Red Hat 9062 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Moderate: kernel security and bugfix update
Advisory ID: RHSA-2007:0671-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0671.html
Issue date: 2007-08-16
Updated on: 2007-08-16
Product: Red Hat Enterprise Linux
Keywords: taroon kernel security errata
Obsoletes: RHSA-2007:0436
CVE Names: CVE-2007-1217 CVE-2007-1353
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages that fix several security issues and bugs in the
Red Hat Enterprise Linux 3 kernel are now available.

This security advisory has been rated as having moderate security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a
denial of service or potential privilege escalation. (CVE-2007-1217, Moderate)

* a flaw in the Bluetooth subsystem that allowed a local user to trigger an
information leak. (CVE-2007-1353, Low)

In addition to the security issues described above, fixes for the following
have been included:

* a race condition in the e1000 network driver that could cause ESB2
systems to be started without the RX unit being turned on.

* a related e1000 bug on ESB2 systems that could cause rlogin to fail.

Red Hat would like to thank Ilja van Sprundel for reporting an issue fixed
in this erratum.

Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels
to the packages associated with their machine architecture and
configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

231069 - CVE-2007-1217 Overflow in CAPI subsystem
234294 - CVE-2007-1353 Bluetooth setsockopt() information leaks

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-51.EL.src.rpm
3e94648c83b62fb9cc401b53ca5f6096 kernel-2.4.21-51.EL.src.rpm

i386:
1b001b9748c4626e16e3eec657b65e1b kernel-2.4.21-51.EL.athlon.rpm
81412b55ba69d85064b55114fc4cadd3 kernel-2.4.21-51.EL.i686.rpm
45e16d49aa290a4bd0efe33bba627f5b kernel-BOOT-2.4.21-51.EL.i386.rpm
fded238337854d3044eb5004996b36a6 kernel-debuginfo-2.4.21-51.EL.athlon.rpm
db091f1f057aa3aeb3134352151e6246 kernel-debuginfo-2.4.21-51.EL.i386.rpm
953fb8b53bf60d64a250c2d9cd6e956d kernel-debuginfo-2.4.21-51.EL.i686.rpm
32eb10ebb7e3c890cea0da9f49c6d56a kernel-doc-2.4.21-51.EL.i386.rpm
d5bffec510ed2d2c09edb881bcbb19bb kernel-hugemem-2.4.21-51.EL.i686.rpm
9e4729d4981d0f371b9e34d3b04badd6 kernel-hugemem-unsupported-2.4.21-51.EL.i686.rpm
3336bf85d01e863d41a021a348088216 kernel-smp-2.4.21-51.EL.athlon.rpm
b98cf89374f00c81691ee57392b1d768 kernel-smp-2.4.21-51.EL.i686.rpm
f1e7de77a0acbe3d007571d38b84947a kernel-smp-unsupported-2.4.21-51.EL.athlon.rpm
2ad659821179db2f3a78d44ce62990de kernel-smp-unsupported-2.4.21-51.EL.i686.rpm
4a2dcd9e3b3c1db9152f4415e5a1699a kernel-source-2.4.21-51.EL.i386.rpm
6aa9025e30a16389480c4ccadaa9057f kernel-unsupported-2.4.21-51.EL.athlon.rpm
c442a88cf82f11be01e0a335cc3c0856 kernel-unsupported-2.4.21-51.EL.i686.rpm

ia64:
f43eba731b22b5956aabaccff6c70abe kernel-2.4.21-51.EL.ia64.rpm
80ed8856d2713f931b8543926d29d4a8 kernel-debuginfo-2.4.21-51.EL.ia64.rpm
2209a4a2680c0eb7acee8df8d47d4028 kernel-doc-2.4.21-51.EL.ia64.rpm
863b02755f6641944114f052ad3e9a0e kernel-source-2.4.21-51.EL.ia64.rpm
8f84b0001c83b99fddbd28bcde5f806f kernel-unsupported-2.4.21-51.EL.ia64.rpm

ppc:
5da6c0c9a5f0ac9c328fdb4b711299ad kernel-2.4.21-51.EL.ppc64iseries.rpm
f5400b322cfaee4392aaf3771e73d157 kernel-2.4.21-51.EL.ppc64pseries.rpm
01b2f5c1155fb3f0774eda66571b3666 kernel-debuginfo-2.4.21-51.EL.ppc64.rpm
08805438592e26ae2ba699ea1196ee1e kernel-debuginfo-2.4.21-51.EL.ppc64iseries.rpm
fe6024efc0f249d880059deca27a4cf2 kernel-debuginfo-2.4.21-51.EL.ppc64pseries.rpm
5ce4268e6403de5f971457ea229e451d kernel-doc-2.4.21-51.EL.ppc64.rpm
e2cddede0dbeadb64bea2266ed2a0a8d kernel-source-2.4.21-51.EL.ppc64.rpm
08561aeefce58d9a685da5da95118348 kernel-unsupported-2.4.21-51.EL.ppc64iseries.rpm
41003f17bf7da307c97b2c754a4b5621 kernel-unsupported-2.4.21-51.EL.ppc64pseries.rpm

