lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Q1gfE-0000fK-Id@titan.mandriva.com>
Date: Mon, 21 Mar 2011 16:05:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2011:051 ] kernel

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2011:051
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : kernel
 Date    : March 18, 2011
 Affected: Corporate 4.0
 _______________________________________________________________________

 Problem Description:

 The do_anonymous_page function in mm/memory.c in the Linux kernel
 does not properly separate the stack and the heap, which allows
 context-dependent attackers to execute arbitrary code by writing
 to the bottom page of a shared memory segment, as demonstrated by a
 memory-exhaustion attack against the X.Org X server. (CVE-2010-2240)
 
 The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel
 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows
 local users to cause a denial of service (OOPS) via a setsockopt call
 that specifies a small value, leading to a divide-by-zero error or
 incorrect use of a signed integer. (CVE-2010-4165)
 
 The copy_shmid_to_user function in ipc/shm.c in the Linux kernel
 does not initialize a certain structure, which allows local users to
 obtain potentially sensitive information from kernel stack memory
 via vectors related to the shmctl system call and the old shm
 interface. (CVE-2010-4072)
 
 The ipc subsystem in the Linux kernel does not initialize certain
 structures, which allows local users to obtain potentially sensitive
 information from kernel stack memory via vectors related to the (1)
 compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl
 functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5)
 compat_sys_mq_getsetattr functions in ipc/compat_mq.c. (CVE-2010-4073)
 
 The copy_semid_to_user function in ipc/sem.c in the Linux kernel does
 not initialize a certain structure, which allows local users to obtain
 potentially sensitive information from kernel stack memory via a (1)
 IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a
 semctl system call. (CVE-2010-4083)
 
 The sisfb_ioctl function in drivers/video/sis/sis_main.c in the Linux
 kernel does not properly initialize a certain structure member, which
 allows local users to obtain potentially sensitive information from
 kernel stack memory via an FBIOGET_VBLANK ioctl call. (CVE-2010-4078)
 
 The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel
 does not properly initialize a certain structure member, which allows
 local users to obtain potentially sensitive information from kernel
 stack memory via an EQL_GETMASTRCFG ioctl call. (CVE-2010-3297)
 
 Integer signedness error in the pkt_find_dev_from_minor function in
 drivers/block/pktcdvd.c in the Linux kernel allows local users to
 obtain sensitive information from kernel memory or cause a denial of
 service (invalid pointer dereference and system crash) via a crafted
 index value in a PKT_CTRL_CMD_STATUS ioctl call. (CVE-2010-3437)
 
 fs/jfs/xattr.c in the Linux kernel does not properly handle a certain
 legacy format for storage of extended attributes, which might allow
 local users by bypass intended xattr namespace restrictions via an
 os2. substring at the beginning of a name. (CVE-2010-2946)
 
 Multiple integer signedness errors in net/rose/af_rose.c in the
 Linux kernel allow local users to cause a denial of service (heap
 memory corruption) or possibly have unspecified other impact via a
 rose_getname function call, related to
 the rose_bind and rose_connect functions. (CVE-2010-3310)
 
 Integer overflow in the do_io_submit function in fs/aio.c in the
 Linux allows local users to cause a denial of service or possibly
 have unspecified other impact via crafted use of the io_submit system
 call. (CVE-2010-3067)
 
 net/bridge/netfilter/ebtables.c in the ebtables module in the
 netfilter framework in the Linux kernel does not require the
 CAP_NET_ADMIN capability for setting or modifying rules, which
 allows local users to bypass intended access restrictions and
 configure arbitrary network-traffic filtering via a modified ebtables
 application. (CVE-2010-0007)
 
 The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel
 does not initialize a certain structure, which allows local users to
 obtain potentially sensitive information from kernel stack memory by
 reading a copy of this structure. (CVE-2010-3875)
 
 fs/cifs/cifssmb.c in the CIFS implementation in the Linux kernel
 allows remote attackers to cause a denial of service (panic) via an
 SMB response packet with an invalid CountHigh value, as demonstrated
 by a response from an OS/2 server, related to the CIFSSMBWrite and
 CIFSSMBWrite2 functions. (CVE-2010-2248)
 
 The personality subsystem in the Linux kernel has a PER_CLEAR_ON_SETID
 setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO
 flags when executing a setuid or setgid program, which makes it
 easier for local users to leverage the details of memory usage to (1)
 conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr
 protection mechanism, or (3) defeat address space layout randomization
 (ASLR). (CVE-2009-1895)
 
 The load_flat_shared_library function in fs/binfmt_flat.c in the
 flat subsystem in the Linux kernel allows local users to cause a
 denial of service (NULL pointer dereference and system crash) or
 possibly have unspecified other impact by executing a shared flat
 binary. (CVE-2009-2768)
 
 The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client
 in the Linux kernel allows remote NFS servers to cause a denial of
 service (NULL pointer dereference and panic) by sending a certain
 response containing incorrect file attributes, which trigger attempted
 use of an open file that lacks NFSv4 state. (CVE-2009-3726)
 
 The UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c
 in the Linux kernel allows local users to gain privileges or cause
 a denial of service (NULL pointer dereference and system crash) via
 vectors involving the MSG_MORE flag and a UDP socket. (CVE-2009-2698)
 
