Red Hat 9037 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: Updated kernel packages for Red Hat Enterprise Linux 3 Update 9
Advisory ID: RHSA-2007:0436-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0436.html
Issue date: 2007-06-07
Updated on: 2007-06-11
Product: Red Hat Enterprise Linux
Keywords: taroon kernel update
Obsoletes: RHSA-2006:0710
CVE Names: CVE-2006-5823 CVE-2006-6054 CVE-2007-1592
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 3. This is the ninth
regular update.

This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the ninth regular kernel update to Red Hat Enterprise Linux 3.

There were no new features introduced by this update. The only changes
that have been included address critical customer needs or security
issues (elaborated below).

Key areas affected by fixes in this update include the networking
subsystem, dcache handling, the ext2 and ext3 file systems, the USB
subsystem, ACPI handling, and the audit subsystem. There were also
several isolated fixes in the tg3, e1000, megaraid_sas, and aacraid
device drivers.

The following security bugs were fixed in this update:

* a flaw in the cramfs file system that allowed invalid compressed
data to cause memory corruption (CVE-2006-5823, low)

* a flaw in the ext2 file system that allowed an invalid inode size
to cause a denial of service (system hang) (CVE-2006-6054, low)

* a flaw in IPV6 flow label handling that allowed a local user to
cause a denial of service (crash) (CVE-2007-1592, important)

Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

128616 - acl permissions over nfs
137374 - Need fix for: [NETFILTER]: Fix checksum bug for multicast/broadcast packets on postrouting hook.
144794 - tg3 driver on BCM5703X won't load. Says tg3: Could not obtain valid ethernet address, aborting.
164855 - u5 patch that turned on Dprintk's in arch/x86_64/kernel/smpboot.c
171007 - powermate module does not recognize Griffin Powermate device
173350 - jbd I/O errors after ext3 orphan processing on readonly device
177300 - hugetlb_get_unmapped_area may overflow in X86_64 compat mode
189052 - Kernel panic on shutdown or poweroff on SMP
192796 - cut/paste bug in kscand
199542 - Data corruption after IO error on swap (RHEL3)
209154 - High speed USB HID devices not working in RHEL3
216960 - CVE-2006-5823 zlib_inflate memory corruption
217022 - CVE-2006-6054 ext2_check_page denial of service
217930 - [RHEL3] Netdump for 8139cp driver
224600 - running 32-bit executables on x86_64/ia64/s390x causes negative "vm_committed_space" value
226895 - Kernel oops when loading ipmi_si module
231912 - Laus doesn't audit detach event
232221 - Laus dev.audit.attach-all doesn't attach to init
232336 - Enable use of PAL_HALT_LIGHT for idle loop as non-default option
233262 - ipv6 OOPS triggerable by any user

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm
c79722a872a08eb82398a58749f270cf kernel-2.4.21-50.EL.src.rpm

i386:
7cfbe7d0110e0c1381b73177104119ec kernel-2.4.21-50.EL.athlon.rpm
7203347beb0c4659f63bebb1e487b009 kernel-2.4.21-50.EL.i686.rpm
5c994b0987b31010cb0a825e022aee84 kernel-BOOT-2.4.21-50.EL.i386.rpm
fae1d5c55370b3247bdaeb8c554d0ce5 kernel-debuginfo-2.4.21-50.EL.athlon.rpm
aba8af6dc7681e0ec6296478caa5afbe kernel-debuginfo-2.4.21-50.EL.i386.rpm
dfeb338d473d9f4ea25e4c5f009f93a4 kernel-debuginfo-2.4.21-50.EL.i686.rpm
277167db623567d2772f53c9442aab79 kernel-doc-2.4.21-50.EL.i386.rpm
fe20ef598810be1ee1eb5a7b34994e63 kernel-hugemem-2.4.21-50.EL.i686.rpm
4c19a2a12f011afbcf8ee09dfe19d9b5 kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm
1ceae1fcc0a9d53ee80ca959f077d1bf kernel-smp-2.4.21-50.EL.athlon.rpm
71e88c7296ff3dacdccfdac4e3071df2 kernel-smp-2.4.21-50.EL.i686.rpm
59b44b72919e9aa6ca57bd5eaafd686b kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm
57239b02735863035421e6b4f9152790 kernel-smp-unsupported-2.4.21-50.EL.i686.rpm
2e0d8c5c9d320ba251483de4ebb30d68 kernel-source-2.4.21-50.EL.i386.rpm
1543ab5008587ee48e77f6ff55e3b69e kernel-unsupported-2.4.21-50.EL.athlon.rpm
f6b4df392ef5cdc8760377f802d8d0d8 kernel-unsupported-2.4.21-50.EL.i686.rpm

