lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1IhapT-00024a-Ng@artemis.annvix.ca>
Date: Mon, 15 Oct 2007 19:02:39 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:195 ] - Updated kernel packages fix multiple
 vulnerabilities and bugs


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:195
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : October 15, 2007
 Affected: 2007.0, 2007.1
 _______________________________________________________________________
 
 Problem Description:
 
 Some vulnerabilities were discovered and corrected in the Linux
 2.6 kernel:
 
 A stack-based buffer overflow in the random number generator could
 allow local root users to cause a denial of service or gain privileges
 by setting the default wakeup threshold to a value greater than the
 output pool size (CVE-2007-3105).
 
 The lcd_write function did not limit the amount of memory used by
 a caller, which allows local users to cause a denial of service
 (memory consumption) (CVE-2007-3513).
 
 The decode_choice function allowed remote attackers to cause a denial
 of service (crash) via an encoded out-of-range index value for a choice
 field which triggered a NULL pointer dereference (CVE-2007-3642).
 
 The Linux kernel allowed local users to send arbitrary signals
 to a child process that is running at higher privileges by
 causing a setuid-root parent process to die which delivered an
 attacker-controlled parent process death signal (PR_SET_PDEATHSIG)
 (CVE-2007-3848).
 
 The aac_cfg_openm and aac_compat_ioctl functions in the SCSI layer
 ioctl patch in aacraid did not check permissions for ioctls, which
 might allow local users to cause a denial of service or gain privileges
 (CVE-2007-4308).
 
 The IA32 system call emulation functionality, when running on the
 x86_64 architecture, did not zero extend the eax register after the
 32bit entry path to ptrace is used, which could allow local users to
 gain privileges by triggering an out-of-bounds access to the system
 call table using the %RAX register (CVE-2007-4573).
 
 In addition to these security fixes, other fixes have been included
 such as:
 
