lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed Dec 21 22:46:34 2005
From: security at mandriva.com (Mandriva Security Team)
Subject: MDKSA-2005:235 - Updated kernel packages fix
	numerous vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2005:235
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : kernel
 Date    : December 21, 2005
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 Multiple vulnerabilities in the Linux 2.6 kernel have been discovered
 and corrected in this update:
 
 A stack-based buffer overflow in the sendmsg function call in versions
 prior to 2.6.13.1 allow local users to execute arbitrary code by
 calling sendmsg and modifying the message contents in another thread
 (CVE-2005-2490).
 
 The raw_sendmsg function in versions prior to 2.6.13.1 allow local
 users to cause a DoS (change hardware state) or read from arbitrary
 memory via crafted input (CVE-2005-2492).
 
 The ipt_recent module in versions prior to 2.6.12 does not properly
 perform certain tests when the jiffies value is greater than LONG_MAX,
 which can cause ipt_recent netfilter rules to block too early
 (CVE-2005-2873).
 
 Multiple vulnerabilities in versions prior to 2.6.13.2 allow local
 users to cause a DoS (oops from null dereference) via fput in a 32bit
 ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl
 function on 64-bit systems (CVE-2005-3044).
 
 Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)
 via a userspace process that issues a USB Request Block (URB) to a USB
 device and terminates before the URB is finished, which leads to a
 stale pointer reference (CVE-2005-3055).
 
 drm.c in version 2.6.13 and earlier creates a debug file in sysfs with
 world-readable and world-writable permissions, allowing local users to
 enable DRM debugging and obtain sensitive information (CVE-2005-3179).
 
 The Orinoco driver in 2.6.13 and earlier does not properly clear memory
 from a previously used packet whose length is increased, allowing
 remote attackers to obtain sensitive information (CVE-2005-3180).
 
 Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an
 incorrect function to free names_cache memory, preventing the memory
 from being tracked by AUDITSYSCALL code and leading to a memory leak
 (CVE-2005-3181).
 
 The VT implementation in version 2.6.12 allows local users to use
 certain IOCTLs on terminals of other users and gain privileges
 (CVE-2005-3257).
 
 A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when
 running on SMP systems, allows local users to cause a DoS (null
 dereference) by causing a connection timer to expire while the
 connection table is being flushed before the appropriate lock is
 acquired (CVE-2005-3274).
 
 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels.
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3179
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 a010bd5617177d007f3907e5cb1a7eaf  2006.0/RPMS/kernel-2.6.12.14mdk-1-1mdk.i586.rpm
 ae019c85ae823dd0045759e68e5a415f  2006.0/RPMS/kernel-i586-up-1GB-2.6.12.14mdk-1-1mdk.i586.rpm
 519cffb096c4371fcdba4ea15c7af8ac  2006.0/RPMS/kernel-i686-up-4GB-2.6.12.14mdk-1-1mdk.i586.rpm
 2093641b27dd2917afd50f8daa68100b  2006.0/RPMS/kernel-smp-2.6.12.14mdk-1-1mdk.i586.rpm
 d8532d9bc53c3abd28f530ed536ac1b1  2006.0/RPMS/kernel-source-2.6-2.6.12-14mdk.i586.rpm
 8fbab680135fccd60c7da9533af72d33  2006.0/RPMS/kernel-source-stripped-2.6-2.6.12-14mdk.i586.rpm
 475fc01a6bcd294890ca55b814bd0151  2006.0/RPMS/kernel-xbox-2.6.12.14mdk-1-1mdk.i586.rpm
 cdde86f8ae57d9b08f732268e534ef85  2006.0/RPMS/kernel-xen0-2.6.12.14mdk-1-1mdk.i586.rpm
 834ddd648671714a008303f5d8be5561  2006.0/RPMS/kernel-xenU-2.6.12.14mdk-1-1mdk.i586.rpm
 6bb497c8205003ffc8538e81cdc2e0f9  2006.0/SRPMS/kernel-2.6.12.14mdk-1-1mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 9fce74d95a1678c5c5217d6b113e08be  x86_64/2006.0/RPMS/kernel-2.6.12.14mdk-1-1mdk.x86_64.rpm
 5997517d826bf551567f2f7586f2f2ea  x86_64/2006.0/RPMS/kernel-smp-2.6.12.14mdk-1-1mdk.x86_64.rpm
 0f57a42ee8ef90cf2f60c8f3cc011f26  x86_64/2006.0/RPMS/kernel-source-2.6-2.6.12-14mdk.x86_64.rpm
 26a234853ea00c0e6f29526e023c26e4  x86_64/2006.0/RPMS/kernel-source-stripped-2.6-2.6.12-14mdk.x86_64.rpm
 6bb497c8205003ffc8538e81cdc2e0f9  x86_64/2006.0/SRPMS/kernel-2.6.12.14mdk-1-1mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDqbDLmqjQ0CJFipgRArpbAKDD9dJXm9FTggU6khmIxM31QsbkigCdEd6Y
rYVPJj5H9ob4JzlvsWDsQgw=
=W8YT
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists