__________________________________________________________
	
						   The U.S. Department of Energy
					   Computer Incident Advisory Capability
							   ___  __ __    _     ___
							  /       |     /_\   /
							  \___  __|__  /   \  \___
				 __________________________________________________________
	
								 INFORMATION BULLETIN
	
						   Kernel Security and Bug Fix Update
							   [Red Hat RHSA:2007:0376-2]
	
	June 14, 2007 19:00 GMT                                           Number R-276
	[REVISED 16 Aug 2007]
	[REVISED 26 Feb 2008]
	______________________________________________________________________________
	PROBLEM:       There are several security and bug fix vulnerabilities in 
				   kernel packages. 
	PLATFORM:      RHEL Desktop Workstation (v. 5 client) 
				   Red Hat Desktop (v. 3)
				   Red Hat Enterprise Linux (v. 5 server) 
				   Red Hat Enterprise Linux AS, ES, WS (v. 3)
				   Red Hat Enterprise Linux Desktop (v. 5 client)
				   Debian GNU/Linux (4.0) and 3.1 (oldstable)
	DAMAGE:        A local user may trigger an information leak. 
	SOLUTION:      Upgrade to the appropriate version. 
	______________________________________________________________________________
	VULNERABILITY  The risk is LOW. A local user may trigger an information leak. 
	ASSESSMENT:                                                                   
	______________________________________________________________________________
	LINKS: 
	 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/r-276.shtml 
	 ORIGINAL BULLETIN:  https://rhn.redhat.com/errata/RHSA-2007-0376.html 
	 ADDITIONAL LINKS:   http://www.debian.org/security/2007/dsa-1356
						 http://www.debian.org/security/2007/dsa-1503
						 http://www.debian.org/security/2007/dsa-1504
						 https://rhn.redhat.com/errata/RHSA-2007-0671.html 
	 CVE:                http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= 
						 CVE-2006-7203 CVE-2007-1353 CVE-2007-2453 CVE-2007-2525 
	______________________________________________________________________________
	REVISION HISTORY:
	08/16/2007 - revised R-276 to add links to Debian Security Advisory DSA-1356-1 
	             for Debian GNU/Linux 4.0 (etch) and Red Hat RHSA-2007:0671-2 for 
				 Red Hat Desktop (v. 3) and Red Hat Enterprise Linux AS, ES, WS 
				 (v. 3).
	02/26/20008 - revised R-276 to add links to Debian Security Advisories DSA-1503-1
                 and DSA-1504-1 for Debian GNU/Linux 3.1 (oldstable).



	[***** Start Red Hat RHSA:2007:0376-2 *****]
	
	Important: kernel security and bug fix update
	Advisory: RHSA-2007:0376-2 
	Type: Security Advisory 
	Severity: Important 
	Issued on: 2007-06-14 
	Last updated on: 2007-06-14 
	Affected Products: RHEL Desktop Workstation (v. 5 client)
	Red Hat Enterprise Linux (v. 5 server)
	Red Hat Enterprise Linux Desktop (v. 5 client) 
	OVAL: com.redhat.rhsa-20070376.xml 
	CVEs (cve.mitre.org): CVE-2006-7203
	CVE-2007-1353
	CVE-2007-2453
	CVE-2007-2525
	 
	
	
	Details
	Updated kernel packages that fix security issues and bugs in the Red Hat 
	Enterprise Linux 5 kernel are now available. 
	
	This update has been rated as having important security impact by the Red 
	Hat Security Response Team.
	
	The Linux kernel handles the basic functions of the operating system. 
	
	These new kernel packages contain fixes for the following security issues: 
	
	* a flaw in the mount handling routine for 64-bit systems that allowed a 
	local user to cause denial of service (CVE-2006-7203, Important). 
	
	* a flaw in the PPP over Ethernet implementation that allowed a remote user 
	to cause a denial of service (CVE-2007-2525, Important). 
	
