The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Linux kernel: vulnerabilities of EFLAGS under i386

Synthesis of the vulnerability 

A local attacker can generate a denial of service or elevate his privileges on a i386 processor.
Vulnerable software: Debian, Linux, Mandriva Linux, NLD, OES, openSUSE, RHEL, SLES.
Severity of this announce: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 03/01/2007.
Références of this computer vulnerability: BID-21851, CVE-2006-5173, CVE-2006-5755, DSA-1381-1, MDKSA-2007:002, MDKSA-2007:171, RHSA-2008:0957-02, SUSE-SA:2006:079, VIGILANCE-VUL-6427.

Description of the vulnerability 

On i386 processors, there is a 32 bit register named EFLAGS. It notably contains following flags:
 - CF : Carry (during arithmetic operations)
 - ZF : Zero
 - IOPL : Input / Output Privilege Level on 2 bits
 - NT : Nested Task (indicates if current task is related to previous task)
 - AC : Alignment Check (check for memory alignment)

During a context change, the EFLAGS register is not always correctly saved and restored. In the same way when a new thread is created, this register is not correctly initialized.

A local attacker can therefore create a program setting NT or AC flags in order to disturb other processes. This generally leads to a denial of service.

A local attacker can also create a program modifying IOPL in order to elevate his input/output privilege.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer weakness alert impacts software or systems such as Debian, Linux, Mandriva Linux, NLD, OES, openSUSE, RHEL, SLES.

Our Vigil@nce team determined that the severity of this weakness note is medium.

The trust level is of type confirmed by the editor, with an origin of user account.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this weakness bulletin.

Solutions for this threat 

Linux kernel: version 2.6.16.38.
Version 2.6.16.38 is corrected:
  http://www.kernel.org/

Debian: new kernel packages.
New packages are available:

