Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme im Kernel
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme im Kernel
ID: MDKSA-2006:197
Distribution: Mandriva
Plattformen: Mandriva 2007.0
Datum: Fr, 3. November 2006, 23:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997
Applikationen: Linux

Originalnachricht

This is a multi-part message in MIME format...

------------=_1162594084-16192-850


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:197
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kernel
Date : November 3, 2006
Affected: 2007.0
_______________________________________________________________________

Problem Description:

Some vulnerabilities were discovered and corrected in the Linux 2.6
kernel:

Bugs in the netfilter for IPv6 code, as reported by Mark Dowd, were
fixed (CVE-2006-4572).

The ATM subsystem of the Linux kernel could allow a remote attacker to
cause a Denial of Service (panic) via unknown vectors that cause the
ATM subsystem to access the memory of socket buffers after they are
freed (CVE-2006-4997).

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.

In addition to these security fixes, other fixes have been included
such as:

- updated to 2.6.17.14 - fix wrong error handling in pccard_store_cis -
add NX mask for PTE entry on x86_64 - fix snd-hda-intel OOPS -
backported support r8169-related (r8168/r8169SC) network chipsets -
explicitly initialize some members of the drm_driver structure,
otherwise NULL init will have bad side effects (mach64) - support for
building a nosrc.rpm package - fixed unplug/eject on pcmcia cards with
r8169 chipsets - fix libata resource conflicts - fix xenU crash and
re-enable domU boot logs - fix refcount error triggered by software
using /proc/[pid]/auxv

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
fdcd9cdcd13729d19e87ea6e045c40a9
2007.0/i586/kernel-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
c5b92253d8359f40a1d58ce3fd2afa6d
2007.0/i586/kernel-enterprise-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
40aa09f4acfb3f55264a4077b6129ad2
2007.0/i586/kernel-legacy-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
ca4a8a25517d32f24bcf6540f8d4ac43
2007.0/i586/kernel-source-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
614b49725c3b0a23ef3520e1ce54e8ae
2007.0/i586/kernel-source-stripped-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
35d251fc2496a2fc6fa6d42bd7df0057
2007.0/i586/kernel-xen0-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
eb6e0f7788acc76c67843c839459d836
2007.0/i586/kernel-xenU-2.6.17.6mdv-1-1mdv2007.0.i586.rpm
29e240e832e84eefd95a47a5dbec1df9
2007.0/SRPMS/kernel-2.6.17.6mdv-1-1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
4a134d3c6a5bb96b3191e750fe230cb6
2007.0/x86_64/kernel-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
14f2e578d613e3ae3f691980248df648
2007.0/x86_64/kernel-source-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
c60f34dfd4f0ed8a96902ce89e46178a
2007.0/x86_64/kernel-source-stripped-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
868743bd6503be82bb00a720404582df
2007.0/x86_64/kernel-xen0-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
47b108c6acae00650e9d8d0b64af1e3f
2007.0/x86_64/kernel-xenU-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm
29e240e832e84eefd95a47a5dbec1df9
2007.0/SRPMS/kernel-2.6.17.6mdv-1-1mdv2007.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFS3W9mqjQ0CJFipgRAgvwAKDln/xbiXvnXvSorxyMGbx6ry4eqQCfaK1K
AKA+tGe0QtTqhHsyZVy92Y4=
=B1/N
-----END PGP SIGNATURE-----


------------=_1162594084-16192-850
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1162594084-16192-850--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung