[Security Announce] [ MDKSA-2006:197 ] - Updated kernel packages fix multiple vulnerabilities and bugs
Posted on: 11/04/2006 12:50 AM

The Mandriva Security Team published a new security update for Mandriva Linux. Here the announcement:

Hash: SHA1


Mandriva Linux Security Advisory MDKSA-2006:197

Package : kernel
Date : November 3, 2006
Affected: 2007.0

Problem Description:

Some vulnerabilities were discovered and corrected in the Linux 2.6

Bugs in the netfilter for IPv6 code, as reported by Mark Dowd, were
fixed (CVE-2006-4572).

The ATM subsystem of the Linux kernel could allow a remote attacker to
cause a Denial of Service (panic) via unknown vectors that cause the
ATM subsystem to access the memory of socket buffers after they are
freed (CVE-2006-4997).

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.

In addition to these security fixes, other fixes have been included
such as:

- updated to - fix wrong error handling in pccard_store_cis -
add NX mask for PTE entry on x86_64 - fix snd-hda-intel OOPS -
backported support r8169-related (r8168/r8169SC) network chipsets -
explicitly initialize some members of the drm_driver structure,
otherwise NULL init will have bad side effects (mach64) - support for
building a nosrc.rpm package - fixed unplug/eject on pcmcia cards with
r8169 chipsets - fix libata resource conflicts - fix xenU crash and
re-enable domU boot logs - fix refcount error triggered by software
using /proc/[pid]/auxv

To update your kernel, please follow the directions located at:




Updated Packages:

Mandriva Linux 2007.0:
fdcd9cdcd13729d19e87ea6e045c40a9 2007.0/i586/kernel-
c5b92253d8359f40a1d58ce3fd2afa6d 2007.0/i586/kernel-enterprise-
40aa09f4acfb3f55264a4077b6129ad2 2007.0/i586/kernel-legacy-
ca4a8a25517d32f24bcf6540f8d4ac43 2007.0/i586/kernel-source-
614b49725c3b0a23ef3520e1ce54e8ae 2007.0/i586/kernel-source-stripped-
35d251fc2496a2fc6fa6d42bd7df0057 2007.0/i586/kernel-xen0-
eb6e0f7788acc76c67843c839459d836 2007.0/i586/kernel-xenU-
29e240e832e84eefd95a47a5dbec1df9 2007.0/SRPMS/kernel-

Mandriva Linux 2007.0/X86_64:
4a134d3c6a5bb96b3191e750fe230cb6 2007.0/x86_64/kernel-
14f2e578d613e3ae3f691980248df648 2007.0/x86_64/kernel-source-
c60f34dfd4f0ed8a96902ce89e46178a 2007.0/x86_64/kernel-source-stripped-
868743bd6503be82bb00a720404582df 2007.0/x86_64/kernel-xen0-
47b108c6acae00650e9d8d0b64af1e3f 2007.0/x86_64/kernel-xenU-
29e240e832e84eefd95a47a5dbec1df9 2007.0/SRPMS/kernel-

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:


If you want to report vulnerabilities, please contact


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
Version: GnuPG v1.4.2.2 (GNU/Linux)


Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/security_announce_mdksa_2006197__updated_kernel_packages_fix_multiple_vulnerabilities_and_bugs.html)