To: [email protected]Subject: [ MDKSA-2007:025 ] - Updated kernel packages fix multiple vulnerabilities and bugs
Date: Tue, 23 Jan 2007 12:11:17 -0700
From: [email protected]
Reply-To: <xsecurity@mandriva.com.>
Message-Id: <E1H9R37-0000zD-EV@artemis.annvix.ca.>
Sender: QA Team <qateam@artemis.annvix.ca.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:025
http://www.mandriva.com/security/
_______________________________________________________________________
Package : kernel
Date : January 23, 2007
Affected: Corporate 3.0, Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
Some vulnerabilities were discovered and corrected in the Linux 2.6
kernel:
The 2.6 kernel prior to 2.6.12 allows remote attackers to poison the
bridge forwarding table using frames that have already been dropped by
filtering, which can cause the bridge to forward spoofed packets
(CVE-2005-3272).
Prior to 2.6.15.5, the kernel allows local users to cause a DoS
("endless recursive fault") via unknown attack vectors related to a
"bad elf entry address" on Intel processors (CVE-2006-0741).
A race condition in the socket buffer handling in the 2.6.9 kernel and
earlier versions could allow a remote attacker to cause a DoS (crash)
(CVE-2006-2446).
Stephane Eranian discovered an issue with permon2.0 where, under
certain circumstances, the perfmonctl() system call may not correctly
manage the file descriptor reference count, resulting in the system
possibly running out of file structure (CVE-2006-3741).
Prior to and including 2.6.17, the Universal Disk Format (UDF)
filesystem driver allowed local users to cause a DoS (hang and crash)
via certain operations involving truncated files (CVE-2006-4145).
Various versions of the Linux kernel allowed local users to cause a DoS
(crash) via an SCTP socket with a certain SO_LINGER value, which is
possibly related to the patch used to correct CVE-2006-3745
(CVE-2006-4535).
The __block_prepate_write function in the 2.6 kernel before 2.6.13 does
not properly clear buffers during certain error conditions, which
allows users to read portions of files that have been unlinked
(CVE-2006-4813).
The clip_mkip function of the ATM subsystem in the 2.6 kernel allows
remote attackers to dause a DoS (panic) via unknown vectors that cause
the ATM subsystem to access the memory of socket buffers after they are
freed (CVE-2006-4997).
The seqfile handling in the 2.6 kernel up to 2.6.18 allows local users
to cause a DoS (hang or oops) via unspecified manipulations that
trigger an infinite loop while searching for flowlabels
(CVE-2006-5619).
A missing call to init_timer() in the isdn_ppp code of the Linux kernel
can allow remote attackers to send a special kind of PPP pakcet which
may trigger a kernel oops (CVE-2006-5749).
The aio_setup_ring() function initializes a variable incorrectly which
can be used in error path to free allocated resources which could allow
a local user to crash the node (CVE-2006-5754).
A vulnerability in the bluetooth support could allow for overwriting
internal CMTP and CAPI data structures via malformed packets
(CVE-2006-6106).
The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.
To update your kernel, please follow the directions located at:
http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3272http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0741http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2446http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3741http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4145http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4535http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4813http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5619http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5749http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5754http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6106
_______________________________________________________________________
Updated Packages:
Corporate 3.0:
c807857c820dae84bad9beac5ff132c2 corporate/3.0/i586/kernel-2.6.3.36mdk-1-1mdk.i586.rpm
9502a05c5049f394b50a4f2128ca7311 corporate/3.0/i586/kernel-BOOT-2.6.3.36mdk-1-1mdk.i586.rpm
26b4a92d5ed2c1953fb88fd304584281 corporate/3.0/i586/kernel-doc-2.6.3-36mdk.i586.rpm
c2f4619bf4b4d9d3952ccad7eb4be16d corporate/3.0/i586/kernel-enterprise-2.6.3.36mdk-1-1mdk.i586.rpm
20970c40ded39599c4ad6bc976447c8c corporate/3.0/i586/kernel-i686-up-4GB-2.6.3.36mdk-1-1mdk.i586.rpm
5856cd990d971667d673216603cc9b1f corporate/3.0/i586/kernel-p3-smp-64GB-2.6.3.36mdk-1-1mdk.i586.rpm
0e978fa73922d870b487c2f8d14eaff3 corporate/3.0/i586/kernel-secure-2.6.3.36mdk-1-1mdk.i586.rpm
fa9f0cdd42385ec68aa79198d2615617 corporate/3.0/i586/kernel-smp-2.6.3.36mdk-1-1mdk.i586.rpm
8f9766f48b56d6a56333dcec3cfa611d corporate/3.0/i586/kernel-source-2.6.3-36mdk.i586.rpm
841863d5446060606da060acf72afce0 corporate/3.0/i586/kernel-source-stripped-2.6.3-36mdk.i586.rpm
15c7992f878a9ebcf38694d5700d90af corporate/3.0/SRPMS/kernel-2.6.3.36mdk-1-1mdk.src.rpm
Corporate 3.0/X86_64:
9f3bb7174878cc5044386356e1c4bc57 corporate/3.0/x86_64/kernel-2.6.3.36mdk-1-1mdk.x86_64.rpm
613608913f5dcb696b26e31ce5c01828 corporate/3.0/x86_64/kernel-BOOT-2.6.3.36mdk-1-1mdk.x86_64.rpm
b6daad6d8d1c8bb7b8053935434ccd4b corporate/3.0/x86_64/kernel-doc-2.6.3-36mdk.x86_64.rpm
19857cc0134d55a81cfecf099b5f1715 corporate/3.0/x86_64/kernel-secure-2.6.3.36mdk-1-1mdk.x86_64.rpm
b0cc99ea1220b2e3bd7922be994b3aef corporate/3.0/x86_64/kernel-smp-2.6.3.36mdk-1-1mdk.x86_64.rpm
8044690dcbf0a3a0c7b2e09bcc76a8d6 corporate/3.0/x86_64/kernel-source-2.6.3-36mdk.x86_64.rpm
b67484105e125306b4dd5fdb5b84d67d corporate/3.0/x86_64/kernel-source-stripped-2.6.3-36mdk.x86_64.rpm
15c7992f878a9ebcf38694d5700d90af corporate/3.0/SRPMS/kernel-2.6.3.36mdk-1-1mdk.src.rpm
Multi Network Firewall 2.0:
c807857c820dae84bad9beac5ff132c2 mnf/2.0/i586/kernel-2.6.3.36mdk-1-1mdk.i586.rpm
20970c40ded39599c4ad6bc976447c8c mnf/2.0/i586/kernel-i686-up-4GB-2.6.3.36mdk-1-1mdk.i586.rpm
5856cd990d971667d673216603cc9b1f mnf/2.0/i586/kernel-p3-smp-64GB-2.6.3.36mdk-1-1mdk.i586.rpm
0e978fa73922d870b487c2f8d14eaff3 mnf/2.0/i586/kernel-secure-2.6.3.36mdk-1-1mdk.i586.rpm
fa9f0cdd42385ec68aa79198d2615617 mnf/2.0/i586/kernel-smp-2.6.3.36mdk-1-1mdk.i586.rpm
15c7992f878a9ebcf38694d5700d90af mnf/2.0/SRPMS/kernel-2.6.3.36mdk-1-1mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFFtjLVmqjQ0CJFipgRAh4NAJ9mBphKCqAcJJxFx+Pu93PWLFj2QgCfTU9W
Pjt+NcjswOJYQvr5JIMDWzg=
=Vm8v
-----END PGP SIGNATURE-----