537c51acea27e  kernel-xen-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
3c466904fa90211ae8c91ff44e2e3479  kernel-2.6.18-8.1.3.el5.src.rpm

i386:
a8dc403492b46d0caf2a861b481ed75f  kernel-PAE-debuginfo-2.6.18-8.1.3.el5.i686.rpm
5a85b33458c3da9278d6764ec27db662  kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm
ac75ece38e5454e6e63cad8b78573898  kernel-debuginfo-2.6.18-8.1.3.el5.i686.rpm
f6ae46ba6c056f19f28c062a7e163932  kernel-debuginfo-common-2.6.18-8.1.3.el5.i686.rpm
f3217c3cbd58fe01fbd2ef91861bad1f  kernel-devel-2.6.18-8.1.3.el5.i686.rpm
b16322b7b73c1760e397343e22ea3030  kernel-xen-debuginfo-2.6.18-8.1.3.el5.i686.rpm
904609f545a4340bd43c4bdae81bf4c9  kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm

x86_64:
a3517d2020951926db180e94019ee02a  kernel-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm
a67481bf533c2d506a6c33bf92570cde  kernel-debuginfo-common-2.6.18-8.1.3.el5.x86_64.rpm
151aebb51912d6eff5da61d861e3f13c  kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm
f611dd23d4c0311a0e2537c51acea27e  kernel-xen-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm
029c968689872c95b1d23943219987df  kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
3c466904fa90211ae8c91ff44e2e3479  kernel-2.6.18-8.1.3.el5.src.rpm

i386:
7f4b16f00764c2194825135f8b45d834  kernel-2.6.18-8.1.3.el5.i686.rpm
18c491ace9f7d997944c8a027ae5c886  kernel-PAE-2.6.18-8.1.3.el5.i686.rpm
a8dc403492b46d0caf2a861b481ed75f  kernel-PAE-debuginfo-2.6.18-8.1.3.el5.i686.rpm
5a85b33458c3da9278d6764ec27db662  kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm
ac75ece38e5454e6e63cad8b78573898  kernel-debuginfo-2.6.18-8.1.3.el5.i686.rpm
f6ae46ba6c056f19f28c062a7e163932  kernel-debuginfo-common-2.6.18-8.1.3.el5.i686.rpm
f3217c3cbd58fe01fbd2ef91861bad1f  kernel-devel-2.6.18-8.1.3.el5.i686.rpm
6f136ba7ead0bf5d1f489e21e7fb8908  kernel-headers-2.6.18-8.1.3.el5.i386.rpm
1667b437e4a9e71d7bf464c1b4e09643  kernel-xen-2.6.18-8.1.3.el5.i686.rpm
b16322b7b73c1760e397343e22ea3030  kernel-xen-debuginfo-2.6.18-8.1.3.el5.i686.rpm
904609f545a4340bd43c4bdae81bf4c9  kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm

ia64:
15db1e41d717917b4b77be48134f8ba5  kernel-2.6.18-8.1.3.el5.ia64.rpm
45657980c14fd48c0803bb78de14260f  kernel-debuginfo-2.6.18-8.1.3.el5.ia64.rpm
96292b202d7f789eb814a879b05d1e0b  kernel-debuginfo-common-2.6.18-8.1.3.el5.ia64.rpm
d745ba171295dca480b440ddb2982642  kernel-devel-2.6.18-8.1.3.el5.ia64.rpm
26bb0bd6ec743dcf551d069348335064  kernel-headers-2.6.18-8.1.3.el5.ia64.rpm
7d87f21cfccc266f5d6210f72304ffa0  kernel-xen-2.6.18-8.1.3.el5.ia64.rpm
4876f538f9b75e0b980880080100a2e6  kernel-xen-debuginfo-2.6.18-8.1.3.el5.ia64.rpm
b5c9d813ed78a30d37a1f9b25160f727  kernel-xen-devel-2.6.18-8.1.3.el5.ia64.rpm