ia64:
4ecbfd266438b2f64846b583608886f3 kernel-2.4.21-50.EL.ia64.rpm
26e27e76ff1b0034115ea29ed665f5d3 kernel-debuginfo-2.4.21-50.EL.ia64.rpm
29ad4e24dbfdfdc3898ed12a960c7fac kernel-doc-2.4.21-50.EL.ia64.rpm
bc1684ae959c30fa809b0ed9304b0aad kernel-source-2.4.21-50.EL.ia64.rpm
cde442e6c7fba9087ac7c92ee40748e3 kernel-unsupported-2.4.21-50.EL.ia64.rpm

ppc:
2f7744a0ce4d5828b24dfb11f3582f62 kernel-2.4.21-50.EL.ppc64iseries.rpm
0deb3e0d8635dd62587ab8cc5dd15b4f kernel-2.4.21-50.EL.ppc64pseries.rpm
e5fcea12133e5a85b23ae7cf828293c1 kernel-debuginfo-2.4.21-50.EL.ppc64.rpm
c7ecd608935b1b1207f35d1b8b9cb034 kernel-debuginfo-2.4.21-50.EL.ppc64iseries.rpm
7217c44962ebcd635ac4db43cd85ece5 kernel-debuginfo-2.4.21-50.EL.ppc64pseries.rpm
b72e3d9dfbcdc60ef35784860f1aefe7 kernel-doc-2.4.21-50.EL.ppc64.rpm
e066a029b086eca8621082f6113aca8b kernel-source-2.4.21-50.EL.ppc64.rpm
ade7659061ea001fc8dccf356350584e kernel-unsupported-2.4.21-50.EL.ppc64iseries.rpm
908c4d68a46a7731a639efde75bfe8be kernel-unsupported-2.4.21-50.EL.ppc64pseries.rpm

s390:
7cc098163ea8521e71fa5cb9599e430a kernel-2.4.21-50.EL.s390.rpm
f471fbb4022ea086cb3dd9715be0904e kernel-debuginfo-2.4.21-50.EL.s390.rpm
8d4aede1a46ed6da1e6162cc67cb13ce kernel-doc-2.4.21-50.EL.s390.rpm
f57c2055269270541629220914a7bfd1 kernel-source-2.4.21-50.EL.s390.rpm
9bd2949e1681035d8d9ae7667a09a43b kernel-unsupported-2.4.21-50.EL.s390.rpm

s390x:
76811eb47f700e3abb5058b271db6098 kernel-2.4.21-50.EL.s390x.rpm
a4767cbfb6887b6d538a9380aecd6478 kernel-debuginfo-2.4.21-50.EL.s390x.rpm
349a97363d9b77d2397f59bf1719cc80 kernel-doc-2.4.21-50.EL.s390x.rpm
cf755ee59b7fa3e5cc50267eae6efb3d kernel-source-2.4.21-50.EL.s390x.rpm
3b4a567c303cd51b61e9f77dc2eea76a kernel-unsupported-2.4.21-50.EL.s390x.rpm

