The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These new kernel packages fix the following security issues:
A flaw was found in the virtual filesystem (VFS). An unprivileged local
user could truncate directories to which they had write permission; this
could render the contents of the directory inaccessible. (CVE-2008-0001,
Important)
A flaw was found in the Xen PAL emulation on Intel 64 platforms. A guest
Hardware-assisted virtual machine (HVM) could read the arbitrary physical
memory of the host system, which could make information available to
unauthorized users. (CVE-2007-6416, Important)
A flaw was found in the way core dump files were created. If a local user
can get a root-owned process to dump a core file into a directory, which
the user has write access to, they could gain read access to that core
file, potentially containing sensitive information. (CVE-2007-6206, Moderate)
A buffer overflow flaw was found in the CIFS virtual file system. A
remote,authenticated user could issue a request that could lead to a denial
of service. (CVE-2007-5904, Moderate)
A flaw was found in the “sysfs_readdir” function. A local user could create
a race condition which would cause a denial of service (kernel oops).
(CVE-2007-3104, Moderate)
As well, these updated packages fix the following bugs:
running the “strace -f” command caused strace to hang, without displaying
information about child processes.
unmounting an unresponsive, interruptable NFS mount, for example, one
mounted with the “intr” option, may have caused a system crash.
a bug in the s2io.ko driver prevented VLAN devices from being added.
Attempting to add a device to a VLAN, for example, running the “vconfig
add [device-name] [vlan-id]” command caused vconfig to fail.
tux used an incorrect open flag bit. This caused problems when building
packages in a chroot environment, such as mock, which is used by the koji
build system.
Red Hat Enterprise Linux 5 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | ppc | kernel-headers | < 2.6.18-53.1.6.el5 | kernel-headers-2.6.18-53.1.6.el5.ppc.rpm |
RedHat | 5 | i686 | kernel-debug-devel | < 2.6.18-53.1.6.el5 | kernel-debug-devel-2.6.18-53.1.6.el5.i686.rpm |
RedHat | 5 | ia64 | kernel-debug | < 2.6.18-53.1.6.el5 | kernel-debug-2.6.18-53.1.6.el5.ia64.rpm |
RedHat | 5 | ppc64 | kernel-debug | < 2.6.18-53.1.6.el5 | kernel-debug-2.6.18-53.1.6.el5.ppc64.rpm |
RedHat | 5 | ppc64 | kernel-debug-devel | < 2.6.18-53.1.6.el5 | kernel-debug-devel-2.6.18-53.1.6.el5.ppc64.rpm |
RedHat | 5 | ppc64 | kernel-headers | < 2.6.18-53.1.6.el5 | kernel-headers-2.6.18-53.1.6.el5.ppc64.rpm |
RedHat | 5 | s390x | kernel-devel | < 2.6.18-53.1.6.el5 | kernel-devel-2.6.18-53.1.6.el5.s390x.rpm |
RedHat | 5 | i686 | kernel-debug | < 2.6.18-53.1.6.el5 | kernel-debug-2.6.18-53.1.6.el5.i686.rpm |
RedHat | 5 | noarch | kernel-doc | < 2.6.18-53.1.6.el5 | kernel-doc-2.6.18-53.1.6.el5.noarch.rpm |
RedHat | 5 | x86_64 | kernel-devel | < 2.6.18-53.1.6.el5 | kernel-devel-2.6.18-53.1.6.el5.x86_64.rpm |