English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2008-8
   http://www.turbolinux.co.jp/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date: 13 Feb 2008
 Last revised: 13 Feb 2008

 Package: kernel

 Summary: Security and Bug fix

 More information:
    The kernel package contains the Linux kernel -- the core of the Linux
    operating system.

       - update kernel core patch-2.6.23.14
       - update tomoyo 1.5.3-20080131
       - Security fix CVE-2007-5500
       - Security fix CVE-2007-6206
       - Security fix CVE-2007-6434
       - Security fix CVE-2008-0007
       - Security fix CVE-2008-0009
       - Security fix CVE-2008-0010
       - Security fix CVE-2008-0600
       - Support MCP79 sata by ahci, audio by hda_intel
       - Support new tg3 chip, 5784/5764/5723/5761/5761E
       - Add ati and nvidia video accel driver in extramodules, ati-8.443.1, nvidia-169.07
       - Update madwifi-ng-r3085-20071227
       - Update iwlwifi-1.2.23, mac80211-10.0.3
       - Add iwl3945, iwl4965
       - Update e1000-7.6.12, ixgbe-1.3.7.8
       - Add squashfs version 3.3
       - Add cloop version 2622
       - Add aufs cvs 20071221

 Affected Products:
    - Turbolinux 11 Server x64 Edition
    - Turbolinux 11 Server


 <Turbolinux 11 Server x64 Edition>

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/x64/Server/11/updates/SRPMS/kernel-2.6.23-5.src.rpm
     69335777 476fabbac350dd87ab5c0046ed8fde39

   Binary Packages
   Size: MD5

   kernel-2.6.23-5.x86_64.rpm
     19395742 96fcce6b5c215ba88725d6b54aa1f171
   kernel-extramodules-2.6.23-5.x86_64.rpm
      5109024 b3710200aebb9c392be2543a39df6485
   kernel-headers-2.6.23-5.x86_64.rpm
      3086450 6408b514d4c78699dd8f9e53eb1ed058
   kernel-pcmcia-cs-2.6.23-5.x86_64.rpm
       349903 a549a3a8e71605753f55057db67a77a1
   kernel-source-2.6.23-5.x86_64.rpm
     50631548 cb00ba1e52b29074e9935db347227201
   kernel-vmguest-2.6.23-5.x86_64.rpm
        88426 bff76d947ed33c763064f9f3c044de4d
   kernel-zaptel-2.6.23-5.x86_64.rpm
        85662 5ec6660d3c5bef41a7b4af7344b3a448

 <Turbolinux 11 Server>

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/11/updates/SRPMS/kernel-2.6.23-5.src.rpm
     69335777 c2688831f27dfc2b32426b8262029906

   Binary Packages
   Size: MD5

   kernel-2.6.23-5.i686.rpm
     17360459 6156f5600ef6da49d88676057fe36442
   kernel-extramodules-2.6.23-5.i686.rpm
      8965816 0f4d680050fad599ff218d3b95cf7ad9
   kernel-headers-2.6.23-5.i686.rpm
      2486411 d582a213c177a1e53b561978ee8e48aa
   kernel-pcmcia-cs-2.6.23-5.i686.rpm
       317439 0d4f7e11cd81ba688553580e9b5cc7df
   kernel-smp64G-2.6.23-5.i686.rpm
     17404894 18a1bd5c9135214bbae44bef45d0c3a2
   kernel-source-2.6.23-5.i686.rpm
     38840850 f76705f31f34926cc441788e19ecca35
   kernel-vmguest-2.6.23-5.i686.rpm
        93155 9a651b0402622c9f95892aea6f15d689
   kernel-zaptel-2.6.23-5.i686.rpm
        90762 c5a12a471504e46edd17355d74188f38


 References:

 CVE
   [CVE-2007-5500]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5500
   [CVE-2007-6206]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206
   [CVE-2007-6434]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6434
   [CVE-2008-0007]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007
   [CVE-2008-0009]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0009
   [CVE-2008-0010]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
   [CVE-2008-0600]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600

 --------------------------------------------------------------------------
 Revision History
    13 Feb 2008 Initial release
 --------------------------------------------------------------------------

 Copyright(C) 2008 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iEYEARECAAYFAkeyhikACgkQK0LzjOqIJMxooQCglWJ6ShVYDGENdp2WDusnctOq
+oIAn0uiz1dSYqIo+kboiLPq7oZ/DnqO
=3c80
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.