x86_64:
da285ae8b8a1d4dc3fe0411861488119 kernel-2.4.21-50.EL.ia32e.rpm
5f7e05a4ca91441fdd52d79da1886dfe kernel-2.4.21-50.EL.x86_64.rpm
9e2be2ea882e105ea3926d41bf1442be kernel-debuginfo-2.4.21-50.EL.ia32e.rpm
a7b578a947b841e1334135c97fa0d390 kernel-debuginfo-2.4.21-50.EL.x86_64.rpm
fe43cb360a3130855db0404bda411cd1 kernel-doc-2.4.21-50.EL.x86_64.rpm
6ca6c1e84c6f11ac9dc40c27d40b9473 kernel-smp-2.4.21-50.EL.x86_64.rpm
9d3594ab2e34a316668685dbe2ed4511 kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm
5e2951403ef3036cd82b70fc91e86100 kernel-source-2.4.21-50.EL.x86_64.rpm
372d28ebf73a915bb4fdf8b4433910ac kernel-unsupported-2.4.21-50.EL.ia32e.rpm
90fb18a58a605af3337fcaf7e69b8010 kernel-unsupported-2.4.21-50.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm
c79722a872a08eb82398a58749f270cf kernel-2.4.21-50.EL.src.rpm

i386:
7cfbe7d0110e0c1381b73177104119ec kernel-2.4.21-50.EL.athlon.rpm
7203347beb0c4659f63bebb1e487b009 kernel-2.4.21-50.EL.i686.rpm
5c994b0987b31010cb0a825e022aee84 kernel-BOOT-2.4.21-50.EL.i386.rpm
fae1d5c55370b3247bdaeb8c554d0ce5 kernel-debuginfo-2.4.21-50.EL.athlon.rpm
aba8af6dc7681e0ec6296478caa5afbe kernel-debuginfo-2.4.21-50.EL.i386.rpm
dfeb338d473d9f4ea25e4c5f009f93a4 kernel-debuginfo-2.4.21-50.EL.i686.rpm
277167db623567d2772f53c9442aab79 kernel-doc-2.4.21-50.EL.i386.rpm
fe20ef598810be1ee1eb5a7b34994e63 kernel-hugemem-2.4.21-50.EL.i686.rpm
4c19a2a12f011afbcf8ee09dfe19d9b5 kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm
1ceae1fcc0a9d53ee80ca959f077d1bf kernel-smp-2.4.21-50.EL.athlon.rpm
71e88c7296ff3dacdccfdac4e3071df2 kernel-smp-2.4.21-50.EL.i686.rpm
59b44b72919e9aa6ca57bd5eaafd686b kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm
57239b02735863035421e6b4f9152790 kernel-smp-unsupported-2.4.21-50.EL.i686.rpm
2e0d8c5c9d320ba251483de4ebb30d68 kernel-source-2.4.21-50.EL.i386.rpm
1543ab5008587ee48e77f6ff55e3b69e kernel-unsupported-2.4.21-50.EL.athlon.rpm
f6b4df392ef5cdc8760377f802d8d0d8 kernel-unsupported-2.4.21-50.EL.i686.rpm

x86_64:
da285ae8b8a1d4dc3fe0411861488119 kernel-2.4.21-50.EL.ia32e.rpm
5f7e05a4ca91441fdd52d79da1886dfe kernel-2.4.21-50.EL.x86_64.rpm
9e2be2ea882e105ea3926d41bf1442be kernel-debuginfo-2.4.21-50.EL.ia32e.rpm
a7b578a947b841e1334135c97fa0d390 kernel-debuginfo-2.4.21-50.EL.x86_64.rpm
fe43cb360a3130855db0404bda411cd1 kernel-doc-2.4.21-50.EL.x86_64.rpm
6ca6c1e84c6f11ac9dc40c27d40b9473 kernel-smp-2.4.21-50.EL.x86_64.rpm
9d3594ab2e34a316668685dbe2ed4511 kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm
5e2951403ef3036cd82b70fc91e86100 kernel-source-2.4.21-50.EL.x86_64.rpm
372d28ebf73a915bb4fdf8b4433910ac kernel-unsupported-2.4.21-50.EL.ia32e.rpm
90fb18a58a605af3337fcaf7e69b8010 kernel-unsupported-2.4.21-50.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm
c79722a872a08eb82398a58749f270cf kernel-2.4.21-50.EL.src.rpm

