-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2007:040 http://www.mandriva.com/security/ _______________________________________________________________________ Package : kernel Date : February 7, 2007 Affected: 2007.0 _______________________________________________________________________ Problem Description: Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4, as well as the 2.6 kernel, does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash. (CVE-2006-5749) The listxattr syscall can corrupt user space under certain circumstances. The problem seems to be related to signed/unsigned conversion during size promotion. (CVE-2006-5753) The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext3 stream with malformed data structures. (CVE-2006-6053) The mincore function in the Linux kernel before 2.4.33.6, as well as the 2.6 kernel, does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock. (CVE-2006-4814) The provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels immediately and reboot to effect the fixes. In addition to these security fixes, other fixes have been included such as: - Add Ralink RT2571W/RT2671 WLAN USB support (rt73 module) - Fix sys_msync() to report -ENOMEM as before when an unmapped area falls within its range, and not to overshoot (LSB regression) - Avoid disk sector_t overflow for >2TB ext3 filesystem - USB: workaround to fix HP scanners detection (#26728) - USB: unusual_devs.h for Sony floppy (#28378) - Add preliminary ICH9 support - Add TI sd card reader support - Add RT61 driver - KVM update - Fix bttv vbi offset To update your kernel, please follow the directions located at: http://www.mandriva.com/en/security/kernelupdate _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5749 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5753 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6053 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4814 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.0: ad34fe5a73feafdd8e69b504ebf93946 2007.0/i586/kernel-2.6.17.10mdv-1-1mdv2007.0.i586.rpm d9e55a7e4f1008da15c67d1287956969 2007.0/i586/kernel-doc-2.6.17.10mdv-1-1mdv2007.0.i586.rpm a9c50df979df9e3689873978436bd16f 2007.0/i586/kernel-enterprise-2.6.17.10mdv-1-1mdv2007.0.i586.rpm f533abc7ea70bd3faaa9e6b28a99ab28 2007.0/i586/kernel-legacy-2.6.17.10mdv-1-1mdv2007.0.i586.rpm b8ff79d0ab16056f2d254e9d679984f7 2007.0/i586/kernel-source-2.6.17.10mdv-1-1mdv2007.0.i586.rpm 850dbb1496700b2f93ef37e4540164cc 2007.0/i586/kernel-source-stripped-2.6.17.10mdv-1-1mdv2007.0.i586.rpm 6e5109401747d368e768bb7ccce1c6e3 2007.0/i586/kernel-xen0-2.6.17.10mdv-1-1mdv2007.0.i586.rpm 0982fc7135735d78b4805c2af67ffe19 2007.0/i586/kernel-xenU-2.6.17.10mdv-1-1mdv2007.0.i586.rpm 2cfb0d90ab5aea99bacf8a721552554b 2007.0/SRPMS/kernel-2.6.17.10mdv-1-1mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: 8228636d0969cdb0de42baeab61ece09 2007.0/x86_64/kernel-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm 935eb44188aa2784386dd8bcc93dfd78 2007.0/x86_64/kernel-doc-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm 9abb549acacc17385051ceebcb3331fe 2007.0/x86_64/kernel-source-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm 7e3667b9f28f3214669f831955ef059d 2007.0/x86_64/kernel-source-stripped-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm 648ae5f919580ce2df42f6a522aba7c9 2007.0/x86_64/kernel-xen0-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm 0ad1d27a9232f5f7cf8ae218bef5a618 2007.0/x86_64/kernel-xenU-2.6.17.10mdv-1-1mdv2007.0.x86_64.rpm 2cfb0d90ab5aea99bacf8a721552554b 2007.0/SRPMS/kernel-2.6.17.10mdv-1-1mdv2007.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFygawmqjQ0CJFipgRApkZAJ9msOQyqvBro4UFl6L63oyv3/re3ACdGbmf qLwINu5TyT69bg9pYK1WILE= =I1se -----END PGP SIGNATURE-----