   - More NVidia PCI ids wre added
   - The 3w-9xxx module was updated to version 2.26.02.010
   - Fixed the map entry for ICH8
   - Added the TG3 5786 PCI id
   - Reduced the log verbosity of cx88-mpeg
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3105
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3513
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3642
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3848
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 f99dbf1673d8a021cc34846f1638867b  2007.0/i586/kernel-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
 50be9069d1764675309639acb2b40d56  2007.0/i586/kernel-doc-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
 d21ea9807b3439ac1b5dad14dd079b14  2007.0/i586/kernel-enterprise-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
 9580a6361e4d673ac8b0aaf03232007b  2007.0/i586/kernel-legacy-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
 ce58edd917bbbd868ef1ce1bb128c8d1  2007.0/i586/kernel-source-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
 b9177102e20d0f64b5cbff13cae899c5  2007.0/i586/kernel-source-stripped-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
 27682940a2c1885df7ada7dd68fe9efa  2007.0/i586/kernel-xen0-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
 f96636a80d0779e84f1caa8b3d92f723  2007.0/i586/kernel-xenU-2.6.17.16mdv-1-1mdv2007.0.i586.rpm 
 34cb36342f866a44d34627a809db2ee5  2007.0/SRPMS/kernel-2.6.17.16mdv-1-1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 6eebbdf78fac9ef6092be3f4f07e0fec  2007.0/x86_64/kernel-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
 b84feb968f88b161efd96711738eabb2  2007.0/x86_64/kernel-doc-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
 24f8db96f8c023208b9d3b5e9d161f5d  2007.0/x86_64/kernel-source-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
 37b99c870cc4e4aaecd17594559a2b04  2007.0/x86_64/kernel-source-stripped-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
 f318ae4d1d7f758ceed3c28a28bf0d7f  2007.0/x86_64/kernel-xen0-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
 bd571bf3e47a687fcd114c6c104979c1  2007.0/x86_64/kernel-xenU-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm 
 34cb36342f866a44d34627a809db2ee5  2007.0/SRPMS/kernel-2.6.17.16mdv-1-1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 03c90fe390f2ae9d7ceedb9dd266cfb2  2007.1/i586/kernel-2.6.17.16mdv-1-1mdv2007.1.i586.rpm
 4070fd24952fbcc9e0d8eba63a1a0c22  2007.1/i586/kernel-doc-2.6.17.16mdv-1-1mdv2007.1.i586.rpm
 a6585e8a4e5b2aa7e809760bc86be173  2007.1/i586/kernel-doc-latest-2.6.17-16mdv.i586.rpm
 e0b8a91221cb923b0e403770d54ed5c2  2007.1/i586/kernel-enterprise-2.6.17.16mdv-1-1mdv2007.1.i586.rpm
 c55e70042ca111ba1a479fab7412b488  2007.1/i586/kernel-enterprise-latest-2.6.17-16mdv.i586.rpm
 e90e9e003a100f28946967838b75a2ac  2007.1/i586/kernel-latest-2.6.17-16mdv.i586.rpm
 deebf4ee45c5c49982b371c616d1d80c  2007.1/i586/kernel-legacy-2.6.17.16mdv-1-1mdv2007.1.i586.rpm
 afc7017f980ee6530ad613dbbd657242  2007.1/i586/kernel-legacy-latest-2.6.17-16mdv.i586.rpm
 f568fbb3f175e6a21982c75b3d5d42fa  2007.1/i586/kernel-source-2.6.17.16mdv-1-1mdv2007.1.i586.rpm
 2c3eaa1460f8ef5f89457e67a336addf  2007.1/i586/kernel-source-latest-2.6.17-16mdv.i586.rpm
 a4dfaa5eb09bce6067269880bb5e78be  2007.1/i586/kernel-source-stripped-2.6.17.16mdv-1-1mdv2007.1.i586.rpm
 5aac10bfc905b78a10c1f2bbee5e93c4  2007.1/i586/kernel-source-stripped-latest-2.6.17-16mdv.i586.rpm
 62b77e1b1a8dc2ce3b9b259217f7819b  2007.1/i586/kernel-xen0-2.6.17.16mdv-1-1mdv2007.1.i586.rpm
 fa5877ae7b2a6184a44d8f2fc49ff57b  2007.1/i586/kernel-xen0-latest-2.6.17-16mdv.i586.rpm
 eb1c600edc37ea22bcec5332b7a97bbe  2007.1/i586/kernel-xenU-2.6.17.16mdv-1-1mdv2007.1.i586.rpm
 6b7f9b5fe6c0412747fa330a0156f9e8  2007.1/i586/kernel-xenU-latest-2.6.17-16mdv.i586.rpm 
 5f4702ebdfed6fbc6a836f08964c911e  2007.1/SRPMS/kernel-2.6.17.16mdv-1-1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 1432d1fbdba194acdcc48a99b9bd4724  2007.1/x86_64/kernel-2.6.17.16mdv-1-1mdv2007.1.x86_64.rpm
 2d32edff36cedd8e249496cfa82e4719  2007.1/x86_64/kernel-doc-2.6.17.16mdv-1-1mdv2007.1.x86_64.rpm
 1f0af512f928130e18eafd2e12bd0b15  2007.1/x86_64/kernel-doc-latest-2.6.17-16mdv.x86_64.rpm
 55ff10072e971b7ee826bd5724ce92f6  2007.1/x86_64/kernel-latest-2.6.17-16mdv.x86_64.rpm
 267f256e300350db12399c80c5bd76c7  2007.1/x86_64/kernel-source-2.6.17.16mdv-1-1mdv2007.1.x86_64.rpm
 c53bb5feb090da9625b0e4c9872c6e25  2007.1/x86_64/kernel-source-latest-2.6.17-16mdv.x86_64.rpm
 cdb950f30f11337728c600a2e99a361a  2007.1/x86_64/kernel-source-stripped-2.6.17.16mdv-1-1mdv2007.1.x86_64.rpm
 2ce0d1ce74d7a87a9cb926aa24d9c68d  2007.1/x86_64/kernel-source-stripped-latest-2.6.17-16mdv.x86_64.rpm
 bafc17acacad6204732b025157495c1a  2007.1/x86_64/kernel-xen0-2.6.17.16mdv-1-1mdv2007.1.x86_64.rpm
 21f2c70634abce8dd9417d6dbd177207  2007.1/x86_64/kernel-xen0-latest-2.6.17-16mdv.x86_64.rpm
 17078611f2cdbe9ec8a4baa37c7974a1  2007.1/x86_64/kernel-xenU-2.6.17.16mdv-1-1mdv2007.1.x86_64.rpm
 6f6c78f6156fa5be6a0c9396657df315  2007.1/x86_64/kernel-xenU-latest-2.6.17-16mdv.x86_64.rpm 
 5f4702ebdfed6fbc6a836f08964c911e  2007.1/SRPMS/kernel-2.6.17.16mdv-1-1mdv2007.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHE+NUmqjQ0CJFipgRAnkyAKCntnQOp/DKXMmki9ZhSr3MrSRz7QCfbVp5
a0jKaVKEtRHFZz/An+RIm0g=
=F+Jp
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