i386:
7cfbe7d0110e0c1381b73177104119ec kernel-2.4.21-50.EL.athlon.rpm
7203347beb0c4659f63bebb1e487b009 kernel-2.4.21-50.EL.i686.rpm
5c994b0987b31010cb0a825e022aee84 kernel-BOOT-2.4.21-50.EL.i386.rpm
fae1d5c55370b3247bdaeb8c554d0ce5 kernel-debuginfo-2.4.21-50.EL.athlon.rpm
aba8af6dc7681e0ec6296478caa5afbe kernel-debuginfo-2.4.21-50.EL.i386.rpm
dfeb338d473d9f4ea25e4c5f009f93a4 kernel-debuginfo-2.4.21-50.EL.i686.rpm
277167db623567d2772f53c9442aab79 kernel-doc-2.4.21-50.EL.i386.rpm
fe20ef598810be1ee1eb5a7b34994e63 kernel-hugemem-2.4.21-50.EL.i686.rpm
4c19a2a12f011afbcf8ee09dfe19d9b5 kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm
1ceae1fcc0a9d53ee80ca959f077d1bf kernel-smp-2.4.21-50.EL.athlon.rpm
71e88c7296ff3dacdccfdac4e3071df2 kernel-smp-2.4.21-50.EL.i686.rpm
59b44b72919e9aa6ca57bd5eaafd686b kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm
57239b02735863035421e6b4f9152790 kernel-smp-unsupported-2.4.21-50.EL.i686.rpm
2e0d8c5c9d320ba251483de4ebb30d68 kernel-source-2.4.21-50.EL.i386.rpm
1543ab5008587ee48e77f6ff55e3b69e kernel-unsupported-2.4.21-50.EL.athlon.rpm
f6b4df392ef5cdc8760377f802d8d0d8 kernel-unsupported-2.4.21-50.EL.i686.rpm

ia64:
4ecbfd266438b2f64846b583608886f3 kernel-2.4.21-50.EL.ia64.rpm
26e27e76ff1b0034115ea29ed665f5d3 kernel-debuginfo-2.4.21-50.EL.ia64.rpm
29ad4e24dbfdfdc3898ed12a960c7fac kernel-doc-2.4.21-50.EL.ia64.rpm
bc1684ae959c30fa809b0ed9304b0aad kernel-source-2.4.21-50.EL.ia64.rpm
cde442e6c7fba9087ac7c92ee40748e3 kernel-unsupported-2.4.21-50.EL.ia64.rpm

x86_64:
da285ae8b8a1d4dc3fe0411861488119 kernel-2.4.21-50.EL.ia32e.rpm
5f7e05a4ca91441fdd52d79da1886dfe kernel-2.4.21-50.EL.x86_64.rpm
9e2be2ea882e105ea3926d41bf1442be kernel-debuginfo-2.4.21-50.EL.ia32e.rpm
a7b578a947b841e1334135c97fa0d390 kernel-debuginfo-2.4.21-50.EL.x86_64.rpm
fe43cb360a3130855db0404bda411cd1 kernel-doc-2.4.21-50.EL.x86_64.rpm
6ca6c1e84c6f11ac9dc40c27d40b9473 kernel-smp-2.4.21-50.EL.x86_64.rpm
9d3594ab2e34a316668685dbe2ed4511 kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm
5e2951403ef3036cd82b70fc91e86100 kernel-source-2.4.21-50.EL.x86_64.rpm
372d28ebf73a915bb4fdf8b4433910ac kernel-unsupported-2.4.21-50.EL.ia32e.rpm
90fb18a58a605af3337fcaf7e69b8010 kernel-unsupported-2.4.21-50.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-50.EL.src.rpm
c79722a872a08eb82398a58749f270cf kernel-2.4.21-50.EL.src.rpm

