Red Hat 8853 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: kernel security update
Advisory ID: RHSA-2007:0085-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0085.html
Issue date: 2007-02-27
Updated on: 2007-02-27
Product: Red Hat Enterprise Linux
Keywords: nahant kernel update
Obsoletes: RHSA-2007:0014
CVE Names: CVE-2007-0001 CVE-2007-0006
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages that fix two security issues and a bug in the Red Hat
Enterprise Linux 4 kernel are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for two security issues:

* a flaw in the key serial number collision avoidance algorithm of the
keyctl subsystem that allowed a local user to cause a denial of service
(CVE-2007-0006, Important)

* a flaw in the file watch implementation of the audit subsystems that
allowed a local user to cause a denial of service (panic). To exploit this
flaw a privileged user must have previously created a watch for a file
(CVE-2007-0001, Moderate)

In addition to the security issues described above, a fix for the SCTP
subsystem to address a system crash which may be experienced in Telco
environments has been included.

Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to
the packages associated with their machine architecture and configurations
as listed in this erratum.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

223129 - CVE-2007-0001 kernel panic watching /etc/passwd
223818 - kernel panic in sctp module
227495 - CVE-2007-0006 Key serial number collision problem

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-42.0.10.EL.src.rpm
1c365c7e860a5befc863fe3ddcd99348 kernel-2.6.9-42.0.10.EL.src.rpm

i386:
7b18d06a3323f40304e6d2220b814cc9 kernel-2.6.9-42.0.10.EL.i686.rpm
6ec86856eec04bd71b1fe33215a0c0fd kernel-debuginfo-2.6.9-42.0.10.EL.i686.rpm
9fa98cea9b4347f1bb934c955e12777c kernel-devel-2.6.9-42.0.10.EL.i686.rpm
abea2f5ae09397381300f476e1c851d3 kernel-hugemem-2.6.9-42.0.10.EL.i686.rpm
059ef62c55b663de5cf3493f68edb61a kernel-hugemem-devel-2.6.9-42.0.10.EL.i686.rpm
a6b7c14dd615c2ba596218f99d6dc791 kernel-smp-2.6.9-42.0.10.EL.i686.rpm
4eef61b5cafa9decc595a7ad8777dce0 kernel-smp-devel-2.6.9-42.0.10.EL.i686.rpm

ia64:
31e428fd48ade503595dc8d29db7a2b9 kernel-2.6.9-42.0.10.EL.ia64.rpm
54e4ef98367ded5742d321f5cc7fb355 kernel-debuginfo-2.6.9-42.0.10.EL.ia64.rpm
f5cab16944e31dd7638b04338e32a5b7 kernel-devel-2.6.9-42.0.10.EL.ia64.rpm
711277591463504287acbffd0895feba kernel-largesmp-2.6.9-42.0.10.EL.ia64.rpm
626a89962ecce7d2fd0e836e8639f396 kernel-largesmp-devel-2.6.9-42.0.10.EL.ia64.rpm

noarch:
183fe23ac5e8be41adf6c05d81b76555 kernel-doc-2.6.9-42.0.10.EL.noarch.rpm

ppc:
31fed3bedefad58ca137070a474993e3 kernel-2.6.9-42.0.10.EL.ppc64.rpm
12b8793caffe9a8e423c5aae114ab278 kernel-2.6.9-42.0.10.EL.ppc64iseries.rpm
2439f728fa4cc955b3f32e3293cce5f3 kernel-debuginfo-2.6.9-42.0.10.EL.ppc64.rpm
8e4fad77b36cd1ad85d46c6ff4dc1208 kernel-debuginfo-2.6.9-42.0.10.EL.ppc64iseries.rpm
c31267fbcde1bdfa00b01d9c899c919b kernel-devel-2.6.9-42.0.10.EL.ppc64.rpm
ae25e38f5f61abe14d7f4a39125cb225 kernel-devel-2.6.9-42.0.10.EL.ppc64iseries.rpm
6b65bb861d10908820f4790af8e82cd0 kernel-largesmp-2.6.9-42.0.10.EL.ppc64.rpm
a26c7771ca2169f32c5ed60e30c5a487 kernel-largesmp-devel-2.6.9-42.0.10.EL.ppc64.rpm

s390:
ef8c8d9026aa6d070425e156f84a0126 kernel-2.6.9-42.0.10.EL.s390.rpm
e4c0c1858459b58d18d7c6b2d02ef02c kernel-debuginfo-2.6.9-42.0.10.EL.s390.rpm
145f8e9fa674a5971069130bbac83477 kernel-devel-2.6.9-42.0.10.EL.s390.rpm

