---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Mandriva update for kernel SECUNIA ADVISORY ID: SA27212 VERIFY ADVISORY: http://secunia.com/advisories/27212/ CRITICAL: Moderately critical IMPACT: Security Bypass, Privilege escalation, DoS WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), or gain escalated privileges, and by malicious people to cause a DoS. For more information: SA25895 SA25955 SA26322 SA26934 SOLUTION: Apply updated packages. -- Mandriva Linux 2007.0 -- f99dbf1673d8a021cc34846f1638867b 2007.0/i586/kernel-2.6.17.16mdv-1-1mdv2007.0.i586.rpm 50be9069d1764675309639acb2b40d56 2007.0/i586/kernel-doc-2.6.17.16mdv-1-1mdv2007.0.i586.rpm d21ea9807b3439ac1b5dad14dd079b14 2007.0/i586/kernel-enterprise-2.6.17.16mdv-1-1mdv2007.0.i586.rpm 9580a6361e4d673ac8b0aaf03232007b 2007.0/i586/kernel-legacy-2.6.17.16mdv-1-1mdv2007.0.i586.rpm ce58edd917bbbd868ef1ce1bb128c8d1 2007.0/i586/kernel-source-2.6.17.16mdv-1-1mdv2007.0.i586.rpm b9177102e20d0f64b5cbff13cae899c5 2007.0/i586/kernel-source-stripped-2.6.17.16mdv-1-1mdv2007.0.i586.rpm 27682940a2c1885df7ada7dd68fe9efa 2007.0/i586/kernel-xen0-2.6.17.16mdv-1-1mdv2007.0.i586.rpm f96636a80d0779e84f1caa8b3d92f723 2007.0/i586/kernel-xenU-2.6.17.16mdv-1-1mdv2007.0.i586.rpm 34cb36342f866a44d34627a809db2ee5 2007.0/SRPMS/kernel-2.6.17.16mdv-1-1mdv2007.0.src.rpm -- Mandriva Linux 2007.0/X86_64 -- 6eebbdf78fac9ef6092be3f4f07e0fec 2007.0/x86_64/kernel-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm b84feb968f88b161efd96711738eabb2 2007.0/x86_64/kernel-doc-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm 24f8db96f8c023208b9d3b5e9d161f5d 2007.0/x86_64/kernel-source-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm 37b99c870cc4e4aaecd17594559a2b04 2007.0/x86_64/kernel-source-stripped-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm f318ae4d1d7f758ceed3c28a28bf0d7f 2007.0/x86_64/kernel-xen0-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm bd571bf3e47a687fcd114c6c104979c1 2007.0/x86_64/kernel-xenU-2.6.17.16mdv-1-1mdv2007.0.x86_64.rpm 34cb36342f866a44d34627a809db2ee5 2007.0/SRPMS/kernel-2.6.17.16mdv-1-1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066702.html OTHER REFERENCES: SA25895: http://secunia.com/advisories/25895/ SA25955: http://secunia.com/advisories/25955/ SA26322: http://secunia.com/advisories/26322/ SA26934: http://secunia.com/advisories/26934/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------