s390:
18e99d6dd147612fa221ed6c64345ed7 kernel-2.4.21-51.EL.s390.rpm
98808ddf3c5566588819ef8fc9eae930 kernel-debuginfo-2.4.21-51.EL.s390.rpm
c0061a5cae943a826d56e996a22d4c1b kernel-doc-2.4.21-51.EL.s390.rpm
1e94e756a1ad2778f384639abeaac3cf kernel-source-2.4.21-51.EL.s390.rpm
3125a4e5c820acb28307d5dd1d8b624a kernel-unsupported-2.4.21-51.EL.s390.rpm

s390x:
86cc02e371c1253ec2fa7ba31cb17595 kernel-2.4.21-51.EL.s390x.rpm
fcf253f707acf26b668444f426c792d2 kernel-debuginfo-2.4.21-51.EL.s390x.rpm
a49b8aed89e64f29505369bde2ea7e62 kernel-doc-2.4.21-51.EL.s390x.rpm
62d185eb16102d2aa8d2a82601d8768e kernel-source-2.4.21-51.EL.s390x.rpm
5968a0d4b0a129445ee801b82f3c2321 kernel-unsupported-2.4.21-51.EL.s390x.rpm

x86_64:
a2c87d889cbd620e5ef6012dd565785f kernel-2.4.21-51.EL.ia32e.rpm
6be6ea30748554962f126c81441768ed kernel-2.4.21-51.EL.x86_64.rpm
572777549a1530d34b8cc1c66e715471 kernel-debuginfo-2.4.21-51.EL.ia32e.rpm
9d1251676ba50ba4b4ba80b4b18d2ec4 kernel-debuginfo-2.4.21-51.EL.x86_64.rpm
21c16e560705f14421a1d669a27a54df kernel-doc-2.4.21-51.EL.x86_64.rpm
aecd821b741c859535a6e2e6cf3ab0f5 kernel-smp-2.4.21-51.EL.x86_64.rpm
70a8d74ffc53e619fd8948ae76309f1b kernel-smp-unsupported-2.4.21-51.EL.x86_64.rpm
66cbc0771e3be71408cae29636881ca7 kernel-source-2.4.21-51.EL.x86_64.rpm
13078e7d42ad160d1c304f722ac0f721 kernel-unsupported-2.4.21-51.EL.ia32e.rpm
ca57b82d95a3f1c3b32e632175f46898 kernel-unsupported-2.4.21-51.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-51.EL.src.rpm
3e94648c83b62fb9cc401b53ca5f6096 kernel-2.4.21-51.EL.src.rpm

i386:
1b001b9748c4626e16e3eec657b65e1b kernel-2.4.21-51.EL.athlon.rpm
81412b55ba69d85064b55114fc4cadd3 kernel-2.4.21-51.EL.i686.rpm
45e16d49aa290a4bd0efe33bba627f5b kernel-BOOT-2.4.21-51.EL.i386.rpm
fded238337854d3044eb5004996b36a6 kernel-debuginfo-2.4.21-51.EL.athlon.rpm
db091f1f057aa3aeb3134352151e6246 kernel-debuginfo-2.4.21-51.EL.i386.rpm
953fb8b53bf60d64a250c2d9cd6e956d kernel-debuginfo-2.4.21-51.EL.i686.rpm
32eb10ebb7e3c890cea0da9f49c6d56a kernel-doc-2.4.21-51.EL.i386.rpm
d5bffec510ed2d2c09edb881bcbb19bb kernel-hugemem-2.4.21-51.EL.i686.rpm
9e4729d4981d0f371b9e34d3b04badd6 kernel-hugemem-unsupported-2.4.21-51.EL.i686.rpm
3336bf85d01e863d41a021a348088216 kernel-smp-2.4.21-51.EL.athlon.rpm
b98cf89374f00c81691ee57392b1d768 kernel-smp-2.4.21-51.EL.i686.rpm
f1e7de77a0acbe3d007571d38b84947a kernel-smp-unsupported-2.4.21-51.EL.athlon.rpm
2ad659821179db2f3a78d44ce62990de kernel-smp-unsupported-2.4.21-51.EL.i686.rpm
4a2dcd9e3b3c1db9152f4415e5a1699a kernel-source-2.4.21-51.EL.i386.rpm
6aa9025e30a16389480c4ccadaa9057f kernel-unsupported-2.4.21-51.EL.athlon.rpm
c442a88cf82f11be01e0a335cc3c0856 kernel-unsupported-2.4.21-51.EL.i686.rpm