noarch:
3a7d3de91629f5a1f9ba478b5b0d954b  kernel-doc-2.6.18-8.1.3.el5.noarch.rpm

ppc:
1251fd856e805c4e2b7257f153dfc83b  kernel-2.6.18-8.1.3.el5.ppc64.rpm
52b9a4aacf1ba853a937a67d28b502cd  kernel-debuginfo-2.6.18-8.1.3.el5.ppc64.rpm
bc2f18102201ec65e0ccf160e2bbf5b2  kernel-debuginfo-common-2.6.18-8.1.3.el5.ppc64.rpm
9f25a700177733b5b98a2a82f8069aa7  kernel-devel-2.6.18-8.1.3.el5.ppc64.rpm
111dd2f2c54487fc31bc0b8996c238c9  kernel-headers-2.6.18-8.1.3.el5.ppc.rpm
71a843834e5c63149d0c4821492c22c1  kernel-headers-2.6.18-8.1.3.el5.ppc64.rpm
ddc7f5422532ac2d2861a3ee13aa2852  kernel-kdump-2.6.18-8.1.3.el5.ppc64.rpm
a4f633a53462523469a112a89cef7377  kernel-kdump-debuginfo-2.6.18-8.1.3.el5.ppc64.rpm
d81cd3aec1759206e26e22f54614b6e0  kernel-kdump-devel-2.6.18-8.1.3.el5.ppc64.rpm

s390x:
906237fa0cfdedea4c691483f7e4c499  kernel-2.6.18-8.1.3.el5.s390x.rpm
b3e28935a6640a396863925cac6e27ec  kernel-debuginfo-2.6.18-8.1.3.el5.s390x.rpm
398cadf117034831718ee275f4733646  kernel-debuginfo-common-2.6.18-8.1.3.el5.s390x.rpm
6f134d9385e2c3a7b60ea0b373e8d093  kernel-devel-2.6.18-8.1.3.el5.s390x.rpm
7895302f72c5563ce6d1531897ad9dd1  kernel-headers-2.6.18-8.1.3.el5.s390x.rpm

x86_64:
20c52dc29ee42c2fdbf7e5e1ffc656a5  kernel-2.6.18-8.1.3.el5.x86_64.rpm
a3517d2020951926db180e94019ee02a  kernel-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm
a67481bf533c2d506a6c33bf92570cde  kernel-debuginfo-common-2.6.18-8.1.3.el5.x86_64.rpm
151aebb51912d6eff5da61d861e3f13c  kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm
23016741076b2d003106b9444245b236  kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm
3cc1c159de5f22822ee4b711e7637012  kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm
f611dd23d4c0311a0e2537c51acea27e  kernel-xen-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm
029c968689872c95b1d23943219987df  kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1000
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1388
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.

RedHat: Important: kernel security and bug fix update

Updated kernel packages that fix security issues and bugs in the Red Hat Enterprise Linux 5 kernel are now available. Fixes a flaw in the IPv6 socket option handling that allowed...