i386:
7cfbe7d0110e0c1381b73177104119ec kernel-2.4.21-50.EL.athlon.rpm
7203347beb0c4659f63bebb1e487b009 kernel-2.4.21-50.EL.i686.rpm
5c994b0987b31010cb0a825e022aee84 kernel-BOOT-2.4.21-50.EL.i386.rpm
fae1d5c55370b3247bdaeb8c554d0ce5 kernel-debuginfo-2.4.21-50.EL.athlon.rpm
aba8af6dc7681e0ec6296478caa5afbe kernel-debuginfo-2.4.21-50.EL.i386.rpm
dfeb338d473d9f4ea25e4c5f009f93a4 kernel-debuginfo-2.4.21-50.EL.i686.rpm
277167db623567d2772f53c9442aab79 kernel-doc-2.4.21-50.EL.i386.rpm
fe20ef598810be1ee1eb5a7b34994e63 kernel-hugemem-2.4.21-50.EL.i686.rpm
4c19a2a12f011afbcf8ee09dfe19d9b5 kernel-hugemem-unsupported-2.4.21-50.EL.i686.rpm
1ceae1fcc0a9d53ee80ca959f077d1bf kernel-smp-2.4.21-50.EL.athlon.rpm
71e88c7296ff3dacdccfdac4e3071df2 kernel-smp-2.4.21-50.EL.i686.rpm
59b44b72919e9aa6ca57bd5eaafd686b kernel-smp-unsupported-2.4.21-50.EL.athlon.rpm
57239b02735863035421e6b4f9152790 kernel-smp-unsupported-2.4.21-50.EL.i686.rpm
2e0d8c5c9d320ba251483de4ebb30d68 kernel-source-2.4.21-50.EL.i386.rpm
1543ab5008587ee48e77f6ff55e3b69e kernel-unsupported-2.4.21-50.EL.athlon.rpm
f6b4df392ef5cdc8760377f802d8d0d8 kernel-unsupported-2.4.21-50.EL.i686.rpm

ia64:
4ecbfd266438b2f64846b583608886f3 kernel-2.4.21-50.EL.ia64.rpm
26e27e76ff1b0034115ea29ed665f5d3 kernel-debuginfo-2.4.21-50.EL.ia64.rpm
29ad4e24dbfdfdc3898ed12a960c7fac kernel-doc-2.4.21-50.EL.ia64.rpm
bc1684ae959c30fa809b0ed9304b0aad kernel-source-2.4.21-50.EL.ia64.rpm
cde442e6c7fba9087ac7c92ee40748e3 kernel-unsupported-2.4.21-50.EL.ia64.rpm

x86_64:
da285ae8b8a1d4dc3fe0411861488119 kernel-2.4.21-50.EL.ia32e.rpm
5f7e05a4ca91441fdd52d79da1886dfe kernel-2.4.21-50.EL.x86_64.rpm
9e2be2ea882e105ea3926d41bf1442be kernel-debuginfo-2.4.21-50.EL.ia32e.rpm
a7b578a947b841e1334135c97fa0d390 kernel-debuginfo-2.4.21-50.EL.x86_64.rpm
fe43cb360a3130855db0404bda411cd1 kernel-doc-2.4.21-50.EL.x86_64.rpm
6ca6c1e84c6f11ac9dc40c27d40b9473 kernel-smp-2.4.21-50.EL.x86_64.rpm
9d3594ab2e34a316668685dbe2ed4511 kernel-smp-unsupported-2.4.21-50.EL.x86_64.rpm
5e2951403ef3036cd82b70fc91e86100 kernel-source-2.4.21-50.EL.x86_64.rpm
372d28ebf73a915bb4fdf8b4433910ac kernel-unsupported-2.4.21-50.EL.ia32e.rpm
90fb18a58a605af3337fcaf7e69b8010 kernel-unsupported-2.4.21-50.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGbYwhXlSAg2UNWIIRAu21AJ4u7MYtxy5/U0mOX2xTWtLf2sy+rACeN9zM
+sZgNmsh32K6L0l5/v0eeOI=
=Omh9
-----END PGP SIGNATURE-----