A new update is available for Red Hat Enterprise Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Important: kernel security update
Advisory ID: RHSA-2007:0673-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0673.html
Issue date: 2007-08-08
Updated on: 2007-08-08
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-6054 CVE-2007-1217 CVE-2007-1592
CVE-2007-1353
- ---------------------------------------------------------------------
1. Summary:
Updated kernel packages that fix a number of security issues are now
available for Red Hat Enterprise Linux 2.1 (64-bit architectures).
This security advisory has been rated as having important security impact by
the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
3. Problem description:
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described
below:
* a flaw in IPV6 flow label handling that allowed a local user to
cause a denial of service (crash). (CVE-2007-1592, Important)
* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a
denial of service or potential privilege escalation. (CVE-2007-1217, Moderate)
* a flaw in the Bluetooth subsystem that allowed a local user to trigger an
information leak. (CVE-2007-1353, Low)
* a flaw in the supported filesystems that allowed a local privileged user
to cause a denial of service. (CVE-2006-6054, Low)
Red Hat would like to thank Ilja van Sprundel for reporting an issue fixed
in this erratum.
All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to these updated packages, which contain backported fixes to correct these
issues.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
5. Bug IDs fixed (http://bugzilla.redhat.com/):
217024 - CVE-2006-6054 ext2_check_page denial of service
231071 - CVE-2007-1217 Overflow in CAPI subsystem
233484 - CVE-2007-1592 IPv6 oops triggerable by any user
234296 - CVE-2007-1353 Bluetooth setsockopt() information leaks
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.18-e.65.src.rpm
92ccbe1005a2ad74fffc3e944f5d19c2 kernel-2.4.18-e.65.src.rpm
ia64:
8e5d03bf4e79cf7b0cfd6911d3667160 kernel-2.4.18-e.65.ia64.rpm
d82cbe75c5f32bff36a65d5a5d52a0ee kernel-doc-2.4.18-e.65.ia64.rpm
6093b3a6bae88873c8f0f13755d5eb47 kernel-smp-2.4.18-e.65.ia64.rpm
72346a0b751537cc181f226caed806bb kernel-source-2.4.18-e.65.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/kernel-2.4.18-e.65.src.rpm
92ccbe1005a2ad74fffc3e944f5d19c2 kernel-2.4.18-e.65.src.rpm
ia64:
8e5d03bf4e79cf7b0cfd6911d3667160 kernel-2.4.18-e.65.ia64.rpm
d82cbe75c5f32bff36a65d5a5d52a0ee kernel-doc-2.4.18-e.65.ia64.rpm
6093b3a6bae88873c8f0f13755d5eb47 kernel-smp-2.4.18-e.65.ia64.rpm
72346a0b751537cc181f226caed806bb kernel-source-2.4.18-e.65.ia64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1353
http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFGuhOzXlSAg2UNWIIRAvGVAJ92pOmN8QINKsl5+y5+gk8oe2nAdgCeLwkb
hkJ2NLK0R9jbUxjB5JSLtUg=
=S9ng
-----END PGP SIGNATURE-----