[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HEt2n-0006Nw-3j@artemis.annvix.ca>
Date: Wed, 07 Feb 2007 13:05:29 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:040 ] - Updated kernel packages fix multiple vulnerabilities and bugs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:040
http://www.mandriva.com/security/
_______________________________________________________________________
Package : kernel
Date : February 7, 2007
Affected: 2007.0
_______________________________________________________________________
Problem Description:
Some vulnerabilities were discovered and corrected in the Linux 2.6
kernel:
The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c
in the Linux 2.4 kernel before 2.4.34-rc4, as well as the 2.6 kernel,
does not call the init_timer function for the ISDN PPP CCP reset state
timer, which has unknown attack vectors and results in a system crash.
(CVE-2006-5749)
The listxattr syscall can corrupt user space under certain
circumstances. The problem seems to be related to signed/unsigned
conversion during size promotion. (CVE-2006-5753)
The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to
cause a denial of service (crash) via an ext3 stream with malformed
data structures. (CVE-2006-6053)
The mincore function in the Linux kernel before 2.4.33.6, as well as
the 2.6 kernel, does not properly lock access to user space, which has
unspecified impact and attack vectors, possibly related to a deadlock.
(CVE-2006-4814)
The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.
In addition to these security fixes, other fixes have been included
such as:
- Add Ralink RT2571W/RT2671 WLAN USB support (rt73 module) - Fix
sys_msync() to report -ENOMEM as before when an unmapped area falls
within its range, and not to overshoot (LSB regression) - Avoid disk
sector_t overflow for >2TB ext3 filesystem - USB: workaround to fix HP
scanners detection (#26728) - USB: unusual_devs.h for Sony floppy
(#28378) - Add preliminary ICH9 support - Add TI sd card reader
support - Add RT61 driver - KVM update - Fix bttv vbi offset
To update your kernel, please follow the directions located at:
http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5749
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6053
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4814
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
ad34fe5a73feafdd8e69b504ebf93946 2007.0/i586/kernel-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
d9e55a7e4f1008da15c67d1287956969 2007.0/i586/kernel-doc-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
a9c50df979df9e3689873978436bd16f 2007.0/i586/kernel-enterprise-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
f533abc7ea70bd3faaa9e6b28a99ab28 2007.0/i586/kernel-legacy-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
b8ff79d0ab16056f2d254e9d679984f7 2007.0/i586/kernel-source-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
850dbb1496700b2f93ef37e4540164cc 2007.0/i586/kernel-source-stripped-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
6e5109401747d368e768bb7ccce1c6e3 2007.0/i586/kernel-xen0-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
0982fc7135735d78b4805c2af67ffe19 2007.0/i586/kernel-xenU-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
2cfb0d90ab5aea99bacf8a721552554b 2007.0/SRPMS/kernel-2.6.17.10mdv-1-1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
8228636d0969cdb0de42baeab61ece09 2007.0/x86_64/kernel-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
935eb44188aa2784386dd8bcc93dfd78 2007.0/x86_64/kernel-doc-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
9abb549acacc17385051ceebcb3331fe 2007.0/x86_64/kernel-source-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
7e3667b9f28f3214669f831955ef059d 2007.0/x86_64/kernel-source-stripped-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
648ae5f919580ce2df42f6a522aba7c9 2007.0/x86_64/kernel-xen0-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
0ad1d27a9232f5f7cf8ae218bef5a618 2007.0/x86_64/kernel-xenU-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
2cfb0d90ab5aea99bacf8a721552554b 2007.0/SRPMS/kernel-2.6.17.10mdv-1-1mdv2007.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFFygawmqjQ0CJFipgRApkZAJ9msOQyqvBro4UFl6L63oyv3/re3ACdGbmf
qLwINu5TyT69bg9pYK1WILE=
=I1se
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists