[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Gg5Dp-0007x9-5x@mercury.mandriva.com>
Date: Fri, 3 Nov 2006 13:01:01 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2006:197 ] - Updated kernel packages fix multiple vulnerabilities and bugs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:197
http://www.mandriva.com/security/
_______________________________________________________________________
Package : kernel
Date : November 3, 2006
Affected: 2007.0
_______________________________________________________________________
Problem Description:
Some vulnerabilities were discovered and corrected in the Linux 2.6
kernel:
Bugs in the netfilter for IPv6 code, as reported by Mark Dowd, were
fixed (CVE-2006-4572).
The ATM subsystem of the Linux kernel could allow a remote attacker to
cause a Denial of Service (panic) via unknown vectors that cause the
ATM subsystem to access the memory of socket buffers after they are
freed (CVE-2006-4997).
The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.
In addition to these security fixes, other fixes have been included
such as:
- updated to 2.6.17.14 - fix wrong error handling in pccard_store_cis -
add NX mask for PTE entry on x86_64 - fix snd-hda-intel OOPS -
backported support r8169-related (r8168/r8169SC) network chipsets -
explicitly initialize some members of the drm_driver structure,
otherwise NULL init will have bad side effects (mach64) - support for
building a nosrc.rpm package - fixed unplug/eject on pcmcia cards with
r8169 chipsets - fix libata resource conflicts - fix xenU crash and
re-enable domU boot logs - fix refcount error triggered by software
using /proc/[pid]/auxv
To update your kernel, please follow the directions located at:
http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
fdcd9cdcd13729d19e87ea6e045c40a9 2007.0/i586/kernel-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
c5b92253d8359f40a1d58ce3fd2afa6d 2007.0/i586/kernel-enterprise-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
40aa09f4acfb3f55264a4077b6129ad2 2007.0/i586/kernel-legacy-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
ca4a8a25517d32f24bcf6540f8d4ac43 2007.0/i586/kernel-source-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
614b49725c3b0a23ef3520e1ce54e8ae 2007.0/i586/kernel-source-stripped-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
35d251fc2496a2fc6fa6d42bd7df0057 2007.0/i586/kernel-xen0-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
eb6e0f7788acc76c67843c839459d836 2007.0/i586/kernel-xenU-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
29e240e832e84eefd95a47a5dbec1df9 2007.0/SRPMS/kernel-2.6.17.6mdv-1-1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
4a134d3c6a5bb96b3191e750fe230cb6 2007.0/x86_64/kernel-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
14f2e578d613e3ae3f691980248df648 2007.0/x86_64/kernel-source-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
c60f34dfd4f0ed8a96902ce89e46178a 2007.0/x86_64/kernel-source-stripped-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
868743bd6503be82bb00a720404582df 2007.0/x86_64/kernel-xen0-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
47b108c6acae00650e9d8d0b64af1e3f 2007.0/x86_64/kernel-xenU-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
29e240e832e84eefd95a47a5dbec1df9 2007.0/SRPMS/kernel-2.6.17.6mdv-1-1mdv2007.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFFS3W9mqjQ0CJFipgRAgvwAKDln/xbiXvnXvSorxyMGbx6ry4eqQCfaK1K
AKA+tGe0QtTqhHsyZVy92Y4=
=B1/N
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists