exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2005.235

Mandriva Linux Security Advisory 2005.235
Posted Dec 28, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Multiple vulnerabilities in the Linux 2.6 kernel have been discovered and corrected.

tags | advisory, kernel, vulnerability
systems | linux, mandriva
SHA-256 | 2f08fb0f7937d9dd75c7482acf82881bcff598d2f46a4408447888d8d52e756f

Mandriva Linux Security Advisory 2005.235

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2005:235
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kernel
Date : December 21, 2005
Affected: 2006.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities in the Linux 2.6 kernel have been discovered
and corrected in this update:

A stack-based buffer overflow in the sendmsg function call in versions
prior to 2.6.13.1 allow local users to execute arbitrary code by
calling sendmsg and modifying the message contents in another thread
(CVE-2005-2490).

The raw_sendmsg function in versions prior to 2.6.13.1 allow local
users to cause a DoS (change hardware state) or read from arbitrary
memory via crafted input (CVE-2005-2492).

The ipt_recent module in versions prior to 2.6.12 does not properly
perform certain tests when the jiffies value is greater than LONG_MAX,
which can cause ipt_recent netfilter rules to block too early
(CVE-2005-2873).

Multiple vulnerabilities in versions prior to 2.6.13.2 allow local
users to cause a DoS (oops from null dereference) via fput in a 32bit
ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl
function on 64-bit systems (CVE-2005-3044).

Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)
via a userspace process that issues a USB Request Block (URB) to a USB
device and terminates before the URB is finished, which leads to a
stale pointer reference (CVE-2005-3055).

drm.c in version 2.6.13 and earlier creates a debug file in sysfs with
world-readable and world-writable permissions, allowing local users to
enable DRM debugging and obtain sensitive information (CVE-2005-3179).

The Orinoco driver in 2.6.13 and earlier does not properly clear memory
from a previously used packet whose length is increased, allowing
remote attackers to obtain sensitive information (CVE-2005-3180).

Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an
incorrect function to free names_cache memory, preventing the memory
from being tracked by AUDITSYSCALL code and leading to a memory leak
(CVE-2005-3181).

The VT implementation in version 2.6.12 allows local users to use
certain IOCTLs on terminals of other users and gain privileges
(CVE-2005-3257).

A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when
running on SMP systems, allows local users to cause a DoS (null
dereference) by causing a connection timer to expire while the
connection table is being flushed before the appropriate lock is
acquired (CVE-2005-3274).

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3179
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
a010bd5617177d007f3907e5cb1a7eaf 2006.0/RPMS/kernel-2.6.12.14mdk-1-1mdk.i586.rpm
ae019c85ae823dd0045759e68e5a415f 2006.0/RPMS/kernel-i586-up-1GB-2.6.12.14mdk-1-1mdk.i586.rpm
519cffb096c4371fcdba4ea15c7af8ac 2006.0/RPMS/kernel-i686-up-4GB-2.6.12.14mdk-1-1mdk.i586.rpm
2093641b27dd2917afd50f8daa68100b 2006.0/RPMS/kernel-smp-2.6.12.14mdk-1-1mdk.i586.rpm
d8532d9bc53c3abd28f530ed536ac1b1 2006.0/RPMS/kernel-source-2.6-2.6.12-14mdk.i586.rpm
8fbab680135fccd60c7da9533af72d33 2006.0/RPMS/kernel-source-stripped-2.6-2.6.12-14mdk.i586.rpm
475fc01a6bcd294890ca55b814bd0151 2006.0/RPMS/kernel-xbox-2.6.12.14mdk-1-1mdk.i586.rpm
cdde86f8ae57d9b08f732268e534ef85 2006.0/RPMS/kernel-xen0-2.6.12.14mdk-1-1mdk.i586.rpm
834ddd648671714a008303f5d8be5561 2006.0/RPMS/kernel-xenU-2.6.12.14mdk-1-1mdk.i586.rpm
6bb497c8205003ffc8538e81cdc2e0f9 2006.0/SRPMS/kernel-2.6.12.14mdk-1-1mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
9fce74d95a1678c5c5217d6b113e08be x86_64/2006.0/RPMS/kernel-2.6.12.14mdk-1-1mdk.x86_64.rpm
5997517d826bf551567f2f7586f2f2ea x86_64/2006.0/RPMS/kernel-smp-2.6.12.14mdk-1-1mdk.x86_64.rpm
0f57a42ee8ef90cf2f60c8f3cc011f26 x86_64/2006.0/RPMS/kernel-source-2.6-2.6.12-14mdk.x86_64.rpm
26a234853ea00c0e6f29526e023c26e4 x86_64/2006.0/RPMS/kernel-source-stripped-2.6-2.6.12-14mdk.x86_64.rpm
6bb497c8205003ffc8538e81cdc2e0f9 x86_64/2006.0/SRPMS/kernel-2.6.12.14mdk-1-1mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDqbDLmqjQ0CJFipgRArpbAKDD9dJXm9FTggU6khmIxM31QsbkigCdEd6Y
rYVPJj5H9ob4JzlvsWDsQgw=
=W8YT
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close