exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-220

Mandriva Linux Security Advisory 2008-220
Posted Nov 19, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2008-220-1 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The issues include insecure misconfigurations, an integer overflow, and more.

tags | advisory, overflow, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2008-3272, CVE-2008-0598, CVE-2008-3275, CVE-2008-3525, CVE-2007-6716, CVE-2008-4210
SHA-256 | e803d23944406498cc82562b5aacca71783278c00443005d7d17e49f592f75ce

Mandriva Linux Security Advisory 2008-220

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:220-1
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kernel
Date : November 19, 2008
Affected: Corporate 4.0
_______________________________________________________________________

Problem Description:

Some vulnerabilities were discovered and corrected in the Linux
2.6 kernel:

The snd_seq_oss_synth_make_info function in
sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux
kernel before 2.6.27-rc2 does not verify that the device number is
within the range defined by max_synthdev before returning certain
data to the caller, which allows local users to obtain sensitive
information. (CVE-2008-3272)

Unspecified vulnerability in the 32-bit and 64-bit emulation in the
Linux kernel 2.6.9, 2.6.18, and probably other versions allows local
users to read uninitialized memory via unknown vectors involving a
crafted binary. (CVE-2008-0598)

The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c
in the vfs implementation in the Linux kernel before 2.6.25.15 does
not prevent creation of a child dentry for a deleted (aka S_DEAD)
directory, which allows local users to cause a denial of service
(overflow of the UBIFS orphan area) via a series of attempted file
creations within deleted directories. (CVE-2008-3275)

Integer overflow in the sctp_setsockopt_auth_key function in
net/sctp/socket.c in the Stream Control Transmission Protocol (sctp)
implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows
remote attackers to cause a denial of service (panic) or possibly have
unspecified other impact via a crafted sca_keylength field associated
with the SCTP_AUTH_KEY option. (CVE-2008-3525)

fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23
does not properly zero out the dio struct, which allows local users
to cause a denial of service (OOPS), as demonstrated by a certain
fio test. (CVE-2007-6716)

fs/open.c in the Linux kernel before 2.6.22 does not properly strip
setuid and setgid bits when there is a write to a file, which allows
local users to gain the privileges of a different group, and obtain
sensitive information or possibly have unspecified other impact,
by creating an executable file in a setgid directory through the (1)
truncate or (2) ftruncate function in conjunction with memory-mapped
I/O. (CVE-2008-4210)

Additionaly, support for Intel's ICH9 controller was added, and 'tg3'
driver was updated to version 3.71b.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Update:

Support for Intel's ICH9 controller and the updated 'tg3' driver were
actually missing in the previous update, this new update adds them.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3272
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0598
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6716
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210
_______________________________________________________________________

Updated Packages:

Corporate 4.0:
9f8ef0b687cf2a757be8956e4d546bb4 corporate/4.0/i586/kernel-2.6.12.38mdk-1-1mdk.i586.rpm
6a187165a2d24afd3cc036496c2fce16 corporate/4.0/i586/kernel-BOOT-2.6.12.38mdk-1-1mdk.i586.rpm
ccc98a0f3dae3455640b06a84a1e8aa1 corporate/4.0/i586/kernel-doc-2.6.12.38mdk-1-1mdk.i586.rpm
aedad3957e3db5ba959ccb384ededc31 corporate/4.0/i586/kernel-i586-up-1GB-2.6.12.38mdk-1-1mdk.i586.rpm
4237b7a724f2e1e4a31b6d4b2bfa3040 corporate/4.0/i586/kernel-i686-up-4GB-2.6.12.38mdk-1-1mdk.i586.rpm
0a5113e41447386fb793cc5c01f503aa corporate/4.0/i586/kernel-smp-2.6.12.38mdk-1-1mdk.i586.rpm
65a067bc2fc12a1c67d0537b6b0385f9 corporate/4.0/i586/kernel-source-2.6.12.38mdk-1-1mdk.i586.rpm
bceea0d3d936700b34102e632c49725c corporate/4.0/i586/kernel-source-stripped-2.6.12.38mdk-1-1mdk.i586.rpm
027fa12058aa65462a8d2d25ead0d486 corporate/4.0/i586/kernel-xbox-2.6.12.38mdk-1-1mdk.i586.rpm
ca2b5dffac21b0ec374b8e516f39293b corporate/4.0/i586/kernel-xen0-2.6.12.38mdk-1-1mdk.i586.rpm
cdcf076659a64f3aaf34f9e58c106b4c corporate/4.0/i586/kernel-xenU-2.6.12.38mdk-1-1mdk.i586.rpm
a4405a0b20aa4c12bb2ca70f801708b8 corporate/4.0/SRPMS/kernel-2.6.12.38mdk-1-1mdk.src.rpm

Corporate 4.0/X86_64:
7dd636f428eded3fce2b8bfc438e6a89 corporate/4.0/x86_64/kernel-2.6.12.38mdk-1-1mdk.x86_64.rpm
fd0efcb2081d6a71c0d5109ec916a5e0 corporate/4.0/x86_64/kernel-BOOT-2.6.12.38mdk-1-1mdk.x86_64.rpm
13ca275d306ed326dba2ff4e967954a3 corporate/4.0/x86_64/kernel-doc-2.6.12.38mdk-1-1mdk.x86_64.rpm
74940a6c8b0893c5ced16132549bc7ce corporate/4.0/x86_64/kernel-smp-2.6.12.38mdk-1-1mdk.x86_64.rpm
5a5a541271c4bb7157b6549fdcfa43b9 corporate/4.0/x86_64/kernel-source-2.6.12.38mdk-1-1mdk.x86_64.rpm
a2965a018d7cd48727392f15f7c0cc08 corporate/4.0/x86_64/kernel-source-stripped-2.6.12.38mdk-1-1mdk.x86_64.rpm
8d7bc5b6c3112988d61da7db64d90e89 corporate/4.0/x86_64/kernel-xen0-2.6.12.38mdk-1-1mdk.x86_64.rpm
f7f26d7e6126baf67c53a3476de6da74 corporate/4.0/x86_64/kernel-xenU-2.6.12.38mdk-1-1mdk.x86_64.rpm
a4405a0b20aa4c12bb2ca70f801708b8 corporate/4.0/SRPMS/kernel-2.6.12.38mdk-1-1mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJJHnQmqjQ0CJFipgRAgQcAKDpDre8OzSdt/UE8PVXhoWJ9TgFsQCgjqxF
liwBfsSY5xFa8Q6RXQ8gXcI=
=sBcY
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close