[ MDKSA-2007:047 ] - Updated kernel packages fix multiple vulnerabilities and bugs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:047
http://www.mandriva.com/security/
_______________________________________________________________________
Package : kernel
Date : February 21, 2007
Affected: 2007.0
_______________________________________________________________________
Problem Description:
Some vulnerabilities were discovered and corrected in the Linux 2.6
kernel:
A double free vulnerability in the squashfs module could allow a local
user to cause a Denial of Service by mounting a crafted squashfs
filesystem (CVE-2006-5701).
The zlib_inflate function allows local users to cause a crash via a
malformed filesystem that uses zlib compression that triggers memory
corruption (CVE-2006-5823).
The key serial number collision avoidance code in the key_alloc_serial
function in kernels 2.6.9 up to 2.6.20 allows local users to cause a
crash via vectors thatr trigger a null dereference (CVE-2007-0006).
The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.
In addition to these security fixes, other fixes have been included
such as:
- New drivers: nozomi, UVC
- Fixed SiS SATA support for chips on 966/968 bridges
- Fixed issues in squashfs by updating to 3.2 (#27008)
- Added support for SiS968 bridgest to the sis190 bridge
- Fixed JMicron cable detection
- Added /proc/config.gz support and enabled kexec on x86_64
- Other minor fixes
To update your kernel, please follow the directions located at:
http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0006
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
07df9cceca48092bca1fd65cadf91e69
2007.0/i586/kernel-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
a1dbf1afa75579198166a3f4a74f45d5
2007.0/i586/kernel-doc-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
da3d2669e324068dd7563a29356a6221
2007.0/i586/kernel-enterprise-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
1e1508188ec35415a880978c3c90c7ce
2007.0/i586/kernel-legacy-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
2d0f1e67c091bd9c62cb4f63b9ef7356
2007.0/i586/kernel-source-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
d76607bf4889d5a6d0a3633a84475684
2007.0/i586/kernel-source-stripped-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
d6d3e09457c438b71cb03d3622867019
2007.0/i586/kernel-xen0-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
241b7b83709ec8811fb8b2969ae5bfda
2007.0/i586/kernel-xenU-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
b971ee2fe8d6ddc83765cb2705671e35
2007.0/SRPMS/kernel-2.6.17.11mdv-1-1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
7293720ba20f54c1522263b0d1e58577
2007.0/x86_64/kernel-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
7a32b034b1452b1d102fed6fca411aa2
2007.0/x86_64/kernel-doc-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
db02f60611db9824215440969b52d2ac
2007.0/x86_64/kernel-source-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
4751c8e5fb383bf08f29f172bc1c11f2
2007.0/x86_64/kernel-source-stripped-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
e467c45bdab2bfc663b0b0a0ab135d84
2007.0/x86_64/kernel-xen0-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
9c00e25c5f5ea6be9d96c4a2139836a6
2007.0/x86_64/kernel-xenU-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
b971ee2fe8d6ddc83765cb2705671e35
2007.0/SRPMS/kernel-2.6.17.11mdv-1-1mdv2007.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFF3HwWmqjQ0CJFipgRAkCfAKCX0gHpVuviY1XvstagrhWoA3SO+QCfQEia
bEwFnnh0MdO2y2+vSLUpPXs=
=F1EK
-----END PGP SIGNATURE-----