English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: kernel security update
Advisory ID:       RHSA-2007:0673-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0673.html
Issue date:        2007-08-08
Updated on:        2007-08-08
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-6054 CVE-2007-1217 CVE-2007-1592 
                   CVE-2007-1353 
- ---------------------------------------------------------------------

1. Summary:

Updated kernel packages that fix a number of security issues are now
available for Red Hat Enterprise Linux 2.1 (64-bit architectures).

This security advisory has been rated as having important security impact by
the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1  - ia64
Red Hat Linux Advanced Workstation 2.1 - ia64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

* a flaw in IPV6 flow label handling that allowed a local user to
cause a denial of service (crash). (CVE-2007-1592, Important)

* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a
denial of service or potential privilege escalation. (CVE-2007-1217, Moderate)

* a flaw in the Bluetooth subsystem that allowed a local user to trigger an
information leak. (CVE-2007-1353, Low)

* a flaw in the supported filesystems that allowed a local privileged user
to cause a denial of service. (CVE-2006-6054, Low)

Red Hat would like to thank Ilja van Sprundel for reporting an issue fixed
in this erratum.

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to these updated packages, which contain backported fixes to correct these
issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

217024 - CVE-2006-6054 ext2_check_page denial of service
231071 - CVE-2007-1217 Overflow in CAPI subsystem
233484 - CVE-2007-1592 IPv6 oops triggerable by any user
234296 - CVE-2007-1353 Bluetooth setsockopt() information leaks

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kernel-2.4.18-e.65.src.rpm
92ccbe1005a2ad74fffc3e944f5d19c2  kernel-2.4.18-e.65.src.rpm

ia64:
8e5d03bf4e79cf7b0cfd6911d3667160  kernel-2.4.18-e.65.ia64.rpm
d82cbe75c5f32bff36a65d5a5d52a0ee  kernel-doc-2.4.18-e.65.ia64.rpm
6093b3a6bae88873c8f0f13755d5eb47  kernel-smp-2.4.18-e.65.ia64.rpm
72346a0b751537cc181f226caed806bb  kernel-source-2.4.18-e.65.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/kernel-2.4.18-e.65.src.rpm
92ccbe1005a2ad74fffc3e944f5d19c2  kernel-2.4.18-e.65.src.rpm

ia64:
8e5d03bf4e79cf7b0cfd6911d3667160  kernel-2.4.18-e.65.ia64.rpm
d82cbe75c5f32bff36a65d5a5d52a0ee  kernel-doc-2.4.18-e.65.ia64.rpm
6093b3a6bae88873c8f0f13755d5eb47  kernel-smp-2.4.18-e.65.ia64.rpm
72346a0b751537cc181f226caed806bb  kernel-source-2.4.18-e.65.ia64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1353
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGuhOzXlSAg2UNWIIRAvGVAJ92pOmN8QINKsl5+y5+gk8oe2nAdgCeLwkb
hkJ2NLK0R9jbUxjB5JSLtUg=
=S9ng
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.