x86_64:
a2c87d889cbd620e5ef6012dd565785f kernel-2.4.21-51.EL.ia32e.rpm
6be6ea30748554962f126c81441768ed kernel-2.4.21-51.EL.x86_64.rpm
572777549a1530d34b8cc1c66e715471 kernel-debuginfo-2.4.21-51.EL.ia32e.rpm
9d1251676ba50ba4b4ba80b4b18d2ec4 kernel-debuginfo-2.4.21-51.EL.x86_64.rpm
21c16e560705f14421a1d669a27a54df kernel-doc-2.4.21-51.EL.x86_64.rpm
aecd821b741c859535a6e2e6cf3ab0f5 kernel-smp-2.4.21-51.EL.x86_64.rpm
70a8d74ffc53e619fd8948ae76309f1b kernel-smp-unsupported-2.4.21-51.EL.x86_64.rpm
66cbc0771e3be71408cae29636881ca7 kernel-source-2.4.21-51.EL.x86_64.rpm
13078e7d42ad160d1c304f722ac0f721 kernel-unsupported-2.4.21-51.EL.ia32e.rpm
ca57b82d95a3f1c3b32e632175f46898 kernel-unsupported-2.4.21-51.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-51.EL.src.rpm
3e94648c83b62fb9cc401b53ca5f6096 kernel-2.4.21-51.EL.src.rpm

i386:
1b001b9748c4626e16e3eec657b65e1b kernel-2.4.21-51.EL.athlon.rpm
81412b55ba69d85064b55114fc4cadd3 kernel-2.4.21-51.EL.i686.rpm
45e16d49aa290a4bd0efe33bba627f5b kernel-BOOT-2.4.21-51.EL.i386.rpm
fded238337854d3044eb5004996b36a6 kernel-debuginfo-2.4.21-51.EL.athlon.rpm
db091f1f057aa3aeb3134352151e6246 kernel-debuginfo-2.4.21-51.EL.i386.rpm
953fb8b53bf60d64a250c2d9cd6e956d kernel-debuginfo-2.4.21-51.EL.i686.rpm
32eb10ebb7e3c890cea0da9f49c6d56a kernel-doc-2.4.21-51.EL.i386.rpm
d5bffec510ed2d2c09edb881bcbb19bb kernel-hugemem-2.4.21-51.EL.i686.rpm
9e4729d4981d0f371b9e34d3b04badd6 kernel-hugemem-unsupported-2.4.21-51.EL.i686.rpm
3336bf85d01e863d41a021a348088216 kernel-smp-2.4.21-51.EL.athlon.rpm
b98cf89374f00c81691ee57392b1d768 kernel-smp-2.4.21-51.EL.i686.rpm
f1e7de77a0acbe3d007571d38b84947a kernel-smp-unsupported-2.4.21-51.EL.athlon.rpm
2ad659821179db2f3a78d44ce62990de kernel-smp-unsupported-2.4.21-51.EL.i686.rpm
4a2dcd9e3b3c1db9152f4415e5a1699a kernel-source-2.4.21-51.EL.i386.rpm
6aa9025e30a16389480c4ccadaa9057f kernel-unsupported-2.4.21-51.EL.athlon.rpm
c442a88cf82f11be01e0a335cc3c0856 kernel-unsupported-2.4.21-51.EL.i686.rpm

ia64:
f43eba731b22b5956aabaccff6c70abe kernel-2.4.21-51.EL.ia64.rpm
80ed8856d2713f931b8543926d29d4a8 kernel-debuginfo-2.4.21-51.EL.ia64.rpm
2209a4a2680c0eb7acee8df8d47d4028 kernel-doc-2.4.21-51.EL.ia64.rpm
863b02755f6641944114f052ad3e9a0e kernel-source-2.4.21-51.EL.ia64.rpm
8f84b0001c83b99fddbd28bcde5f806f kernel-unsupported-2.4.21-51.EL.ia64.rpm

