lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 19 Nov 2007 16:41:14 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:226 ] - Updated kernel packages fix
 multiple vulnerabilities and bugs


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:226
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : November 19, 2007
 Affected: 2008.0
 _______________________________________________________________________
 
 Problem Description:
 
 Some vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 The minix filesystem code allows local users to cause a denial of
 service (hang) via a malformed minix file stream (CVE-2006-6058).
 
 An integer underflow in the Linux kernel prior to 2.6.23 allows remote
 attackers to cause a denial of service (crash) via a crafted SKB length
 value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA
 flag is set (CVE-2007-4997).
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6058
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2008.0:
 bfb8abfb7532255d239ce8ef3b39966b  2008.0/i586/kernel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 c68305809aa8704146ea1a59cd687ab1  2008.0/i586/kernel-desktop-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 89a439f86bd47820345287275fe25674  2008.0/i586/kernel-desktop-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 a13eab853fc0b044456d90d98c8e9008  2008.0/i586/kernel-desktop-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
 229f00634e286da1ab490678cf201dab  2008.0/i586/kernel-desktop-latest-2.6.22.9-2mdv2008.0.i586.rpm
 e77c3f728f0ba5bf8491e27ef389df8c  2008.0/i586/kernel-desktop586-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 82d8110dc838a1a25b2d4de0e94872e3  2008.0/i586/kernel-desktop586-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 0be66b6c155ff5888900f784bf21f555  2008.0/i586/kernel-desktop586-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
 48976bcfb3ecd30b2c2a671e49f2d241  2008.0/i586/kernel-desktop586-latest-2.6.22.9-2mdv2008.0.i586.rpm
 372de082e77dec0e87d93f389bff76cf  2008.0/i586/kernel-doc-2.6.22.9-2mdv2008.0.i586.rpm
 8fb68460352343d0c14b3d2c5581375f  2008.0/i586/kernel-laptop-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 0c76031c7eb78ba7da93b83ebf531541  2008.0/i586/kernel-laptop-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 059f66f5340e538dda3d748276313975  2008.0/i586/kernel-laptop-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
 4d6c700c736a476718c809fb3a470ed9  2008.0/i586/kernel-laptop-latest-2.6.22.9-2mdv2008.0.i586.rpm
 57e0382893adc64445913de674815ad5  2008.0/i586/kernel-server-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 f2ea96b6c7f83f8de0f27dc1c2ea9193  2008.0/i586/kernel-server-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 4de3613951fda9c4c92fcb35fe743a04  2008.0/i586/kernel-server-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
 4cc8313e4fed4a1a966bc4f4d0819f71  2008.0/i586/kernel-server-latest-2.6.22.9-2mdv2008.0.i586.rpm
 a30a7a388cdcdf089c39f7a7c26e34f0  2008.0/i586/kernel-source-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
 5b919908b67f94571a4851caf08e8ece  2008.0/i586/kernel-source-latest-2.6.22.9-2mdv2008.0.i586.rpm 
 6e797fd0fea50e2b0290ca082ca9c1db  2008.0/SRPMS/kernel-2.6.22.9-2mdv2007.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 d30b2a76ab4e37f296f07380fa8d41a4  2008.0/x86_64/kernel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
 3cdbd2356b7400f831a8b759d13952ec  2008.0/x86_64/kernel-desktop-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
 a60abdec0274a9f96be2fb1117eb2f4a  2008.0/x86_64/kernel-desktop-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
 272ac8a552c99a1b72303a92f474d46f  2008.0/x86_64/kernel-desktop-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
 8c78406bc678b51a4c84526b0874703e  2008.0/x86_64/kernel-desktop-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
 8447a07d292dd930bba13a6d06bf6570  2008.0/x86_64/kernel-doc-2.6.22.9-2mdv2008.0.x86_64.rpm
 546663f7f08a1ed4a0e561c06960872e  2008.0/x86_64/kernel-laptop-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
 482b6130e1695693ebfd610aade49255  2008.0/x86_64/kernel-laptop-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
 280678d50696a95f56735ad91fcc92ef  2008.0/x86_64/kernel-laptop-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
 f4fedb72b7d286f9b9dae772b8251a7a  2008.0/x86_64/kernel-laptop-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
 c811160740d5c4e138430fb757803bcc  2008.0/x86_64/kernel-server-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
 1078b15d6cb4a1c420e7212d4a7ca545  2008.0/x86_64/kernel-server-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
 e127a24e39d458865ebc54e61a7db34b  2008.0/x86_64/kernel-server-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
 347576ae981042a8277c2adcdb433cfc  2008.0/x86_64/kernel-server-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
 464e4b918285dac78af1b2521ebac461  2008.0/x86_64/kernel-source-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
 affd96915a01aa3927dda61bd1fad19d  2008.0/x86_64/kernel-source-latest-2.6.22.9-2mdv2008.0.x86_64.rpm 
 6e797fd0fea50e2b0290ca082ca9c1db  2008.0/SRPMS/kernel-2.6.22.9-2mdv2007.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHQfTKmqjQ0CJFipgRAm4KAJ9vlEIIafxXuBzFtS4lpZ7H98u+OACfeqnj
6pOfo1qywkIBnd5cQnlOdtM=
=qX1m
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists