what you don't know can hurt you

Mandriva Linux Security Advisory 2007.226

Mandriva Linux Security Advisory 2007.226
Posted Nov 26, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set.

tags | advisory, remote, denial of service, kernel, local, vulnerability
systems | linux, minix, mandriva
advisories | CVE-2006-6058, CVE-2007-4997
MD5 | 78821709b8c62321dd92c246f966efc7

Mandriva Linux Security Advisory 2007.226

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:226
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kernel
Date : November 19, 2007
Affected: 2008.0
_______________________________________________________________________

Problem Description:

Some vulnerabilities were discovered and corrected in the Linux
2.6 kernel:

The minix filesystem code allows local users to cause a denial of
service (hang) via a malformed minix file stream (CVE-2006-6058).

An integer underflow in the Linux kernel prior to 2.6.23 allows remote
attackers to cause a denial of service (crash) via a crafted SKB length
value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA
flag is set (CVE-2007-4997).

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6058
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
bfb8abfb7532255d239ce8ef3b39966b 2008.0/i586/kernel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
c68305809aa8704146ea1a59cd687ab1 2008.0/i586/kernel-desktop-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
89a439f86bd47820345287275fe25674 2008.0/i586/kernel-desktop-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
a13eab853fc0b044456d90d98c8e9008 2008.0/i586/kernel-desktop-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
229f00634e286da1ab490678cf201dab 2008.0/i586/kernel-desktop-latest-2.6.22.9-2mdv2008.0.i586.rpm
e77c3f728f0ba5bf8491e27ef389df8c 2008.0/i586/kernel-desktop586-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
82d8110dc838a1a25b2d4de0e94872e3 2008.0/i586/kernel-desktop586-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
0be66b6c155ff5888900f784bf21f555 2008.0/i586/kernel-desktop586-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
48976bcfb3ecd30b2c2a671e49f2d241 2008.0/i586/kernel-desktop586-latest-2.6.22.9-2mdv2008.0.i586.rpm
372de082e77dec0e87d93f389bff76cf 2008.0/i586/kernel-doc-2.6.22.9-2mdv2008.0.i586.rpm
8fb68460352343d0c14b3d2c5581375f 2008.0/i586/kernel-laptop-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
0c76031c7eb78ba7da93b83ebf531541 2008.0/i586/kernel-laptop-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
059f66f5340e538dda3d748276313975 2008.0/i586/kernel-laptop-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
4d6c700c736a476718c809fb3a470ed9 2008.0/i586/kernel-laptop-latest-2.6.22.9-2mdv2008.0.i586.rpm
57e0382893adc64445913de674815ad5 2008.0/i586/kernel-server-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
f2ea96b6c7f83f8de0f27dc1c2ea9193 2008.0/i586/kernel-server-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
4de3613951fda9c4c92fcb35fe743a04 2008.0/i586/kernel-server-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm
4cc8313e4fed4a1a966bc4f4d0819f71 2008.0/i586/kernel-server-latest-2.6.22.9-2mdv2008.0.i586.rpm
a30a7a388cdcdf089c39f7a7c26e34f0 2008.0/i586/kernel-source-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm
5b919908b67f94571a4851caf08e8ece 2008.0/i586/kernel-source-latest-2.6.22.9-2mdv2008.0.i586.rpm
6e797fd0fea50e2b0290ca082ca9c1db 2008.0/SRPMS/kernel-2.6.22.9-2mdv2007.0.src.rpm

Mandriva Linux 2008.0/X86_64:
d30b2a76ab4e37f296f07380fa8d41a4 2008.0/x86_64/kernel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
3cdbd2356b7400f831a8b759d13952ec 2008.0/x86_64/kernel-desktop-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
a60abdec0274a9f96be2fb1117eb2f4a 2008.0/x86_64/kernel-desktop-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
272ac8a552c99a1b72303a92f474d46f 2008.0/x86_64/kernel-desktop-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
8c78406bc678b51a4c84526b0874703e 2008.0/x86_64/kernel-desktop-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
8447a07d292dd930bba13a6d06bf6570 2008.0/x86_64/kernel-doc-2.6.22.9-2mdv2008.0.x86_64.rpm
546663f7f08a1ed4a0e561c06960872e 2008.0/x86_64/kernel-laptop-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
482b6130e1695693ebfd610aade49255 2008.0/x86_64/kernel-laptop-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
280678d50696a95f56735ad91fcc92ef 2008.0/x86_64/kernel-laptop-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
f4fedb72b7d286f9b9dae772b8251a7a 2008.0/x86_64/kernel-laptop-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
c811160740d5c4e138430fb757803bcc 2008.0/x86_64/kernel-server-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
1078b15d6cb4a1c420e7212d4a7ca545 2008.0/x86_64/kernel-server-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
e127a24e39d458865ebc54e61a7db34b 2008.0/x86_64/kernel-server-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
347576ae981042a8277c2adcdb433cfc 2008.0/x86_64/kernel-server-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
464e4b918285dac78af1b2521ebac461 2008.0/x86_64/kernel-source-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm
affd96915a01aa3927dda61bd1fad19d 2008.0/x86_64/kernel-source-latest-2.6.22.9-2mdv2008.0.x86_64.rpm
6e797fd0fea50e2b0290ca082ca9c1db 2008.0/SRPMS/kernel-2.6.22.9-2mdv2007.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHQfTKmqjQ0CJFipgRAm4KAJ9vlEIIafxXuBzFtS4lpZ7H98u+OACfeqnj
6pOfo1qywkIBnd5cQnlOdtM=
=qX1m
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    35 Files
  • 8
    Jul 8th
    4 Files
  • 9
    Jul 9th
    9 Files
  • 10
    Jul 10th
    7 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close