Secunia Security Advisory - Mandriva has issued an update for the kernel. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and by malicious people to cause a DoS.
6327332cbed3e134edf8dd06deb8f097696c5ca76000ace2f1f5a211b63adf93
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
Mandriva update for kernel
SECUNIA ADVISORY ID:
SA26620
VERIFY ADVISORY:
http://secunia.com/advisories/26620/
CRITICAL:
Moderately critical
IMPACT:
Brute force, Exposure of sensitive information, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/
DESCRIPTION:
Mandriva has issued an update for the kernel. This fixes some
security issues and vulnerabilities, which can be exploited by
malicious, local users to disclose potentially sensitive information,
cause a DoS (Denial of Service), and by malicious people to cause a
DoS.
For more information:
SA23361
SA24492
SA25030
SA25068
SA25163
SA25594
SA25682
SOLUTION:
Apply updated packages.
Mandriva Linux 2007
d811181ab766c637c1f2c66d6e87e8d6
2007.0/i586/kernel-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
1085a0bf3e633334fc89c193d40520c5
2007.0/i586/kernel-doc-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
b192fa1b91318b4f821fcd1e9f76a03e
2007.0/i586/kernel-enterprise-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
54e08cecf37cacbfc490ae4a3eb803ba
2007.0/i586/kernel-legacy-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
60eb7f61d0f91da0396ceb8cc0528a0b
2007.0/i586/kernel-source-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
48bbb8ff51313a61e85562f3f5036832
2007.0/i586/kernel-source-stripped-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
d6464e0a4512ae194a884a73d6196fc7
2007.0/i586/kernel-xen0-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
4264a6f084147f6f401b5320689eab89
2007.0/i586/kernel-xenU-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
d6845e3410f8f468b2c1e30ce2a4c4de
2007.0/SRPMS/kernel-2.6.17.15mdv-1-1mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
16c9da0d48ebe6391382921c10ccac97
2007.0/x86_64/kernel-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
56f44a046c471d98d6778153cdee7a80
2007.0/x86_64/kernel-doc-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
dea95558e0ada5af5f05abbc0c79aaca
2007.0/x86_64/kernel-source-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
de1f522536c1b6615b30269f6824ba18
2007.0/x86_64/kernel-source-stripped-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
6001c99297c562f99c827ee123d9379c
2007.0/x86_64/kernel-xen0-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
7534d9a0b31ad88e5191d94dcede38f9
2007.0/x86_64/kernel-xenU-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
d6845e3410f8f468b2c1e30ce2a4c4de
2007.0/SRPMS/kernel-2.6.17.15mdv-1-1mdv2007.0.src.rpm
ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
OTHER REFERENCES:
SA23361:
http://secunia.com/advisories/23361/
SA24492:
http://secunia.com/advisories/24492/
SA25030:
http://secunia.com/advisories/25030/
SA25068:
http://secunia.com/advisories/25068/
SA25163:
http://secunia.com/advisories/25163/
SA25594:
http://secunia.com/advisories/25594/
SA25682:
http://secunia.com/advisories/25682/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------