Summary



Summary

The Linux kernel handles the basic functions of the operating system. These new kernel packages contain fixes for the following security issues: * a flaw in the IPv6 socket option handling that allowed a local user to read arbitrary kernel memory (CVE-2007-1000, Important). * a flaw in the IPv6 socket option handling that allowed a local user to cause a denial of service (CVE-2007-1388, Important). * a flaw in the utrace support that allowed a local user to cause a denial of service (CVE-2007-0771, Important). In addition to the security issues described above, a fix for a memory leak in the audit subsystem and a fix for a data corruption bug on s390 systems have been included. Red Hat Enterprise Linux 5 users are advised to upgrade to these erratum packages, which are not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at
5. Bug IDs fixed (http://bugzilla.redhat.com/):
228816 - CVE-2007-0771 utrace regression / denial of service 232255 - CVE-2007-1388 NULL pointer dereference in do_ipv6_setsockopt 232257 - CVE-2007-1000 NULL pointer hole in ipv6 233157 - Kernel memory leak in audit subsystem
6. RPMs required:
Red Hat Enterprise Linux Desktop (v. 5 client):
SRPMS: 3c466904fa90211ae8c91ff44e2e3479 kernel-2.6.18-8.1.3.el5.src.rpm
i386: 7f4b16f00764c2194825135f8b45d834 kernel-2.6.18-8.1.3.el5.i686.rpm 18c491ace9f7d997944c8a027ae5c886 kernel-PAE-2.6.18-8.1.3.el5.i686.rpm a8dc403492b46d0caf2a861b481ed75f kernel-PAE-debuginfo-2.6.18-8.1.3.el5.i686.rpm ac75ece38e5454e6e63cad8b78573898 kernel-debuginfo-2.6.18-8.1.3.el5.i686.rpm f6ae46ba6c056f19f28c062a7e163932 kernel-debuginfo-common-2.6.18-8.1.3.el5.i686.rpm 6f136ba7ead0bf5d1f489e21e7fb8908 kernel-headers-2.6.18-8.1.3.el5.i386.rpm 1667b437e4a9e71d7bf464c1b4e09643 kernel-xen-2.6.18-8.1.3.el5.i686.rpm b16322b7b73c1760e397343e22ea3030 kernel-xen-debuginfo-2.6.18-8.1.3.el5.i686.rpm
noarch: 3a7d3de91629f5a1f9ba478b5b0d954b kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
x86_64: 20c52dc29ee42c2fdbf7e5e1ffc656a5 kernel-2.6.18-8.1.3.el5.x86_64.rpm a3517d2020951926db180e94019ee02a kernel-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm a67481bf533c2d506a6c33bf92570cde kernel-debuginfo-common-2.6.18-8.1.3.el5.x86_64.rpm 23016741076b2d003106b9444245b236 kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm 3cc1c159de5f22822ee4b711e7637012 kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm f611dd23d4c0311a0e2537c51acea27e kernel-xen-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
SRPMS: 3c466904fa90211ae8c91ff44e2e3479 kernel-2.6.18-8.1.3.el5.src.rpm
i386: a8dc403492b46d0caf2a861b481ed75f kernel-PAE-debuginfo-2.6.18-8.1.3.el5.i686.rpm 5a85b33458c3da9278d6764ec27db662 kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm ac75ece38e5454e6e63cad8b78573898 kernel-debuginfo-2.6.18-8.1.3.el5.i686.rpm f6ae46ba6c056f19f28c062a7e163932 kernel-debuginfo-common-2.6.18-8.1.3.el5.i686.rpm f3217c3cbd58fe01fbd2ef91861bad1f kernel-devel-2.6.18-8.1.3.el5.i686.rpm b16322b7b73c1760e397343e22ea3030 kernel-xen-debuginfo-2.6.18-8.1.3.el5.i686.rpm 904609f545a4340bd43c4bdae81bf4c9 kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm
x86_64: a3517d2020951926db180e94019ee02a kernel-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm a67481bf533c2d506a6c33bf92570cde kernel-debuginfo-common-2.6.18-8.1.3.el5.x86_64.rpm 151aebb51912d6eff5da61d861e3f13c kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm f611dd23d4c0311a0e2537c51acea27e kernel-xen-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm 029c968689872c95b1d23943219987df kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
SRPMS: 3c466904fa90211ae8c91ff44e2e3479 kernel-2.6.18-8.1.3.el5.src.rpm
