exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 27212

Secunia Security Advisory 27212
Posted Oct 16, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), or gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, mandriva
SHA-256 | 7e5f5250a4a365579c0c0c82cca739844a961d06ee697bf5814ad01d762a6d6a

Secunia Security Advisory 27212

Change Mirror Download


----------------------------------------------------------------------

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.

Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/

----------------------------------------------------------------------

TITLE:
Mandriva update for kernel

SECUNIA ADVISORY ID:
SA27212

VERIFY ADVISORY:
http://secunia.com/advisories/27212/

CRITICAL:
Moderately critical

IMPACT:
Security Bypass, Privilege escalation, DoS

WHERE:
>From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
bypass certain security restrictions, cause a DoS (Denial of
Service), or gain escalated privileges, and by malicious people to
cause a DoS.

For more information:
SA25895
SA25955
SA26322
SA26934

SOLUTION:
Apply updated packages.

-- Mandriva Linux 2007.0 --
f99dbf1673d8a021cc34846f1638867b
2007.0/i586/kernel-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
50be9069d1764675309639acb2b40d56
2007.0/i586/kernel-doc-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
d21ea9807b3439ac1b5dad14dd079b14
2007.0/i586/kernel-enterprise-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
9580a6361e4d673ac8b0aaf03232007b
2007.0/i586/kernel-legacy-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
ce58edd917bbbd868ef1ce1bb128c8d1
2007.0/i586/kernel-source-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
b9177102e20d0f64b5cbff13cae899c5
2007.0/i586/kernel-source-stripped-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
27682940a2c1885df7ada7dd68fe9efa
2007.0/i586/kernel-xen0-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
f96636a80d0779e84f1caa8b3d92f723
2007.0/i586/kernel-xenU-2.6.17.16mdv-1-1mdv2007.0.i586.rpm
34cb36342f866a44d34627a809db2ee5
2007.0/SRPMS/kernel-2.6.17.16mdv-1-1mdv2007.0.src.rpm

-- Mandriva Linux 2007.0/X86_64 --
6eebbdf78fac9ef6092be3f4f07e0fec
2007.0/x86_64/kernel-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
b84feb968f88b161efd96711738eabb2
2007.0/x86_64/kernel-doc-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
24f8db96f8c023208b9d3b5e9d161f5d
2007.0/x86_64/kernel-source-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
37b99c870cc4e4aaecd17594559a2b04
2007.0/x86_64/kernel-source-stripped-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
f318ae4d1d7f758ceed3c28a28bf0d7f
2007.0/x86_64/kernel-xen0-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
bd571bf3e47a687fcd114c6c104979c1
2007.0/x86_64/kernel-xenU-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm
34cb36342f866a44d34627a809db2ee5
2007.0/SRPMS/kernel-2.6.17.16mdv-1-1mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066702.html

OTHER REFERENCES:
SA25895:
http://secunia.com/advisories/25895/

SA25955:
http://secunia.com/advisories/25955/

SA26322:
http://secunia.com/advisories/26322/

SA26934:
http://secunia.com/advisories/26934/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close