[Security Announce] [ MDKSA-2007:047 ] - Updated kernel packages fix multiple vulnerabilities and bugs
Posted on: 02/21/2007 09:25 PM

The Mandriva Security Team published a new security update for Mandriva Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:047
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kernel
Date : February 21, 2007
Affected: 2007.0
_______________________________________________________________________

Problem Description:

Some vulnerabilities were discovered and corrected in the Linux 2.6
kernel:

A double free vulnerability in the squashfs module could allow a local
user to cause a Denial of Service by mounting a crafted squashfs
filesystem (CVE-2006-5701).

The zlib_inflate function allows local users to cause a crash via a
malformed filesystem that uses zlib compression that triggers memory
corruption (CVE-2006-5823).

The key serial number collision avoidance code in the key_alloc_serial
function in kernels 2.6.9 up to 2.6.20 allows local users to cause a
crash via vectors thatr trigger a null dereference (CVE-2007-0006).

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.

In addition to these security fixes, other fixes have been included
such as:

- New drivers: nozomi, UVC
- Fixed SiS SATA support for chips on 966/968 bridges
- Fixed issues in squashfs by updating to 3.2 (#27008)
- Added support for SiS968 bridgest to the sis190 bridge
- Fixed JMicron cable detection
- Added /proc/config.gz support and enabled kexec on x86_64
- Other minor fixes

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0006
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
07df9cceca48092bca1fd65cadf91e69 2007.0/i586/kernel-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
a1dbf1afa75579198166a3f4a74f45d5 2007.0/i586/kernel-doc-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
da3d2669e324068dd7563a29356a6221 2007.0/i586/kernel-enterprise-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
1e1508188ec35415a880978c3c90c7ce 2007.0/i586/kernel-legacy-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
2d0f1e67c091bd9c62cb4f63b9ef7356 2007.0/i586/kernel-source-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
d76607bf4889d5a6d0a3633a84475684 2007.0/i586/kernel-source-stripped-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
d6d3e09457c438b71cb03d3622867019 2007.0/i586/kernel-xen0-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
241b7b83709ec8811fb8b2969ae5bfda 2007.0/i586/kernel-xenU-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
b971ee2fe8d6ddc83765cb2705671e35 2007.0/SRPMS/kernel-2.6.17.11mdv-1-1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
7293720ba20f54c1522263b0d1e58577 2007.0/x86_64/kernel-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
7a32b034b1452b1d102fed6fca411aa2 2007.0/x86_64/kernel-doc-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
db02f60611db9824215440969b52d2ac 2007.0/x86_64/kernel-source-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
4751c8e5fb383bf08f29f172bc1c11f2 2007.0/x86_64/kernel-source-stripped-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
e467c45bdab2bfc663b0b0a0ab135d84 2007.0/x86_64/kernel-xen0-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
9c00e25c5f5ea6be9d96c4a2139836a6 2007.0/x86_64/kernel-xenU-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
b971ee2fe8d6ddc83765cb2705671e35 2007.0/SRPMS/kernel-2.6.17.11mdv-1-1mdv2007.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
lt;security*mandriva.comgt;
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFF3HwWmqjQ0CJFipgRAkCfAKCX0gHpVuviY1XvstagrhWoA3SO+QCfQEia
bEwFnnh0MdO2y2+vSLUpPXs=
├▒EK
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/security_announce_mdksa_2007047__updated_kernel_packages_fix_multiple_vulnerabilities_and_bugs.html)