s390x:
1b26a95bff6b75b5aa159f41e1655c57 kernel-2.6.9-42.0.10.EL.s390x.rpm
cacb81d2e9207105cbbb736281d060ec kernel-debuginfo-2.6.9-42.0.10.EL.s390x.rpm
90c31342fcb6a911fabdbd1f933e87e7 kernel-devel-2.6.9-42.0.10.EL.s390x.rpm

x86_64:
cc5299e4937f5400436ba973bad7f015 kernel-2.6.9-42.0.10.EL.x86_64.rpm
b7feda4cd3d988a19d36b5339de39fdf kernel-debuginfo-2.6.9-42.0.10.EL.x86_64.rpm
69fb41d441f99bd76e785c1a18bbbdf7 kernel-devel-2.6.9-42.0.10.EL.x86_64.rpm
4f5febec6e24716343a059b0f664a93d kernel-largesmp-2.6.9-42.0.10.EL.x86_64.rpm
b4f5e823899006fe7e192afecb908cb1 kernel-largesmp-devel-2.6.9-42.0.10.EL.x86_64.rpm
97db663987ed857dae4d1dac6b4c2eb9 kernel-smp-2.6.9-42.0.10.EL.x86_64.rpm
a761c5d60b8fdff8d06578339c1e6df7 kernel-smp-devel-2.6.9-42.0.10.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-42.0.10.EL.src.rpm
1c365c7e860a5befc863fe3ddcd99348 kernel-2.6.9-42.0.10.EL.src.rpm

i386:
7b18d06a3323f40304e6d2220b814cc9 kernel-2.6.9-42.0.10.EL.i686.rpm
6ec86856eec04bd71b1fe33215a0c0fd kernel-debuginfo-2.6.9-42.0.10.EL.i686.rpm
9fa98cea9b4347f1bb934c955e12777c kernel-devel-2.6.9-42.0.10.EL.i686.rpm
abea2f5ae09397381300f476e1c851d3 kernel-hugemem-2.6.9-42.0.10.EL.i686.rpm
059ef62c55b663de5cf3493f68edb61a kernel-hugemem-devel-2.6.9-42.0.10.EL.i686.rpm
a6b7c14dd615c2ba596218f99d6dc791 kernel-smp-2.6.9-42.0.10.EL.i686.rpm
4eef61b5cafa9decc595a7ad8777dce0 kernel-smp-devel-2.6.9-42.0.10.EL.i686.rpm

noarch:
183fe23ac5e8be41adf6c05d81b76555 kernel-doc-2.6.9-42.0.10.EL.noarch.rpm

x86_64:
cc5299e4937f5400436ba973bad7f015 kernel-2.6.9-42.0.10.EL.x86_64.rpm
b7feda4cd3d988a19d36b5339de39fdf kernel-debuginfo-2.6.9-42.0.10.EL.x86_64.rpm
69fb41d441f99bd76e785c1a18bbbdf7 kernel-devel-2.6.9-42.0.10.EL.x86_64.rpm
4f5febec6e24716343a059b0f664a93d kernel-largesmp-2.6.9-42.0.10.EL.x86_64.rpm
b4f5e823899006fe7e192afecb908cb1 kernel-largesmp-devel-2.6.9-42.0.10.EL.x86_64.rpm
97db663987ed857dae4d1dac6b4c2eb9 kernel-smp-2.6.9-42.0.10.EL.x86_64.rpm
a761c5d60b8fdff8d06578339c1e6df7 kernel-smp-devel-2.6.9-42.0.10.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-42.0.10.EL.src.rpm
1c365c7e860a5befc863fe3ddcd99348 kernel-2.6.9-42.0.10.EL.src.rpm

i386:
7b18d06a3323f40304e6d2220b814cc9 kernel-2.6.9-42.0.10.EL.i686.rpm
6ec86856eec04bd71b1fe33215a0c0fd kernel-debuginfo-2.6.9-42.0.10.EL.i686.rpm
9fa98cea9b4347f1bb934c955e12777c kernel-devel-2.6.9-42.0.10.EL.i686.rpm
abea2f5ae09397381300f476e1c851d3 kernel-hugemem-2.6.9-42.0.10.EL.i686.rpm
059ef62c55b663de5cf3493f68edb61a kernel-hugemem-devel-2.6.9-42.0.10.EL.i686.rpm
a6b7c14dd615c2ba596218f99d6dc791 kernel-smp-2.6.9-42.0.10.EL.i686.rpm
4eef61b5cafa9decc595a7ad8777dce0 kernel-smp-devel-2.6.9-42.0.10.EL.i686.rpm