 Array index error in the gdth_read_event function in
 drivers/scsi/gdth.c in the Linux kernel allows local users to cause
 a denial of service or possibly gain privileges via a negative event
 index in an IOCTL request. (CVE-2009-3080)
 
 Multiple buffer overflows in fs/nfsd/nfs4xdr.c in the XDR
 implementation in the NFS server in the Linux kernel allow remote
 attackers to cause a denial of service (panic) or possibly execute
 arbitrary code via a crafted NFSv4 compound WRITE request, related
 to the read_buf and nfsd4_decode_compound functions. (CVE-2010-2521)
 
 net/ipv6/tcp_ipv6.c in Linux kernel  inadvertently copies the
 ipv6_fl_socklist from a listening TCP socket to child sockets, which
 allows local users to cause a denial of service (OOPS) or double-free
 by opening a listeing IPv6 socket,
 attaching a flow label, and connecting to that socket. (CVE-2007-1592)
 
 The ec_dev_ioctl function in net/econet/af_econet.c in the Linux
 kernel does not require the CAP_NET_ADMIN capability, which allows
 local users to bypass intended access restrictions and configure
 econet addresses via an SIOCSIFADDR ioctl call. (CVE-2010-3850)
 
 All these problems have been corrected, to update your kernel, please
 follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4083
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4078
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2946
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2768
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3726
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3080
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2521
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3850
 _______________________________________________________________________

 Updated Packages:

 Corporate 4.0:
 890c747a6a23bec5203df80fea437577  corporate/4.0/i586/kernel-2.6.12.43mdk-1-1mdk.i586.rpm
 035e67228d5d802ec1f1c435c336f1e4  corporate/4.0/i586/kernel-BOOT-2.6.12.43mdk-1-1mdk.i586.rpm
 91e5bd4db307150fa5fbf50557800d0b  corporate/4.0/i586/kernel-doc-2.6.12.43mdk-1-1mdk.i586.rpm
 709df005ea5296caa560bb214106bba0  corporate/4.0/i586/kernel-i586-up-1GB-2.6.12.43mdk-1-1mdk.i586.rpm
 a6a70d6d6d243e8899d28418841d3b30  corporate/4.0/i586/kernel-i686-up-4GB-2.6.12.43mdk-1-1mdk.i586.rpm
 fbf3f03e88f64a342299a6d1f71b77ff  corporate/4.0/i586/kernel-smp-2.6.12.43mdk-1-1mdk.i586.rpm
 00075e6ecb976667e6acc84b90a457e2  corporate/4.0/i586/kernel-source-2.6.12.43mdk-1-1mdk.i586.rpm
 be59ed3d9edaef100c73689ed8889e44  corporate/4.0/i586/kernel-source-stripped-2.6.12.43mdk-1-1mdk.i586.rpm
 d97fb8a8f4e91bda8fe196ae42db2bda  corporate/4.0/i586/kernel-xbox-2.6.12.43mdk-1-1mdk.i586.rpm
 2ebefb2a2891b11ec2e0b8a1a0182861  corporate/4.0/i586/kernel-xen0-2.6.12.43mdk-1-1mdk.i586.rpm
 fde48ce47fab86665c576c49af171ff6  corporate/4.0/i586/kernel-xenU-2.6.12.43mdk-1-1mdk.i586.rpm 
 c5b74f984e252360a20582e9acac64da  corporate/4.0/SRPMS/kernel-2.6.12.43mdk-1-1mdk.src.rpm

 Corporate 4.0/X86_64:
 f2a01a7f51ed7472dd997e095753be7b  corporate/4.0/x86_64/kernel-2.6.12.43mdk-1-1mdk.x86_64.rpm
 524510d3382ec95de0ca76dd4f760b2e  corporate/4.0/x86_64/kernel-BOOT-2.6.12.43mdk-1-1mdk.x86_64.rpm
 b0e576639faa836c7895ce05b4a4ac26  corporate/4.0/x86_64/kernel-doc-2.6.12.43mdk-1-1mdk.x86_64.rpm
 e56515d6f9675fc366b963fbfc7fbab4  corporate/4.0/x86_64/kernel-smp-2.6.12.43mdk-1-1mdk.x86_64.rpm
 20ac4ec4df1df4c170676116769c3f78  corporate/4.0/x86_64/kernel-source-2.6.12.43mdk-1-1mdk.x86_64.rpm
 5309f98e74877b41d99b75a1e04f0f74  corporate/4.0/x86_64/kernel-source-stripped-2.6.12.43mdk-1-1mdk.x86_64.rpm
 cdae6ee98462fb2503a7f0fc41381dfe  corporate/4.0/x86_64/kernel-xen0-2.6.12.43mdk-1-1mdk.x86_64.rpm
 e4fedcae85c0c3ba6d2e169f3faf3d06  corporate/4.0/x86_64/kernel-xenU-2.6.12.43mdk-1-1mdk.x86_64.rpm 
 c5b74f984e252360a20582e9acac64da  corporate/4.0/SRPMS/kernel-2.6.12.43mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNhz4MmqjQ0CJFipgRAvQCAKCjxkVbvV6tX/dquf3yaHOxUm7IxQCfRY5g
q9TSPal83qlvFGa4p/Zm6kM=
=51Io
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