lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1GXjnB-0001mn-4Y@mercury.mandriva.com>
Date: Wed, 11 Oct 2006 13:31:01 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2006:182 ] - Updated kernel packages fix multiple vulnerabilities and bugs


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:182
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : October 11, 2006
 Affected: 2006.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:

 Stephane Eranian discovered an issue with permon2.0 where, under
 certain circumstances, the perfmonctl() system call may not correctly
 manage the file descriptor reference count, resulting in the system
 possibly running out of file structure (CVE-2006-3741).

 Prior to and including 2.6.17, the Universal Disk Format (UDF)
 filesystem driver allowed local users to cause a DoS (hang and crash)
 via certain operations involving truncated files (CVE-2006-4145).

 Various versions of the Linux kernel allowed local users to cause a DoS
 (crash) via an SCTP socket with a certain SO_LINGER value, which is
 possibly related to the patch used to correct CVE-2006-3745
 (CVE-2006-4535).

 The Unidirectional Lightweight Encapsulation (ULE) decapsulation
 component in the dvb driver allows remote attackers to cause a DoS
 (crash) via an SNDU length of 0 in a ULE packet (CVE-2006-4623).

 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels immediately
 and reboot to effect the fixes.

 In addition to these security fixes, other fixes have been included
 such as:

 - added support for new devices: o NetXtreme BCM5715 gigabit ethernet o
 NetXtreme II BCM5708 gigabit ethernet - enabled the CISS driver for Xen
 kernels - updated ich8 support in ata_piix - enabled support for 1078
 type controller in megaraid_sas - multiple fixes for RSBAC support

 To update your kernel, please follow the directions located at:

 http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3741
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4145
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4535
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4623
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 d8faf35e32cfc95568dbd2ce8d1f6e92  2006.0/i586/kernel-2.6.12.27mdk-1-1mdk.i586.rpm
 3ec9cc58717ccb16c5d743497d45aee5  2006.0/i586/kernel-BOOT-2.6.12.27mdk-1-1mdk.i586.rpm
 050c572842f5320c1cb104d4008389a8  2006.0/i586/kernel-i586-up-1GB-2.6.12.27mdk-1-1mdk.i586.rpm
 7ac9bee9d6ff4f213a682b7735a34082  2006.0/i586/kernel-i686-up-4GB-2.6.12.27mdk-1-1mdk.i586.rpm
 a821b5a4aa6c7c91b45253e957f9ec3c  2006.0/i586/kernel-smp-2.6.12.27mdk-1-1mdk.i586.rpm
 0e51831cb1a7967f2a2f3d09e1d6238b  2006.0/i586/kernel-source-2.6.12.27mdk-1-1mdk.i586.rpm
 e6925888d3786d0c155e4f4adc7a0142  2006.0/i586/kernel-source-stripped-2.6.12.27mdk-1-1mdk.i586.rpm
 1abfb3e150de3770f8356a105ecd5e55  2006.0/i586/kernel-xbox-2.6.12.27mdk-1-1mdk.i586.rpm
 86d860464470c99ac3f6871e4767dfdb  2006.0/i586/kernel-xen0-2.6.12.27mdk-1-1mdk.i586.rpm
 34f20f11bee8c983bbeb2b1be3bfef3b  2006.0/i586/kernel-xenU-2.6.12.27mdk-1-1mdk.i586.rpm
 64ab6e424dd038ed0e88621fa81e35ed  2006.0/i586/librsbac1-1.2.4-2.2.20060mdk.i586.rpm
 fbbf95ab0182abb136a4af282a590712  2006.0/i586/librsbac1-devel-1.2.4-2.2.20060mdk.i586.rpm
 d4444ef71f26879a113290c043ca51a2  2006.0/i586/librsbac1-static-devel-1.2.4-2.2.20060mdk.i586.rpm
 d4b1a61682997d8380a63a0203290fc8  2006.0/i586/rsbac-admin-1.2.4-2.2.20060mdk.i586.rpm
 6fb3bdd2d5b644d4ecf34cb990cddba3  2006.0/i586/rsbac-admin-doc-1.2.4-2.2.20060mdk.i586.rpm
 54eac72281d29e43fd15bd799ee035cc  2006.0/i586/xen-3.0.1-3.1.20060mdk.i586.rpm 
 b236c725547bdb34f42976809775bc80  2006.0/SRPMS/kernel-2.6.12.27mdk-1-1mdk.src.rpm
 f8e1e2c9308f446f8d82672bd54a31c2  2006.0/SRPMS/rsbac-admin-1.2.4-2.2.20060mdk.src.rpm
 5c15a1e42a872e50190e54707d86b905  2006.0/SRPMS/xen-3.0.1-3.1.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 f2972f89bf730a0bbd002094f96a3caa  2006.0/x86_64/kernel-2.6.12.27mdk-1-1mdk.x86_64.rpm
 4f2c7977937f1df259112e2fb8cc26f7  2006.0/x86_64/kernel-BOOT-2.6.12.27mdk-1-1mdk.x86_64.rpm
 fe8c8d296895b4222cb2b874c259b107  2006.0/x86_64/kernel-smp-2.6.12.27mdk-1-1mdk.x86_64.rpm
 290b64f31677e30a9f13ec813232dae2  2006.0/x86_64/kernel-source-2.6.12.27mdk-1-1mdk.x86_64.rpm
 8eabcaa13a8059e770b78471996f40de  2006.0/x86_64/kernel-source-stripped-2.6.12.27mdk-1-1mdk.x86_64.rpm
 f1ba06f6fa1a14ff9398ab78689896f1  2006.0/x86_64/kernel-xen0-2.6.12.27mdk-1-1mdk.x86_64.rpm
 2fb4bfde90f82c7e11732c7a3db1ef3d  2006.0/x86_64/kernel-xenU-2.6.12.27mdk-1-1mdk.x86_64.rpm
 386e0cda535c19f82a515ce3ed797229  2006.0/x86_64/lib64rsbac1-1.2.4-2.2.20060mdk.x86_64.rpm
 29f7f84683e216b7d49b2e9710cd5940  2006.0/x86_64/lib64rsbac1-devel-1.2.4-2.2.20060mdk.x86_64.rpm
 ed97cb6ad0b05b3d5c5747882d557d6c  2006.0/x86_64/lib64rsbac1-static-devel-1.2.4-2.2.20060mdk.x86_64.rpm
 6d7d10cecdb2aca8d0bbbbbe6abcc9fc  2006.0/x86_64/rsbac-admin-1.2.4-2.2.20060mdk.x86_64.rpm
 cb8ae483fa0acbf907db110cbef8e541  2006.0/x86_64/rsbac-admin-doc-1.2.4-2.2.20060mdk.x86_64.rpm
 b51fa9245d08903dbc831bee40ccab0b  2006.0/x86_64/xen-3.0.1-3.1.20060mdk.x86_64.rpm 
 b236c725547bdb34f42976809775bc80  2006.0/SRPMS/kernel-2.6.12.27mdk-1-1mdk.src.rpm
 f8e1e2c9308f446f8d82672bd54a31c2  2006.0/SRPMS/rsbac-admin-1.2.4-2.2.20060mdk.src.rpm
 5c15a1e42a872e50190e54707d86b905  2006.0/SRPMS/xen-3.0.1-3.1.20060mdk.src.rpm