	* a flaw in the Bluetooth subsystem that allowed a local user to trigger an 
	information leak (CVE-2007-1353, Low). 
	
	* a bug in the random number generator that prevented the manual seeding of 
	the entropy pool (CVE-2007-2453, Low). 
	
	In addition to the security issues described above, fixes for the following 
	have been included: 
	
	* a race condition between ext3_link/unlink that could create an orphan 
	inode list corruption. 
	
	* a bug in the e1000 driver that could lead to a watchdog timeout panic. 
	
	Red Hat Enterprise Linux 5 users are advised to upgrade to these packages, 
	which contain backported patches to correct these issues.
	
	
	
	Solution
	Before applying this update, make sure that all previously-released 
	errata relevant to your system have been applied. 
	
	This update is available via Red Hat Network. Details on how to use 
	the Red Hat Network to apply this update are available at 
	http://kbase.redhat.com/faq/FAQ_58_10188
	
	
	Updated packages
	RHEL Desktop Workstation (v. 5 client) 
	
	--------------------------------------------------------------------------------
	 
	IA-32: 
	kernel-PAE-devel-2.6.18-8.1.6.el5.i686.rpm     584699e4fe6d117e44f7e05b2fdd6ab9 
	kernel-devel-2.6.18-8.1.6.el5.i686.rpm     a86e33c65793ab34921b82f144811b2e 
	kernel-xen-devel-2.6.18-8.1.6.el5.i686.rpm     9c793133f00941476dcaa77b2e768b0e 
	  
	x86_64: 
	kernel-devel-2.6.18-8.1.6.el5.x86_64.rpm     dbe4f7c67bb11ae6861db4f887b53053 
	kernel-xen-devel-2.6.18-8.1.6.el5.x86_64.rpm     a3fe6cd0914e123d38dfe43c30d40ddc 
	  
	Red Hat Enterprise Linux (v. 5 server) 
	
	--------------------------------------------------------------------------------
	 
	SRPMS: 
	kernel-2.6.18-8.1.6.el5.src.rpm     ca4c1316fbd95a8d49f904e7bccc945e 
	  
	IA-32: 
	kernel-2.6.18-8.1.6.el5.i686.rpm     751a0967b7267cdc841786d07535f043 
	kernel-PAE-2.6.18-8.1.6.el5.i686.rpm     972cbf91bd3a6d44f6ec8076a533d9af 
	kernel-PAE-devel-2.6.18-8.1.6.el5.i686.rpm     584699e4fe6d117e44f7e05b2fdd6ab9 
	kernel-devel-2.6.18-8.1.6.el5.i686.rpm     a86e33c65793ab34921b82f144811b2e 
	kernel-doc-2.6.18-8.1.6.el5.noarch.rpm     f26ab19937282b8e62402fa0e69dcafd 
	kernel-headers-2.6.18-8.1.6.el5.i386.rpm     48d4505991b2366c786568543cb8ec2f 
	kernel-xen-2.6.18-8.1.6.el5.i686.rpm     da0cec315cfa6fe94146db555055fda3 
	kernel-xen-devel-2.6.18-8.1.6.el5.i686.rpm     9c793133f00941476dcaa77b2e768b0e 
	  
	IA-64: 
	kernel-2.6.18-8.1.6.el5.ia64.rpm     a7912a5558ec0173c0fdfee5fd2863bf 
	kernel-devel-2.6.18-8.1.6.el5.ia64.rpm     1311e18b2680a77fdca62c2ab49632f6 
	kernel-doc-2.6.18-8.1.6.el5.noarch.rpm     f26ab19937282b8e62402fa0e69dcafd 
	kernel-headers-2.6.18-8.1.6.el5.ia64.rpm     74b7ea13777122bf411be76b0a1144f8 
	kernel-xen-2.6.18-8.1.6.el5.ia64.rpm     42009c041ffe6a26596ab4816ea3abce 
	kernel-xen-devel-2.6.18-8.1.6.el5.ia64.rpm     f8155ee4c63caad60eb508883d4c7dda 
	  
	PPC: 
	kernel-2.6.18-8.1.6.el5.ppc64.rpm     1a69e468f30d703ffeb6ef773e1dbe59 
	kernel-devel-2.6.18-8.1.6.el5.ppc64.rpm     b78b15d609855fe10466f4533b8f6310 
	kernel-doc-2.6.18-8.1.6.el5.noarch.rpm     f26ab19937282b8e62402fa0e69dcafd 
	kernel-headers-2.6.18-8.1.6.el5.ppc.rpm     e406e68cbf4f7b5930e7e3149caa2235 
	kernel-headers-2.6.18-8.1.6.el5.ppc64.rpm     b3337ae1d970c7a95238d3e413d2bc6e 
	kernel-kdump-2.6.18-8.1.6.el5.ppc64.rpm     748ae09ed90bebb5f5ccf72bf6c5c91a 
	kernel-kdump-devel-2.6.18-8.1.6.el5.ppc64.rpm     b69e9cad8402e47baac4e29b689a3872 
	  
	s390x: 
	kernel-2.6.18-8.1.6.el5.s390x.rpm     0a4967dea91440f8d06d98841d2b2273 
	kernel-devel-2.6.18-8.1.6.el5.s390x.rpm     a477294269e511f48ef78e9e114a2047 
	kernel-doc-2.6.18-8.1.6.el5.noarch.rpm     f26ab19937282b8e62402fa0e69dcafd 
	kernel-headers-2.6.18-8.1.6.el5.s390x.rpm     24d34019d943bac327c5baecd6ab6bdd 
	  
	x86_64: 
	kernel-2.6.18-8.1.6.el5.x86_64.rpm     cfad289b0ece8e9fa7b630d7187b6346 
	kernel-devel-2.6.18-8.1.6.el5.x86_64.rpm     dbe4f7c67bb11ae6861db4f887b53053 
	kernel-doc-2.6.18-8.1.6.el5.noarch.rpm     f26ab19937282b8e62402fa0e69dcafd 
	kernel-headers-2.6.18-8.1.6.el5.x86_64.rpm     c9da8f3c701a49d5dfb10b6c81cb3166 
	kernel-xen-2.6.18-8.1.6.el5.x86_64.rpm     a15f021f85dfd7146116e96165b3b13b 
	kernel-xen-devel-2.6.18-8.1.6.el5.x86_64.rpm     a3fe6cd0914e123d38dfe43c30d40ddc 
	  
	Red Hat Enterprise Linux Desktop (v. 5 client) 
	
	--------------------------------------------------------------------------------
	 
	SRPMS: 
	kernel-2.6.18-8.1.6.el5.src.rpm     ca4c1316fbd95a8d49f904e7bccc945e 
	  
	IA-32: 
	kernel-2.6.18-8.1.6.el5.i686.rpm     751a0967b7267cdc841786d07535f043 
	kernel-PAE-2.6.18-8.1.6.el5.i686.rpm     972cbf91bd3a6d44f6ec8076a533d9af 
	kernel-doc-2.6.18-8.1.6.el5.noarch.rpm     f26ab19937282b8e62402fa0e69dcafd 
	kernel-headers-2.6.18-8.1.6.el5.i386.rpm     48d4505991b2366c786568543cb8ec2f 
	kernel-xen-2.6.18-8.1.6.el5.i686.rpm     da0cec315cfa6fe94146db555055fda3 
	  
	x86_64: 
	kernel-2.6.18-8.1.6.el5.x86_64.rpm     cfad289b0ece8e9fa7b630d7187b6346 
	kernel-doc-2.6.18-8.1.6.el5.noarch.rpm     f26ab19937282b8e62402fa0e69dcafd 
	kernel-headers-2.6.18-8.1.6.el5.x86_64.rpm     c9da8f3c701a49d5dfb10b6c81cb3166 
	kernel-xen-2.6.18-8.1.6.el5.x86_64.rpm     a15f021f85dfd7146116e96165b3b13b 
	  
