Oval Definition:oval:com.redhat.rhsa:def:20060140
Revision Date:2006-01-19Version:639
Title:RHSA-2006:0140: kernel security update (Important)
Description:The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described below:

  • - a flaw in network IGMP processing that a allowed a remote user on the local network to cause a denial of service (disabling of multicast reports) if the system is running multicast applications (CVE-2002-2185, moderate)

  • - a flaw in remap_page_range() with O_DIRECT writes that allowed a local user to cause a denial of service (crash) (CVE-2004-1057, important)

  • - a flaw in exec() handling on some 64-bit architectures that allowed a local user to cause a denial of service (crash) (CVE-2005-2708, important)

  • - a flaw in procfs handling during unloading of modules that allowed a local user to cause a denial of service or potentially gain privileges (CVE-2005-2709, moderate)

  • - a flaw in IPv6 network UDP port hash table lookups that allowed a local user to cause a denial of service (hang) (CVE-2005-2973, important)

  • - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed a local user to cause a denial of service (crash) (CVE-2005-3044, important)

  • - a network buffer info leak using the orinoco driver that allowed a remote user to possibly view uninitialized data (CVE-2005-3180, important)

  • - a flaw in IPv4 network TCP and UDP netfilter handling that allowed a local user to cause a denial of service (crash) (CVE-2005-3275, important)

  • - a flaw in the IPv6 flowlabel code that allowed a local user to cause a denial of service (crash) (CVE-2005-3806, important)

  • - a flaw in network ICMP processing that allowed a local user to cause a denial of service (memory exhaustion) (CVE-2005-3848, important)

  • - a flaw in file lease time-out handling that allowed a local user to cause a denial of service (log file overflow) (CVE-2005-3857, moderate)

  • - a flaw in network IPv6 xfrm handling that allowed a local user to cause a denial of service (memory exhaustion) (CVE-2005-3858, important)

    All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to the packages associated with their machine architecture and configurations as listed in this erratum.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2002-2185
    CVE-2004-1057
    CVE-2005-2708
    CVE-2005-2709
    CVE-2005-2973
    CVE-2005-3044
    CVE-2005-3180
    CVE-2005-3275
    CVE-2005-3806
    CVE-2005-3848
    CVE-2005-3857
    CVE-2005-3858
    RHSA-2006:0140
    RHSA-2006:0140-01
    RHSA-2006:0140-01
    Platform(s):Red Hat Enterprise Linux 3
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 3 is installed
  • AND
  • kernel earlier than 0:2.4.21-37.0.1.EL is currently running
  • OR kernel earlier than 0:2.4.21-37.0.1.EL is set to boot up on next boot
  • AND
  • kernel-unsupported is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel-unsupported is signed with Red Hat master key
  • kernel-smp-unsupported is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel-smp-unsupported is signed with Red Hat master key
  • kernel-doc is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel-doc is signed with Red Hat master key
  • kernel-smp is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel-smp is signed with Red Hat master key
  • kernel is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel is signed with Red Hat master key
  • kernel-source is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel-source is signed with Red Hat master key
  • kernel-hugemem-unsupported is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel-hugemem-unsupported is signed with Red Hat master key
  • kernel-BOOT is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel-BOOT is signed with Red Hat master key
  • kernel-hugemem is earlier than 0:2.4.21-37.0.1.EL
  • AND kernel-hugemem is signed with Red Hat master key
  • BACK