 Corporate 4.0:
 3b2adac329c9dfdd5875a66327f6c506  corporate/4.0/i586/kernel-2.6.12.27mdk-1-1mdk.i586.rpm
 7e4d5c3db171cb62f012f508736ca736  corporate/4.0/i586/kernel-BOOT-2.6.12.27mdk-1-1mdk.i586.rpm
 0b5f661f85521d01c52329b141cebd9f  corporate/4.0/i586/kernel-i586-up-1GB-2.6.12.27mdk-1-1mdk.i586.rpm
 538152322cfeda563bebb919970a63af  corporate/4.0/i586/kernel-i686-up-4GB-2.6.12.27mdk-1-1mdk.i586.rpm
 b3f27f71a3a69e3d76d3f46d34ee0591  corporate/4.0/i586/kernel-smp-2.6.12.27mdk-1-1mdk.i586.rpm
 8b5854dd9a79bb61b110e10c1e2e7d83  corporate/4.0/i586/kernel-source-2.6.12.27mdk-1-1mdk.i586.rpm
 8c50838b026549cb92b5e2de5f202249  corporate/4.0/i586/kernel-source-stripped-2.6.12.27mdk-1-1mdk.i586.rpm
 3a9ca53e1aad4ba927120b607cf553ea  corporate/4.0/i586/kernel-xbox-2.6.12.27mdk-1-1mdk.i586.rpm
 92813f5d123c492559c94f08aa5aa898  corporate/4.0/i586/kernel-xen0-2.6.12.27mdk-1-1mdk.i586.rpm
 e05f283aa3513c6c6059535f18edd3df  corporate/4.0/i586/kernel-xenU-2.6.12.27mdk-1-1mdk.i586.rpm 
 d45d9c28807552aaef5ae0ecbe4f05b6  corporate/4.0/SRPMS/kernel-2.6.12.27mdk-1-1mdk.src.rpm

 Corporate 4.0/X86_64:
 7dbe002fd4f2a61b26f64d9cff1bd096  corporate/4.0/x86_64/kernel-2.6.12.27mdk-1-1mdk.x86_64.rpm
 644f841f2523a00613f63bd10a49ec74  corporate/4.0/x86_64/kernel-BOOT-2.6.12.27mdk-1-1mdk.x86_64.rpm
 7a749e0e889eb5f62a0c9ef8925a522d  corporate/4.0/x86_64/kernel-smp-2.6.12.27mdk-1-1mdk.x86_64.rpm
 15683140a8b3dad7a8f2a9794330ed02  corporate/4.0/x86_64/kernel-source-2.6.12.27mdk-1-1mdk.x86_64.rpm
 cd90d18a81263272d54caf5d681bf54b  corporate/4.0/x86_64/kernel-source-stripped-2.6.12.27mdk-1-1mdk.x86_64.rpm
 e3520cae9708f9227e80cb1e8547cc9f  corporate/4.0/x86_64/kernel-xen0-2.6.12.27mdk-1-1mdk.x86_64.rpm
 c06207ecd4bb9e8db56bd326094bb1b1  corporate/4.0/x86_64/kernel-xenU-2.6.12.27mdk-1-1mdk.x86_64.rpm 
 d45d9c28807552aaef5ae0ecbe4f05b6  corporate/4.0/SRPMS/kernel-2.6.12.27mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFLRpcmqjQ0CJFipgRAjonAKDoIpBRmHDbBjXUwTldz0p058MTNwCfVN+6
ogecuevMVAmFsi+7s2EyoIE=
=vjmQ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