	(The unlinked packages above are only available from the Red Hat Network)
	 
	
	
	Bugs fixed (see bugzilla for more information)
	238048 - watchdog timeout panic in e1000 driver
	240456 - CVE-2006-7203 oops in compat_sys_mount() when data pointer is NULL
	241862 - CVE-2007-1353 Bluetooth setsockopt() information leaks
	241863 - CVE-2007-2525 PPPoE socket PPPIOCGCHAN denial of service
	241888 - CVE-2007-2453 Slightly degraded pool mixing for entropy extraction
	
	
	
	References
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7203
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1353
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2453
	http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2525
	http://www.redhat.com/security/updates/classification/#important 
	
	
	--------------------------------------------------------------------------------
	These packages are GPG signed by Red Hat for security. Our key and details on how 
	to verify the signature are available from:
	
	https://www.redhat.com/security/team/key/#package 
	
	The Red Hat security contact is secalert@redhat.com. More contact details at 
	http://www.redhat.com/security/team/contact/
	
	
	[***** End Red Hat RHSA:2007:0376-2 *****]
	_______________________________________________________________________________
	
	CIAC wishes to acknowledge the contributions of Red Hat for the 
	information contained in this bulletin.
	_______________________________________________________________________________
	
	
	CIAC, the Computer Incident Advisory Capability, is the computer
	security incident response team for the U.S. Department of Energy
	(DOE) and the emergency backup response team for the National
	Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
	National Laboratory in Livermore, California. CIAC is also a founding
	member of FIRST, the Forum of Incident Response and Security Teams, a
	global organization established to foster cooperation and coordination
	among computer security teams worldwide.
	
	CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
	can be contacted at:
		Voice:    +1 925-422-8193 (7x24)
		FAX:      +1 925-423-8002
		STU-III:  +1 925-423-2604
		E-mail:   ciac@ciac.org
	
	Previous CIAC notices, anti-virus software, and other information are
	available from the CIAC Computer Security Archive.
	
	   World Wide Web:      http://www.ciac.org/
	   Anonymous FTP:       ftp.ciac.org
	
	PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
	communities receive CIAC bulletins.  If you are not part of these
	communities, please contact your agency's response team to report
	incidents. Your agency's team will coordinate with CIAC. The Forum of
	Incident Response and Security Teams (FIRST) is a world-wide
	organization. A list of FIRST member organizations and their
	constituencies can be obtained via WWW at http://www.first.org/.
	
	This document was prepared as an account of work sponsored by an
	agency of the United States Government. Neither the United States
	Government nor the University of California nor any of their
	employees, makes any warranty, express or implied, or assumes any
	legal liability or responsibility for the accuracy, completeness, or
	usefulness of any information, apparatus, product, or process
	disclosed, or represents that its use would not infringe privately
	owned rights. Reference herein to any specific commercial products,
	process, or service by trade name, trademark, manufacturer, or
	otherwise, does not necessarily constitute or imply its endorsement,
	recommendation or favoring by the United States Government or the
	University of California. The views and opinions of authors expressed
	herein do not necessarily state or reflect those of the United States
	Government or the University of California, and shall not be used for
	advertising or product endorsement purposes.
	
	LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
	
	R-266: Security Vulnerability in How xscreensaver(1) Interacts with GNOME Assistive Technology
	R-267: Security Notice for CA Products Implementing the Anti-Virus Engine
	R-268: Vulnerability in Win 32 API (935839)
	R-269: Cumulative Security Update for Outlook Express and Windows Mail (929123)
	R-270: Cumulative Security Update for Internet Explorer (933566)
	R-271: Vulnerability in the Windows Schannel Security Package (935840)
	R-272: Vulnerabilities in Microsoft Visio (927051)
	R-273: Vulnerability in Windows Vista (931213)
	R-274: Mozilla Firefox Vulnerability
	R-275: OpenOffice.org Heap Overflow