lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HEt2n-0006Nw-3j@artemis.annvix.ca>
Date: Wed, 07 Feb 2007 13:05:29 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:040 ] - Updated kernel packages fix multiple vulnerabilities and bugs


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:040
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : February 7, 2007
 Affected: 2007.0
 _______________________________________________________________________
 
 Problem Description:
 
 Some vulnerabilities were discovered and corrected in the Linux 2.6
 kernel:

 The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c
 in the Linux 2.4 kernel before 2.4.34-rc4, as well as the 2.6 kernel,
 does not call the init_timer function for the ISDN PPP CCP reset state
 timer, which has unknown attack vectors and results in a system crash.
 (CVE-2006-5749)

 The listxattr syscall can corrupt user space under certain
 circumstances. The problem seems to be related to signed/unsigned
 conversion during size promotion. (CVE-2006-5753)

 The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to
 cause a denial of service (crash) via an ext3 stream with malformed
 data structures. (CVE-2006-6053)

 The mincore function in the Linux kernel before 2.4.33.6, as well as
 the 2.6 kernel, does not properly lock access to user space, which has
 unspecified impact and attack vectors, possibly related to a deadlock.
 (CVE-2006-4814)

 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels immediately
 and reboot to effect the fixes.

 In addition to these security fixes, other fixes have been included
 such as:

 - Add Ralink RT2571W/RT2671 WLAN USB support (rt73 module) - Fix
 sys_msync() to report -ENOMEM as before when an unmapped area falls
 within its range, and not to overshoot (LSB regression) - Avoid disk
 sector_t overflow for >2TB ext3 filesystem - USB: workaround to fix HP
 scanners detection (#26728) - USB: unusual_devs.h for Sony floppy      
    (#28378) - Add preliminary ICH9 support - Add TI sd card reader
 support - Add RT61 driver - KVM update - Fix bttv vbi offset

 To update your kernel, please follow the directions located at:

 http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5749
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5753
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6053
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4814
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 ad34fe5a73feafdd8e69b504ebf93946  2007.0/i586/kernel-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
 d9e55a7e4f1008da15c67d1287956969  2007.0/i586/kernel-doc-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
 a9c50df979df9e3689873978436bd16f  2007.0/i586/kernel-enterprise-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
 f533abc7ea70bd3faaa9e6b28a99ab28  2007.0/i586/kernel-legacy-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
 b8ff79d0ab16056f2d254e9d679984f7  2007.0/i586/kernel-source-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
 850dbb1496700b2f93ef37e4540164cc  2007.0/i586/kernel-source-stripped-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
 6e5109401747d368e768bb7ccce1c6e3  2007.0/i586/kernel-xen0-2.6.17.10mdv-1-1mdv2007.0.i586.rpm
 0982fc7135735d78b4805c2af67ffe19  2007.0/i586/kernel-xenU-2.6.17.10mdv-1-1mdv2007.0.i586.rpm 
 2cfb0d90ab5aea99bacf8a721552554b  2007.0/SRPMS/kernel-2.6.17.10mdv-1-1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 8228636d0969cdb0de42baeab61ece09  2007.0/x86_64/kernel-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
 935eb44188aa2784386dd8bcc93dfd78  2007.0/x86_64/kernel-doc-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
 9abb549acacc17385051ceebcb3331fe  2007.0/x86_64/kernel-source-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
 7e3667b9f28f3214669f831955ef059d  2007.0/x86_64/kernel-source-stripped-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
 648ae5f919580ce2df42f6a522aba7c9  2007.0/x86_64/kernel-xen0-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm
 0ad1d27a9232f5f7cf8ae218bef5a618  2007.0/x86_64/kernel-xenU-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm 
 2cfb0d90ab5aea99bacf8a721552554b  2007.0/SRPMS/kernel-2.6.17.10mdv-1-1mdv2007.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFygawmqjQ0CJFipgRApkZAJ9msOQyqvBro4UFl6L63oyv3/re3ACdGbmf
qLwINu5TyT69bg9pYK1WILE=
=I1se
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