Waraxe IT Security Portal
Login or Register
November 18, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 79
Members: 0
Total: 79
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Linux world -> Mandriva Advisories Updated kernel packages fix multiple vu
Post new topicReply to topic View previous topic :: View next topic
Mandriva Advisories Updated kernel packages fix multiple vu
PostPosted: Fri Feb 23, 2007 3:33 am Reply with quote
Dinosaurio
Regular user
Regular user
Joined: Aug 11, 2006
Posts: 10




Hi,


Mandriva Advisories

Package name kernel
Date February 21st, 2007
Advisory ID MDKSA-2007:047
Affected versions 2007.0
Synopsis Updated kernel packages fix multiple vulnerabilities and bugs


Problem Description

Some vulnerabilities were discovered and corrected in the Linux 2.6
kernel:

A double free vulnerability in the squashfs module could allow a local
user to cause a Denial of Service by mounting a crafted squashfs
filesystem (CVE-2006-5701).

The zlib_inflate function allows local users to cause a crash via a
malformed filesystem that uses zlib compression that triggers memory
corruption (CVE-2006-5823).

The key serial number collision avoidance code in the key_alloc_serial
function in kernels 2.6.9 up to 2.6.20 allows local users to cause a
crash via vectors thatr trigger a null dereference (CVE-2007-0006).

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels immediately
and reboot to effect the fixes.

In addition to these security fixes, other fixes have been included
such as:

- New drivers: nozomi, UVC
- Fixed SiS SATA support for chips on 966/968 bridges
- Fixed issues in squashfs by updating to 3.2 (#27008)
- Added support for SiS968 bridgest to the sis190 bridge
- Fixed JMicron cable detection
- Added /proc/config.gz support and enabled kexec on x86_64
- Other minor fixes

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Updated Packages


Mandriva Linux 2007

07df9cceca48092bca1fd65cadf91e69 2007.0/i586/kernel-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
a1dbf1afa75579198166a3f4a74f45d5 2007.0/i586/kernel-doc-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
da3d2669e324068dd7563a29356a6221 2007.0/i586/kernel-enterprise-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
1e1508188ec35415a880978c3c90c7ce 2007.0/i586/kernel-legacy-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
2d0f1e67c091bd9c62cb4f63b9ef7356 2007.0/i586/kernel-source-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
d76607bf4889d5a6d0a3633a84475684 2007.0/i586/kernel-source-stripped-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
d6d3e09457c438b71cb03d3622867019 2007.0/i586/kernel-xen0-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
241b7b83709ec8811fb8b2969ae5bfda 2007.0/i586/kernel-xenU-2.6.17.11mdv-1-1mdv2007.0.i586.rpm
b971ee2fe8d6ddc83765cb2705671e35 2007.0/SRPMS/kernel-2.6.17.11mdv-1-1mdv2007.0.src.rpmMandriva Linux 2007/X86_64

7293720ba20f54c1522263b0d1e58577 2007.0/x86_64/kernel-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
7a32b034b1452b1d102fed6fca411aa2 2007.0/x86_64/kernel-doc-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
db02f60611db9824215440969b52d2ac 2007.0/x86_64/kernel-source-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
4751c8e5fb383bf08f29f172bc1c11f2 2007.0/x86_64/kernel-source-stripped-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
e467c45bdab2bfc663b0b0a0ab135d84 2007.0/x86_64/kernel-xen0-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
9c00e25c5f5ea6be9d96c4a2139836a6 2007.0/x86_64/kernel-xenU-2.6.17.11mdv-1-1mdv2007.0.x86_64.rpm
b971ee2fe8d6ddc83765cb2705671e35 2007.0/SRPMS/kernel-2.6.17.11mdv-1-1mdv2007.0.src.rpm
References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5823
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0006

Upgrade


To upgrade your kernel, view the kernel update instructions. Kernels cannot be upgraded via MandrivaUpdate.


Verification


Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

rpm --checksig package.rpm


Good Luck


Dino
View user's profile Send private message Send e-mail Visit poster's website MSN Messenger
Mandriva Advisories Updated kernel packages fix multiple vu
www.waraxe.us Forum Index -> Linux world
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.058 Seconds