what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-086

Mandriva Linux Security Advisory 2008-086
Posted Apr 16, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The isdn_ioctl function in isdn_common.c in the Linux kernel prior to 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which trigger a buffer overflow. The do_corefump function in fs/exec.c in the Linux kernel prior to 2.6.24-rc3 did not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which could possibly allow local users to obtain sensitive information. The shmem_getpage function in mm/shmem.c in the Linux kernel versions 2.6.11 through 2.6.23 did not properly clear allocated memory in certain rare circumstances related to tmps, which could possibly allow local users to read sensitive kernel data or cause a crash.

tags | advisory, denial of service, overflow, kernel, local, root
systems | linux, mandriva
advisories | CVE-2007-6151, CVE-2007-6417, CVE-2007-6206
SHA-256 | 9d45829355f0a104401e0ff0bc6eb1b4fdb73a895ecae86b1fe47a119c6a9e3b

Mandriva Linux Security Advisory 2008-086

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:086
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kernel
Date : April 15, 2008
Affected: Corporate 4.0
_______________________________________________________________________

Problem Description:

The isdn_ioctl function in isdn_common.c in the Linux kernel prior to
2.6.23 allows local users to cause a denial of service via a crafted
ioctl struct in which iocts is not null terminated, which trigger a
buffer overflow (CVE-2007-6151).

The do_corefump function in fs/exec.c in the Linux kernel prior to
2.6.24-rc3 did not change the UID of a core dump file if it exists
before a root process creates a core dump in the same location, which
could possibly allow local users to obtain sensitive information
(CVE-2007-6206).

The shmem_getpage function in mm/shmem.c in the Linux kernel versions
2.6.11 through 2.6.23 did not properly clear allocated memory in
certain rare circumstances related to tmps, which could possibly
allow local users to read sensitive kernel data or cause a crash
(CVE-2007-6417).

Additionally, this kernel provides a fix for megaraid_sas and updates
it to version 3.13, updates mptsas to version 3.12.19, and updates
e1000-ng to version 7.6.12, as well as adds igb version 1.0.8.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6151
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6417
_______________________________________________________________________

Updated Packages:

Corporate 4.0:
4ecd928352ae1a0e37af030841e1daca corporate/4.0/i586/kernel-2.6.12.34mdk-1-1mdk.i586.rpm
e25d7be22e3e194dd1f50409d0e71b90 corporate/4.0/i586/kernel-BOOT-2.6.12.34mdk-1-1mdk.i586.rpm
e42a62385fd608bf8d9b3ec62d6684e8 corporate/4.0/i586/kernel-doc-2.6.12.34mdk-1-1mdk.i586.rpm
0522dc2efc14a6fb456bed196e5ef87e corporate/4.0/i586/kernel-i586-up-1GB-2.6.12.34mdk-1-1mdk.i586.rpm
723df91e8a94e9e4654a30875fe9de94 corporate/4.0/i586/kernel-i686-up-4GB-2.6.12.34mdk-1-1mdk.i586.rpm
b276ba8700f7e611bfdf02b3b26c4796 corporate/4.0/i586/kernel-smp-2.6.12.34mdk-1-1mdk.i586.rpm
0a369c5c6e085596c2fa579074e0eed0 corporate/4.0/i586/kernel-source-2.6.12.34mdk-1-1mdk.i586.rpm
53e34bb761dbf927ec911248aee1f23b corporate/4.0/i586/kernel-source-stripped-2.6.12.34mdk-1-1mdk.i586.rpm
c10f59cf9d289f0e9e8cdeb4e7fb3f0e corporate/4.0/i586/kernel-xbox-2.6.12.34mdk-1-1mdk.i586.rpm
90a86dd0e5fb9d62edd9682f5a86f978 corporate/4.0/i586/kernel-xen0-2.6.12.34mdk-1-1mdk.i586.rpm
af3beaab8bf06f0beef21158e5d6878e corporate/4.0/i586/kernel-xenU-2.6.12.34mdk-1-1mdk.i586.rpm
5137cdde7b33a50562d783ee93bfa608 corporate/4.0/SRPMS/kernel-2.6.12.34mdk-1-1mdk.src.rpm

Corporate 4.0/X86_64:
371f8a2b038bbe058dea1666b3b186da corporate/4.0/x86_64/kernel-2.6.12.34mdk-1-1mdk.x86_64.rpm
c7c9bfe79048fb2f94ca600ddd2da911 corporate/4.0/x86_64/kernel-BOOT-2.6.12.34mdk-1-1mdk.x86_64.rpm
a27a0da5b9e28ce0193a83a75e6e73c8 corporate/4.0/x86_64/kernel-doc-2.6.12.34mdk-1-1mdk.x86_64.rpm
7615a2c0aee3363886f159f4bfc5f538 corporate/4.0/x86_64/kernel-smp-2.6.12.34mdk-1-1mdk.x86_64.rpm
0e896d19f066f836fcfb7dd470522d0c corporate/4.0/x86_64/kernel-source-2.6.12.34mdk-1-1mdk.x86_64.rpm
b09194d6e8a07b1ae836be6335808464 corporate/4.0/x86_64/kernel-source-stripped-2.6.12.34mdk-1-1mdk.x86_64.rpm
6845355d4579b2f2933935c88567981b corporate/4.0/x86_64/kernel-xen0-2.6.12.34mdk-1-1mdk.x86_64.rpm
f0e8c8777c6da9db4dbea6de1b0fc920 corporate/4.0/x86_64/kernel-xenU-2.6.12.34mdk-1-1mdk.x86_64.rpm
5137cdde7b33a50562d783ee93bfa608 corporate/4.0/SRPMS/kernel-2.6.12.34mdk-1-1mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIBMMImqjQ0CJFipgRAlhAAKCSx+207LFEtYh4kv4BwVKttP9FZgCg7HQy
WUkAh0LkTzVi1oZruujVLWk=
=oS67
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close