i386: 7f4b16f00764c2194825135f8b45d834 kernel-2.6.18-8.1.3.el5.i686.rpm 18c491ace9f7d997944c8a027ae5c886 kernel-PAE-2.6.18-8.1.3.el5.i686.rpm a8dc403492b46d0caf2a861b481ed75f kernel-PAE-debuginfo-2.6.18-8.1.3.el5.i686.rpm 5a85b33458c3da9278d6764ec27db662 kernel-PAE-devel-2.6.18-8.1.3.el5.i686.rpm ac75ece38e5454e6e63cad8b78573898 kernel-debuginfo-2.6.18-8.1.3.el5.i686.rpm f6ae46ba6c056f19f28c062a7e163932 kernel-debuginfo-common-2.6.18-8.1.3.el5.i686.rpm f3217c3cbd58fe01fbd2ef91861bad1f kernel-devel-2.6.18-8.1.3.el5.i686.rpm 6f136ba7ead0bf5d1f489e21e7fb8908 kernel-headers-2.6.18-8.1.3.el5.i386.rpm 1667b437e4a9e71d7bf464c1b4e09643 kernel-xen-2.6.18-8.1.3.el5.i686.rpm b16322b7b73c1760e397343e22ea3030 kernel-xen-debuginfo-2.6.18-8.1.3.el5.i686.rpm 904609f545a4340bd43c4bdae81bf4c9 kernel-xen-devel-2.6.18-8.1.3.el5.i686.rpm
ia64: 15db1e41d717917b4b77be48134f8ba5 kernel-2.6.18-8.1.3.el5.ia64.rpm 45657980c14fd48c0803bb78de14260f kernel-debuginfo-2.6.18-8.1.3.el5.ia64.rpm 96292b202d7f789eb814a879b05d1e0b kernel-debuginfo-common-2.6.18-8.1.3.el5.ia64.rpm d745ba171295dca480b440ddb2982642 kernel-devel-2.6.18-8.1.3.el5.ia64.rpm 26bb0bd6ec743dcf551d069348335064 kernel-headers-2.6.18-8.1.3.el5.ia64.rpm 7d87f21cfccc266f5d6210f72304ffa0 kernel-xen-2.6.18-8.1.3.el5.ia64.rpm 4876f538f9b75e0b980880080100a2e6 kernel-xen-debuginfo-2.6.18-8.1.3.el5.ia64.rpm b5c9d813ed78a30d37a1f9b25160f727 kernel-xen-devel-2.6.18-8.1.3.el5.ia64.rpm
noarch: 3a7d3de91629f5a1f9ba478b5b0d954b kernel-doc-2.6.18-8.1.3.el5.noarch.rpm
ppc: 1251fd856e805c4e2b7257f153dfc83b kernel-2.6.18-8.1.3.el5.ppc64.rpm 52b9a4aacf1ba853a937a67d28b502cd kernel-debuginfo-2.6.18-8.1.3.el5.ppc64.rpm bc2f18102201ec65e0ccf160e2bbf5b2 kernel-debuginfo-common-2.6.18-8.1.3.el5.ppc64.rpm 9f25a700177733b5b98a2a82f8069aa7 kernel-devel-2.6.18-8.1.3.el5.ppc64.rpm 111dd2f2c54487fc31bc0b8996c238c9 kernel-headers-2.6.18-8.1.3.el5.ppc.rpm 71a843834e5c63149d0c4821492c22c1 kernel-headers-2.6.18-8.1.3.el5.ppc64.rpm ddc7f5422532ac2d2861a3ee13aa2852 kernel-kdump-2.6.18-8.1.3.el5.ppc64.rpm a4f633a53462523469a112a89cef7377 kernel-kdump-debuginfo-2.6.18-8.1.3.el5.ppc64.rpm d81cd3aec1759206e26e22f54614b6e0 kernel-kdump-devel-2.6.18-8.1.3.el5.ppc64.rpm
s390x: 906237fa0cfdedea4c691483f7e4c499 kernel-2.6.18-8.1.3.el5.s390x.rpm b3e28935a6640a396863925cac6e27ec kernel-debuginfo-2.6.18-8.1.3.el5.s390x.rpm 398cadf117034831718ee275f4733646 kernel-debuginfo-common-2.6.18-8.1.3.el5.s390x.rpm 6f134d9385e2c3a7b60ea0b373e8d093 kernel-devel-2.6.18-8.1.3.el5.s390x.rpm 7895302f72c5563ce6d1531897ad9dd1 kernel-headers-2.6.18-8.1.3.el5.s390x.rpm
x86_64: 20c52dc29ee42c2fdbf7e5e1ffc656a5 kernel-2.6.18-8.1.3.el5.x86_64.rpm a3517d2020951926db180e94019ee02a kernel-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm a67481bf533c2d506a6c33bf92570cde kernel-debuginfo-common-2.6.18-8.1.3.el5.x86_64.rpm 151aebb51912d6eff5da61d861e3f13c kernel-devel-2.6.18-8.1.3.el5.x86_64.rpm 23016741076b2d003106b9444245b236 kernel-headers-2.6.18-8.1.3.el5.x86_64.rpm 3cc1c159de5f22822ee4b711e7637012 kernel-xen-2.6.18-8.1.3.el5.x86_64.rpm f611dd23d4c0311a0e2537c51acea27e kernel-xen-debuginfo-2.6.18-8.1.3.el5.x86_64.rpm 029c968689872c95b1d23943219987df kernel-xen-devel-2.6.18-8.1.3.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0771 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1000 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1388 http://www.redhat.com/security/updates/classification/#important

Package List


Severity
Advisory ID: RHSA-2007:0169-01
Advisory URL: https://access.redhat.com/errata/RHSA-2007:0169.html
Issued Date: : 2007-04-30
Updated on: 2007-04-30
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-0771 CVE-2007-1000 CVE-2007-1388 Updated kernel packages that fix security issues and bugs in the Red Hat Enterprise Linux 5 kernel are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64

RHEL Desktop Workstation (v. 5 client) - i386, x86_64

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64


Bugs Fixed


Related News