Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVSA-2008:220 ] kernel

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1225322115-14940-1651

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Security Advisory MDVSA-2008:220

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : kernel

Date : October 29, 2008

Affected: Corporate 4.0

_______________________________________________________________________

 

Problem Description:

 

Some vulnerabilities were discovered and corrected in the Linux

2.6 kernel:

 

The snd_seq_oss_synth_make_info function in

sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux

kernel before 2.6.27-rc2 does not verify that the device number is

within the range defined by max_synthdev before returning certain

data to the caller, which allows local users to obtain sensitive

information. (CVE-2008-3272)

 

Unspecified vulnerability in the 32-bit and 64-bit emulation in the

Linux kernel 2.6.9, 2.6.18, and probably other versions allows local

users to read uninitialized memory via unknown vectors involving a

crafted binary. (CVE-2008-0598)

 

The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c

in the vfs implementation in the Linux kernel before 2.6.25.15 does

not prevent creation of a child dentry for a deleted (aka S_DEAD)

directory, which allows local users to cause a denial of service

(overflow of the UBIFS orphan area) via a series of attempted file

creations within deleted directories. (CVE-2008-3275)

 

Integer overflow in the sctp_setsockopt_auth_key function in

net/sctp/socket.c in the Stream Control Transmission Protocol (sctp)

implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows

remote attackers to cause a denial of service (panic) or possibly have

unspecified other impact via a crafted sca_keylength field associated

with the SCTP_AUTH_KEY option. (CVE-2008-3525)

 

fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23

does not properly zero out the dio struct, which allows local users

to cause a denial of service (OOPS), as demonstrated by a certain

fio test. (CVE-2007-6716)

 

fs/open.c in the Linux kernel before 2.6.22 does not properly strip

setuid and setgid bits when there is a write to a file, which allows

local users to gain the privileges of a different group, and obtain

sensitive information or possibly have unspecified other impact,

by creating an executable file in a setgid directory through the (1)

truncate or (2) ftruncate function in conjunction with memory-mapped

I/O. (CVE-2008-4210)

 

Additionaly, support for Intel's ICH9 controller was added, and 'tg3'

driver was updated to version 3.71b.

 

To update your kernel, please follow the directions located at:

 

http://www.mandriva.com/en/security/kernelupdate

_______________________________________________________________________

 

References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3272

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0598

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6716

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210

_______________________________________________________________________

 

Updated Packages:

 

Corporate 4.0:

18e4f866e828c034bec76ac8d7f26525 corporate/4.0/i586/kernel-2.6.12.37mdk-1-1mdk.i586.rpm

0bda3e86d35cd861555ca47745923a3a corporate/4.0/i586/kernel-BOOT-2.6.12.37mdk-1-1mdk.i586.rpm

eb998b4fbfc4112d1c440d5486478cd8 corporate/4.0/i586/kernel-doc-2.6.12.37mdk-1-1mdk.i586.rpm

79beddb09c974d8f662a973c2a837014 corporate/4.0/i586/kernel-i586-up-1GB-2.6.12.37mdk-1-1mdk.i586.rpm

29bb1ba0ae3d35ba7dd8bf2cdc6addd2 corporate/4.0/i586/kernel-i686-up-4GB-2.6.12.37mdk-1-1mdk.i586.rpm

1718d610c089332182f4bdc5f5248af3 corporate/4.0/i586/kernel-smp-2.6.12.37mdk-1-1mdk.i586.rpm

dbb042a1827e3a87285b11a98c93ee61 corporate/4.0/i586/kernel-source-2.6.12.37mdk-1-1mdk.i586.rpm

919a6e64fd7dee06ad6415296fb93a15 corporate/4.0/i586/kernel-source-stripped-2.6.12.37mdk-1-1mdk.i586.rpm

9ff3684803d697d89810f2746d458027 corporate/4.0/i586/kernel-xbox-2.6.12.37mdk-1-1mdk.i586.rpm

06837d6f30639fb58fea1da2cab7097e corporate/4.0/i586/kernel-xen0-2.6.12.37mdk-1-1mdk.i586.rpm

c81576048b5b8e7f28a284b342fa7a6a corporate/4.0/i586/kernel-xenU-2.6.12.37mdk-1-1mdk.i586.rpm

5bbf8703855ed2e5e2243e08568f3e82 corporate/4.0/SRPMS/kernel-2.6.12.37mdk-1-1mdk.src.rpm

 

Corporate 4.0/X86_64:

a22b361c0807a66cdad1ac13dd49605a corporate/4.0/x86_64/kernel-2.6.12.37mdk-1-1mdk.x86_64.rpm

574e797964205ebabb7c189d76f9d054 corporate/4.0/x86_64/kernel-BOOT-2.6.12.37mdk-1-1mdk.x86_64.rpm

bbd992c15f04bcfaf7b812455aa9c056 corporate/4.0/x86_64/kernel-doc-2.6.12.37mdk-1-1mdk.x86_64.rpm

482eb6d9350062f90aec6f83cfad3946 corporate/4.0/x86_64/kernel-smp-2.6.12.37mdk-1-1mdk.x86_64.rpm

d1c5836b8f094cce7060ed9b643182c5 corporate/4.0/x86_64/kernel-source-2.6.12.37mdk-1-1mdk.x86_64.rpm

43b494d6b75c09c25d6b7d3ffee1c88a corporate/4.0/x86_64/kernel-source-stripped-2.6.12.37mdk-1-1mdk.x86_64.rpm

e2b98128b36fb258737be88e426ec33f corporate/4.0/x86_64/kernel-xen0-2.6.12.37mdk-1-1mdk.x86_64.rpm

fda16af31ed711ade480db203401e310 corporate/4.0/x86_64/kernel-xenU-2.6.12.37mdk-1-1mdk.x86_64.rpm

5bbf8703855ed2e5e2243e08568f3e82 corporate/4.0/SRPMS/kernel-2.6.12.37mdk-1-1mdk.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFJCMOlmqjQ0CJFipgRAtGdAJ0aBUUa0WH2iKsH8OhcaluWgpIbBwCg7nbH

Z9XozhuC5lliy+CRWd5slZg=

=Pmy8

-----END PGP SIGNATURE-----

 

 

------------=_1225322115-14940-1651

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1225322115-14940-1651--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×