x86_64:
a2c87d889cbd620e5ef6012dd565785f kernel-2.4.21-51.EL.ia32e.rpm
6be6ea30748554962f126c81441768ed kernel-2.4.21-51.EL.x86_64.rpm
572777549a1530d34b8cc1c66e715471 kernel-debuginfo-2.4.21-51.EL.ia32e.rpm
9d1251676ba50ba4b4ba80b4b18d2ec4 kernel-debuginfo-2.4.21-51.EL.x86_64.rpm
21c16e560705f14421a1d669a27a54df kernel-doc-2.4.21-51.EL.x86_64.rpm
aecd821b741c859535a6e2e6cf3ab0f5 kernel-smp-2.4.21-51.EL.x86_64.rpm
70a8d74ffc53e619fd8948ae76309f1b kernel-smp-unsupported-2.4.21-51.EL.x86_64.rpm
66cbc0771e3be71408cae29636881ca7 kernel-source-2.4.21-51.EL.x86_64.rpm
13078e7d42ad160d1c304f722ac0f721 kernel-unsupported-2.4.21-51.EL.ia32e.rpm
ca57b82d95a3f1c3b32e632175f46898 kernel-unsupported-2.4.21-51.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-51.EL.src.rpm
3e94648c83b62fb9cc401b53ca5f6096 kernel-2.4.21-51.EL.src.rpm

i386:
1b001b9748c4626e16e3eec657b65e1b kernel-2.4.21-51.EL.athlon.rpm
81412b55ba69d85064b55114fc4cadd3 kernel-2.4.21-51.EL.i686.rpm
45e16d49aa290a4bd0efe33bba627f5b kernel-BOOT-2.4.21-51.EL.i386.rpm
fded238337854d3044eb5004996b36a6 kernel-debuginfo-2.4.21-51.EL.athlon.rpm
db091f1f057aa3aeb3134352151e6246 kernel-debuginfo-2.4.21-51.EL.i386.rpm
953fb8b53bf60d64a250c2d9cd6e956d kernel-debuginfo-2.4.21-51.EL.i686.rpm
32eb10ebb7e3c890cea0da9f49c6d56a kernel-doc-2.4.21-51.EL.i386.rpm
d5bffec510ed2d2c09edb881bcbb19bb kernel-hugemem-2.4.21-51.EL.i686.rpm
9e4729d4981d0f371b9e34d3b04badd6 kernel-hugemem-unsupported-2.4.21-51.EL.i686.rpm
3336bf85d01e863d41a021a348088216 kernel-smp-2.4.21-51.EL.athlon.rpm
b98cf89374f00c81691ee57392b1d768 kernel-smp-2.4.21-51.EL.i686.rpm
f1e7de77a0acbe3d007571d38b84947a kernel-smp-unsupported-2.4.21-51.EL.athlon.rpm
2ad659821179db2f3a78d44ce62990de kernel-smp-unsupported-2.4.21-51.EL.i686.rpm
4a2dcd9e3b3c1db9152f4415e5a1699a kernel-source-2.4.21-51.EL.i386.rpm
6aa9025e30a16389480c4ccadaa9057f kernel-unsupported-2.4.21-51.EL.athlon.rpm
c442a88cf82f11be01e0a335cc3c0856 kernel-unsupported-2.4.21-51.EL.i686.rpm

ia64:
f43eba731b22b5956aabaccff6c70abe kernel-2.4.21-51.EL.ia64.rpm
80ed8856d2713f931b8543926d29d4a8 kernel-debuginfo-2.4.21-51.EL.ia64.rpm
2209a4a2680c0eb7acee8df8d47d4028 kernel-doc-2.4.21-51.EL.ia64.rpm
863b02755f6641944114f052ad3e9a0e kernel-source-2.4.21-51.EL.ia64.rpm
8f84b0001c83b99fddbd28bcde5f806f kernel-unsupported-2.4.21-51.EL.ia64.rpm

x86_64:
a2c87d889cbd620e5ef6012dd565785f kernel-2.4.21-51.EL.ia32e.rpm
6be6ea30748554962f126c81441768ed kernel-2.4.21-51.EL.x86_64.rpm
572777549a1530d34b8cc1c66e715471 kernel-debuginfo-2.4.21-51.EL.ia32e.rpm
9d1251676ba50ba4b4ba80b4b18d2ec4 kernel-debuginfo-2.4.21-51.EL.x86_64.rpm
21c16e560705f14421a1d669a27a54df kernel-doc-2.4.21-51.EL.x86_64.rpm
aecd821b741c859535a6e2e6cf3ab0f5 kernel-smp-2.4.21-51.EL.x86_64.rpm
70a8d74ffc53e619fd8948ae76309f1b kernel-smp-unsupported-2.4.21-51.EL.x86_64.rpm
66cbc0771e3be71408cae29636881ca7 kernel-source-2.4.21-51.EL.x86_64.rpm
13078e7d42ad160d1c304f722ac0f721 kernel-unsupported-2.4.21-51.EL.ia32e.rpm
ca57b82d95a3f1c3b32e632175f46898 kernel-unsupported-2.4.21-51.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1353
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGxB/yXlSAg2UNWIIRAuz8AJoDfmeOASkJPPZGe7MTwM9k4lU0TQCglp5/
SU92SN7NS47OjUUSedWqIpM=
=hMKB
-----END PGP SIGNATURE-----