-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2007:226 http://www.mandriva.com/security/ _______________________________________________________________________ Package : kernel Date : November 19, 2007 Affected: 2008.0 _______________________________________________________________________ Problem Description: Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream (CVE-2006-6058). An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set (CVE-2007-4997). To update your kernel, please follow the directions located at: http://www.mandriva.com/en/security/kernelupdate _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6058 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: bfb8abfb7532255d239ce8ef3b39966b 2008.0/i586/kernel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm c68305809aa8704146ea1a59cd687ab1 2008.0/i586/kernel-desktop-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm 89a439f86bd47820345287275fe25674 2008.0/i586/kernel-desktop-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm a13eab853fc0b044456d90d98c8e9008 2008.0/i586/kernel-desktop-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm 229f00634e286da1ab490678cf201dab 2008.0/i586/kernel-desktop-latest-2.6.22.9-2mdv2008.0.i586.rpm e77c3f728f0ba5bf8491e27ef389df8c 2008.0/i586/kernel-desktop586-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm 82d8110dc838a1a25b2d4de0e94872e3 2008.0/i586/kernel-desktop586-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm 0be66b6c155ff5888900f784bf21f555 2008.0/i586/kernel-desktop586-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm 48976bcfb3ecd30b2c2a671e49f2d241 2008.0/i586/kernel-desktop586-latest-2.6.22.9-2mdv2008.0.i586.rpm 372de082e77dec0e87d93f389bff76cf 2008.0/i586/kernel-doc-2.6.22.9-2mdv2008.0.i586.rpm 8fb68460352343d0c14b3d2c5581375f 2008.0/i586/kernel-laptop-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm 0c76031c7eb78ba7da93b83ebf531541 2008.0/i586/kernel-laptop-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm 059f66f5340e538dda3d748276313975 2008.0/i586/kernel-laptop-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm 4d6c700c736a476718c809fb3a470ed9 2008.0/i586/kernel-laptop-latest-2.6.22.9-2mdv2008.0.i586.rpm 57e0382893adc64445913de674815ad5 2008.0/i586/kernel-server-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm f2ea96b6c7f83f8de0f27dc1c2ea9193 2008.0/i586/kernel-server-devel-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm 4de3613951fda9c4c92fcb35fe743a04 2008.0/i586/kernel-server-devel-latest-2.6.22.9-2mdv2008.0.i586.rpm 4cc8313e4fed4a1a966bc4f4d0819f71 2008.0/i586/kernel-server-latest-2.6.22.9-2mdv2008.0.i586.rpm a30a7a388cdcdf089c39f7a7c26e34f0 2008.0/i586/kernel-source-2.6.22.9-2mdv-1-1mdv2008.0.i586.rpm 5b919908b67f94571a4851caf08e8ece 2008.0/i586/kernel-source-latest-2.6.22.9-2mdv2008.0.i586.rpm 6e797fd0fea50e2b0290ca082ca9c1db 2008.0/SRPMS/kernel-2.6.22.9-2mdv2007.0.src.rpm Mandriva Linux 2008.0/X86_64: d30b2a76ab4e37f296f07380fa8d41a4 2008.0/x86_64/kernel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm 3cdbd2356b7400f831a8b759d13952ec 2008.0/x86_64/kernel-desktop-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm a60abdec0274a9f96be2fb1117eb2f4a 2008.0/x86_64/kernel-desktop-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm 272ac8a552c99a1b72303a92f474d46f 2008.0/x86_64/kernel-desktop-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm 8c78406bc678b51a4c84526b0874703e 2008.0/x86_64/kernel-desktop-latest-2.6.22.9-2mdv2008.0.x86_64.rpm 8447a07d292dd930bba13a6d06bf6570 2008.0/x86_64/kernel-doc-2.6.22.9-2mdv2008.0.x86_64.rpm 546663f7f08a1ed4a0e561c06960872e 2008.0/x86_64/kernel-laptop-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm 482b6130e1695693ebfd610aade49255 2008.0/x86_64/kernel-laptop-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm 280678d50696a95f56735ad91fcc92ef 2008.0/x86_64/kernel-laptop-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm f4fedb72b7d286f9b9dae772b8251a7a 2008.0/x86_64/kernel-laptop-latest-2.6.22.9-2mdv2008.0.x86_64.rpm c811160740d5c4e138430fb757803bcc 2008.0/x86_64/kernel-server-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm 1078b15d6cb4a1c420e7212d4a7ca545 2008.0/x86_64/kernel-server-devel-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm e127a24e39d458865ebc54e61a7db34b 2008.0/x86_64/kernel-server-devel-latest-2.6.22.9-2mdv2008.0.x86_64.rpm 347576ae981042a8277c2adcdb433cfc 2008.0/x86_64/kernel-server-latest-2.6.22.9-2mdv2008.0.x86_64.rpm 464e4b918285dac78af1b2521ebac461 2008.0/x86_64/kernel-source-2.6.22.9-2mdv-1-1mdv2008.0.x86_64.rpm affd96915a01aa3927dda61bd1fad19d 2008.0/x86_64/kernel-source-latest-2.6.22.9-2mdv2008.0.x86_64.rpm 6e797fd0fea50e2b0290ca082ca9c1db 2008.0/SRPMS/kernel-2.6.22.9-2mdv2007.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFHQfTKmqjQ0CJFipgRAm4KAJ9vlEIIafxXuBzFtS4lpZ7H98u+OACfeqnj 6pOfo1qywkIBnd5cQnlOdtM= =qX1m -----END PGP SIGNATURE-----