---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Mandriva update for kernel SECUNIA ADVISORY ID: SA22762 VERIFY ADVISORY: http://secunia.com/advisories/22762/ CRITICAL: Moderately critical IMPACT: Security Bypass, DoS WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). For more information: SA22279 SA22731 SOLUTION: Apply updated packages. Mandriva Linux 2007 fdcd9cdcd13729d19e87ea6e045c40a9 2007.0/i586/kernel-2.6.17.6mdv-1-1mdv2007.0.i586.rpm c5b92253d8359f40a1d58ce3fd2afa6d 2007.0/i586/kernel-enterprise-2.6.17.6mdv-1-1mdv2007.0.i586.rpm 40aa09f4acfb3f55264a4077b6129ad2 2007.0/i586/kernel-legacy-2.6.17.6mdv-1-1mdv2007.0.i586.rpm ca4a8a25517d32f24bcf6540f8d4ac43 2007.0/i586/kernel-source-2.6.17.6mdv-1-1mdv2007.0.i586.rpm 614b49725c3b0a23ef3520e1ce54e8ae 2007.0/i586/kernel-source-stripped-2.6.17.6mdv-1-1mdv2007.0.i586.rpm 35d251fc2496a2fc6fa6d42bd7df0057 2007.0/i586/kernel-xen0-2.6.17.6mdv-1-1mdv2007.0.i586.rpm eb6e0f7788acc76c67843c839459d836 2007.0/i586/kernel-xenU-2.6.17.6mdv-1-1mdv2007.0.i586.rpm 29e240e832e84eefd95a47a5dbec1df9 2007.0/SRPMS/kernel-2.6.17.6mdv-1-1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 4a134d3c6a5bb96b3191e750fe230cb6 2007.0/x86_64/kernel-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm 14f2e578d613e3ae3f691980248df648 2007.0/x86_64/kernel-source-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm c60f34dfd4f0ed8a96902ce89e46178a 2007.0/x86_64/kernel-source-stripped-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm 868743bd6503be82bb00a720404582df 2007.0/x86_64/kernel-xen0-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm 47b108c6acae00650e9d8d0b64af1e3f 2007.0/x86_64/kernel-xenU-2.6.17.6mdv-1-1mdv2007.0.x86_64.rpm 29e240e832e84eefd95a47a5dbec1df9 2007.0/SRPMS/kernel-2.6.17.6mdv-1-1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2006:197 OTHER REFERENCES: SA22279: http://secunia.com/advisories/22279/ SA22731: http://secunia.com/advisories/22731/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------