New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 8.9
SynopsisThe remote Mandriva Linux host is missing one or more security updates.
DescriptionThe wait_task_stopped function in the Linux kernel before 22.214.171.124 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third-party information. (CVE-2007-5500)
The tcp_sacktag_write_queue function in the Linux kernel 2.6.21 through 126.96.36.199 allowed remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference (CVE-2007-5501).
The do_corefump function in fs/exec.c in the Linux kernel prior to 2.6.24-rc3 did not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which could possibly allow local users to obtain sensitive information (CVE-2007-6206).
VFS in the Linux kernel before 188.8.131.52 performed tests of access mode by using the flag variable instead of the acc_mode variable, which could possibly allow local users to bypass intended permissions and remove directories (CVE-2008-0001).
The Linux kernel prior to 184.108.40.206, when using certain drivers that register a fault handler that does not perform range checks, allowed local users to access kernel memory via an out-of-range offset (CVE-2008-0007).
A flaw in the vmsplice system call did not properly verify address arguments passed by user-space processes, which allowed local attackers to overwrite arbitrary kernel memory and gain root privileges (CVE-2008-0600).
Mandriva urges all users to upgrade to these new kernels immediately as the CVE-2008-0600 flaw is being actively exploited. This issue only affects 2.6.17 and newer Linux kernels, so neither Corporate 3.0 nor Corporate 4.0 are affected.
Additionally, this kernel updates the version from 220.127.116.11 to 18.104.22.168 and fixes numerous other bugs, including :
- fix freeze when ejecting a cm40x0 PCMCIA card
- fix crash on unloading netrom
- fixes alsa-related sound issues on Dell XPS M1210 and M1330 models
- the HZ value was increased on the laptop kernel to increase interactivity and reduce latency
- netfilter ipset, psd, and ifwlog support was re-enabled
- unionfs was reverted to a working 1.4 branch that is less buggy
To update your kernel, please follow the directions located at :
SolutionUpdate the affected packages.