Package name
Advisory ID
Affected versions
2007.0 x86_64 , 2007.0 i586

Problem description

Some vulnerabilities were discovered and corrected in the Linux 2.6

A double free vulnerability in the squashfs module could allow a local
user to cause a Denial of Service by mounting a crafted squashfs
filesystem (CVE-2006-5701).

The zlib_inflate function allows local users to cause a crash via a
malformed filesystem that uses zlib compression that triggers memory
corruption (CVE-2006-5823).

The key serial number collision avoidance code in the key_alloc_serial
function in kernels 2.6.9 up to 2.6.20 allows local users to cause a
crash via vectors thatr trigger a null dereference (CVE-2007-0006).

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.

In addition to these security fixes, other fixes have been included
such as:

- New drivers: nozomi, UVC
- Fixed SiS SATA support for chips on 966/968 bridges
- Fixed issues in squashfs by updating to 3.2 (#27008)
- Added support for SiS968 bridgest to the sis190 bridge
- Fixed JMicron cable detection
- Added /proc/config.gz support and enabled kexec on x86_64
- Other minor fixes

To update your kernel, please follow the directions located at:

Updated packages

2007.0 x86_64

 7293720ba20f54c1522263b0d1e58577  2007.0/x86_64/kernel-
 7a32b034b1452b1d102fed6fca411aa2  2007.0/x86_64/kernel-doc-
 db02f60611db9824215440969b52d2ac  2007.0/x86_64/kernel-source-
 4751c8e5fb383bf08f29f172bc1c11f2  2007.0/x86_64/kernel-source-stripped-
 e467c45bdab2bfc663b0b0a0ab135d84  2007.0/x86_64/kernel-xen0-
 9c00e25c5f5ea6be9d96c4a2139836a6  2007.0/x86_64/kernel-xenU- 
 b971ee2fe8d6ddc83765cb2705671e35  2007.0/SRPMS/kernel-

2007.0 i586

 07df9cceca48092bca1fd65cadf91e69  2007.0/i586/kernel-
 a1dbf1afa75579198166a3f4a74f45d5  2007.0/i586/kernel-doc-
 da3d2669e324068dd7563a29356a6221  2007.0/i586/kernel-enterprise-
 1e1508188ec35415a880978c3c90c7ce  2007.0/i586/kernel-legacy-
 2d0f1e67c091bd9c62cb4f63b9ef7356  2007.0/i586/kernel-source-
 d76607bf4889d5a6d0a3633a84475684  2007.0/i586/kernel-source-stripped-
 d6d3e09457c438b71cb03d3622867019  2007.0/i586/kernel-xen0-
 241b7b83709ec8811fb8b2969ae5bfda  2007.0/i586/kernel-xenU- 
 b971ee2fe8d6ddc83765cb2705671e35  2007.0/SRPMS/kernel-