exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2007.226

Mandriva Linux Security Advisory 2007.226
Posted Nov 26, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set.

tags | advisory, remote, denial of service, kernel, local, vulnerability
systems | linux, minix, mandriva
advisories | CVE-2006-6058, CVE-2007-4997
SHA-256 | 89f7e97dfe062a6a8a1f5cfeecfc09fb45d983d76db73bbaff83505cc87f53ae

Mandriva Linux Security Advisory 2007.226

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:226
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kernel
Date : November 19, 2007
Affected: 2008.0
_______________________________________________________________________

Problem Description:

Some vulnerabilities were discovered and corrected in the Linux
2.6 kernel:

The minix filesystem code allows local users to cause a denial of
service (hang) via a malformed minix file stream (CVE-2006-6058).

An integer underflow in the Linux kernel prior to 2.6.23 allows remote
attackers to cause a denial of service (crash) via a crafted SKB length
value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA
flag is set (CVE-2007-4997).

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
bfb8abfb7532255d239ce8ef3b39966b 2008.0/i586/kernel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
c68305809aa8704146ea1a59cd687ab1 2008.0/i586/kernel-desktop-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
89a439f86bd47820345287275fe25674 2008.0/i586/kernel-desktop-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
a13eab853fc0b044456d90d98c8e9008 2008.0/i586/kernel-desktop-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
229f00634e286da1ab490678cf201dab 2008.0/i586/kernel-desktop-latest-2.6.22.9-2mdv2008.0.i586.rpm
e77c3f728f0ba5bf8491e27ef389df8c 2008.0/i586/kernel-desktop586-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
82d8110dc838a1a25b2d4de0e94872e3 2008.0/i586/kernel-desktop586-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
0be66b6c155ff5888900f784bf21f555 2008.0/i586/kernel-desktop586-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
48976bcfb3ecd30b2c2a671e49f2d241 2008.0/i586/kernel-desktop586-latest-2.6.22.9-2mdv2008.0.i586.rpm
372de082e77dec0e87d93f389bff76cf 2008.0/i586/kernel-doc-2.6.22.9-2mdv2008.0.i586.rpm
8fb68460352343d0c14b3d2c5581375f 2008.0/i586/kernel-laptop-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
0c76031c7eb78ba7da93b83ebf531541 2008.0/i586/kernel-laptop-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
059f66f5340e538dda3d748276313975 2008.0/i586/kernel-laptop-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
4d6c700c736a476718c809fb3a470ed9 2008.0/i586/kernel-laptop-latest-2.6.22.9-2mdv2008.0.i586.rpm
57e0382893adc64445913de674815ad5 2008.0/i586/kernel-server-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
f2ea96b6c7f83f8de0f27dc1c2ea9193 2008.0/i586/kernel-server-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
4de3613951fda9c4c92fcb35fe743a04 2008.0/i586/kernel-server-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
4cc8313e4fed4a1a966bc4f4d0819f71 2008.0/i586/kernel-server-latest-2.6.22.9-2mdv2008.0.i586.rpm
a30a7a388cdcdf089c39f7a7c26e34f0 2008.0/i586/kernel-source-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
5b919908b67f94571a4851caf08e8ece 2008.0/i586/kernel-source-latest-2.6.22.9-2mdv2008.0.i586.rpm
6e797fd0fea50e2b0290ca082ca9c1db 2008.0/SRPMS/kernel-2.6.22.9-2mdv2007.0.src.rpm

Mandriva Linux 2008.0/X86_64:
d30b2a76ab4e37f296f07380fa8d41a4 2008.0/x86_64/kernel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
3cdbd2356b7400f831a8b759d13952ec 2008.0/x86_64/kernel-desktop-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
a60abdec0274a9f96be2fb1117eb2f4a 2008.0/x86_64/kernel-desktop-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
272ac8a552c99a1b72303a92f474d46f 2008.0/x86_64/kernel-desktop-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
8c78406bc678b51a4c84526b0874703e 2008.0/x86_64/kernel-desktop-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
8447a07d292dd930bba13a6d06bf6570 2008.0/x86_64/kernel-doc-2.6.22.9-2mdv2008.0.x86_64.rpm
546663f7f08a1ed4a0e561c06960872e 2008.0/x86_64/kernel-laptop-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
482b6130e1695693ebfd610aade49255 2008.0/x86_64/kernel-laptop-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
280678d50696a95f56735ad91fcc92ef 2008.0/x86_64/kernel-laptop-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
f4fedb72b7d286f9b9dae772b8251a7a 2008.0/x86_64/kernel-laptop-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
c811160740d5c4e138430fb757803bcc 2008.0/x86_64/kernel-server-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
1078b15d6cb4a1c420e7212d4a7ca545 2008.0/x86_64/kernel-server-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
e127a24e39d458865ebc54e61a7db34b 2008.0/x86_64/kernel-server-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
347576ae981042a8277c2adcdb433cfc 2008.0/x86_64/kernel-server-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
464e4b918285dac78af1b2521ebac461 2008.0/x86_64/kernel-source-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
affd96915a01aa3927dda61bd1fad19d 2008.0/x86_64/kernel-source-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
6e797fd0fea50e2b0290ca082ca9c1db 2008.0/SRPMS/kernel-2.6.22.9-2mdv2007.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHQfTKmqjQ0CJFipgRAm4KAJ9vlEIIafxXuBzFtS4lpZ7H98u+OACfeqnj
6pOfo1qywkIBnd5cQnlOdtM=
=qX1m
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close