ia64:
31e428fd48ade503595dc8d29db7a2b9 kernel-2.6.9-42.0.10.EL.ia64.rpm
54e4ef98367ded5742d321f5cc7fb355 kernel-debuginfo-2.6.9-42.0.10.EL.ia64.rpm
f5cab16944e31dd7638b04338e32a5b7 kernel-devel-2.6.9-42.0.10.EL.ia64.rpm
711277591463504287acbffd0895feba kernel-largesmp-2.6.9-42.0.10.EL.ia64.rpm
626a89962ecce7d2fd0e836e8639f396 kernel-largesmp-devel-2.6.9-42.0.10.EL.ia64.rpm

noarch:
183fe23ac5e8be41adf6c05d81b76555 kernel-doc-2.6.9-42.0.10.EL.noarch.rpm

x86_64:
cc5299e4937f5400436ba973bad7f015 kernel-2.6.9-42.0.10.EL.x86_64.rpm
b7feda4cd3d988a19d36b5339de39fdf kernel-debuginfo-2.6.9-42.0.10.EL.x86_64.rpm
69fb41d441f99bd76e785c1a18bbbdf7 kernel-devel-2.6.9-42.0.10.EL.x86_64.rpm
4f5febec6e24716343a059b0f664a93d kernel-largesmp-2.6.9-42.0.10.EL.x86_64.rpm
b4f5e823899006fe7e192afecb908cb1 kernel-largesmp-devel-2.6.9-42.0.10.EL.x86_64.rpm
97db663987ed857dae4d1dac6b4c2eb9 kernel-smp-2.6.9-42.0.10.EL.x86_64.rpm
a761c5d60b8fdff8d06578339c1e6df7 kernel-smp-devel-2.6.9-42.0.10.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-42.0.10.EL.src.rpm
1c365c7e860a5befc863fe3ddcd99348 kernel-2.6.9-42.0.10.EL.src.rpm

i386:
7b18d06a3323f40304e6d2220b814cc9 kernel-2.6.9-42.0.10.EL.i686.rpm
6ec86856eec04bd71b1fe33215a0c0fd kernel-debuginfo-2.6.9-42.0.10.EL.i686.rpm
9fa98cea9b4347f1bb934c955e12777c kernel-devel-2.6.9-42.0.10.EL.i686.rpm
abea2f5ae09397381300f476e1c851d3 kernel-hugemem-2.6.9-42.0.10.EL.i686.rpm
059ef62c55b663de5cf3493f68edb61a kernel-hugemem-devel-2.6.9-42.0.10.EL.i686.rpm
a6b7c14dd615c2ba596218f99d6dc791 kernel-smp-2.6.9-42.0.10.EL.i686.rpm
4eef61b5cafa9decc595a7ad8777dce0 kernel-smp-devel-2.6.9-42.0.10.EL.i686.rpm

ia64:
31e428fd48ade503595dc8d29db7a2b9 kernel-2.6.9-42.0.10.EL.ia64.rpm
54e4ef98367ded5742d321f5cc7fb355 kernel-debuginfo-2.6.9-42.0.10.EL.ia64.rpm
f5cab16944e31dd7638b04338e32a5b7 kernel-devel-2.6.9-42.0.10.EL.ia64.rpm
711277591463504287acbffd0895feba kernel-largesmp-2.6.9-42.0.10.EL.ia64.rpm
626a89962ecce7d2fd0e836e8639f396 kernel-largesmp-devel-2.6.9-42.0.10.EL.ia64.rpm

noarch:
183fe23ac5e8be41adf6c05d81b76555 kernel-doc-2.6.9-42.0.10.EL.noarch.rpm

x86_64:
cc5299e4937f5400436ba973bad7f015 kernel-2.6.9-42.0.10.EL.x86_64.rpm
b7feda4cd3d988a19d36b5339de39fdf kernel-debuginfo-2.6.9-42.0.10.EL.x86_64.rpm
69fb41d441f99bd76e785c1a18bbbdf7 kernel-devel-2.6.9-42.0.10.EL.x86_64.rpm
4f5febec6e24716343a059b0f664a93d kernel-largesmp-2.6.9-42.0.10.EL.x86_64.rpm
b4f5e823899006fe7e192afecb908cb1 kernel-largesmp-devel-2.6.9-42.0.10.EL.x86_64.rpm
97db663987ed857dae4d1dac6b4c2eb9 kernel-smp-2.6.9-42.0.10.EL.x86_64.rpm
a761c5d60b8fdff8d06578339c1e6df7 kernel-smp-devel-2.6.9-42.0.10.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0006
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFF4/HfXlSAg2UNWIIRAg99AKCIpM/pcv0qXPzHSn2L+41esL+y9ACfS824
NFIDu7yIfcdmobGyI9bXml0=
=/pec
-----END PGP SIGNATURE-----