  AMD64 architecture:
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 3165218 4f4764c3aef1f9e11201852b94467850
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 51516 a90387023090038a122da75482b981fd
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 51542 cb132c34f0684e6a7b1facc9432ecca2
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 269088 d3d721166785a2acfc475b8a87eb7de0
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 3188578 58346ab81a8dae1bbff87412b9d071a8
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 269454 ef04a599ceb19d37a544cd6f95000138
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 3331732 8b0e214847656f1fb6b2d35396db36a7
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 269772 1d3f9740c35d4510c6612bb645b1ef79
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 3354462 30fce94ecaa6650c7eb3307e76ad47d9
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 270790 4cd241518cb91e87bbcc62c09117accc
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 16800532 5cd7846a71c94945df71cf67b3d9f254
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 16840344 d264466281d7596876f18427dc7dad37
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 1648548 ff22e2a8c3f269295231b2b24289a892
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 1679922 f7061df614029b187d6883902b2053b7
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 15239984 c8de0964da37ad0d13a7c0b1a8dbe927
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 15257046 7fbf51b2580cdf39314d5cae996f8059
    http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 51500 d813a622add08eb6ca03f118af21e6c0
    http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
      Size/MD5 checksum: 51514 9f3b1193357e2b448f653e3dd8cac1ac
  Intel IA-32 architecture:
    http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.13etch4_i386.deb
      Size/MD5 checksum: 5500882 34b990b6e91c480d2775d89e32ce437d
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 3165366 da8e35820741f11bb6294fdbcc744703
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 279522 329b2d702f32b3ad48bcb46d01f5314c
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 276154 1b9448c7bd3bde437ab6a938064873f2
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 276660 ca56f56b7a8976014f98def299592fd4
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 51520 ded0b906ba23835ab08bcd9c50f86485
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 51572 ca29d913506d4605c548b40f09142e82
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 269976 318af48160923c29422b31d73f91ade4
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 275906 8d7f6f03ca00393f3965dcdfcda00774
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 3051664 1c1d62ef7db29003ad4f1da99a24b65f
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 275268 de725a7b4623d4219793b20be56db881
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 275234 eda8fbe5a6db4c9b64883ef2834ac829
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 3145888 12bcb2f8010a245ae7af452beb1cc290
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 270752 2db897f2a802eeac160af8c267b9c6eb
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 3168122 85b2b60232ede47e610634ccd71bbca1
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 271024 6da5e709b3c9923966197d95c4b23610
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-486_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 16170710 9109283c0e49d2968b5f36af7958b671
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 16319840 6b800f593454b8683d0f8cfd169fc96a
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 16385948 4498832b220546242c2a3ac1190fa2e1
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 16816550 409ac0482522377d01a9d28bf31beeb0
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 16451472 fcfc3df511cdb7264dd4346e2ba2c3f6
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 16360708 2a35e8f6dc5c09730e3465ede7fc04e0
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 16489340 a4834981ad3f1b2971d06900efb7a3e8
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 1297094 1140c4de7a2041e507b9cc4b3eb985c8
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 1324284 e0c75d7db0af2edd6f01ffcde6c05773
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 14259342 3a401200f009a80f6fd7a7f7e74e2c45
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 14273216 0b06968bd3d0125595fda63d641ed24a
    http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 51496 f517e965c35f6b850678088d29741dc4
    http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch4_i386.deb
      Size/MD5 checksum: 51510 46c0d9815c13f36668c46565c82f5dac
    http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.13etch4_i386.deb
      Size/MD5 checksum: 25581732 39fc9a71734345a268001c668cc515e1
  Intel IA-64 architecture:
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch4_ia64.deb
      Size/MD5 checksum: 3079236 a4638eccc104fc8c61966eac89a18deb
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch4_ia64.deb
      Size/MD5 checksum: 51516 fd1c5d4d5487b8432df36711e51dd655
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-13etch4_ia64.deb
      Size/MD5 checksum: 51542 4f886289d99750be07d1ab6ed9c88f75
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-13etch4_ia64.deb
      Size/MD5 checksum: 252570 974a03c2e115156ff57847e6776dc438
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch4_ia64.deb
      Size/MD5 checksum: 252544 6c039f749900e30cec4f1746b6f0acc9
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-13etch4_ia64.deb
      Size/MD5 checksum: 28007402 6299af0cd9fee918dc384cf8f711a00f
    http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch4_ia64.deb
      Size/MD5 checksum: 28177850 f877dd23c8eff90e7bb6c3a39fbcfcd8

Mandriva 2007.0, 2007.1: new kernel packages.
New packages are available:
 Mandriva Linux 2007.0:
 d811181ab766c637c1f2c66d6e87e8d6 2007.0/i586/kernel-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
 1085a0bf3e633334fc89c193d40520c5 2007.0/i586/kernel-doc-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
 b192fa1b91318b4f821fcd1e9f76a03e 2007.0/i586/kernel-enterprise-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
 54e08cecf37cacbfc490ae4a3eb803ba 2007.0/i586/kernel-legacy-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
 60eb7f61d0f91da0396ceb8cc0528a0b 2007.0/i586/kernel-source-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
 48bbb8ff51313a61e85562f3f5036832 2007.0/i586/kernel-source-stripped-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
 d6464e0a4512ae194a884a73d6196fc7 2007.0/i586/kernel-xen0-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
 4264a6f084147f6f401b5320689eab89 2007.0/i586/kernel-xenU-2.6.17.15mdv-1-1mdv2007.0.i586.rpm
 d6845e3410f8f468b2c1e30ce2a4c4de 2007.0/SRPMS/kernel-2.6.17.15mdv-1-1mdv2007.0.src.rpm
 Mandriva Linux 2007.0/X86_64:
 16c9da0d48ebe6391382921c10ccac97 2007.0/x86_64/kernel-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
 56f44a046c471d98d6778153cdee7a80 2007.0/x86_64/kernel-doc-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
 dea95558e0ada5af5f05abbc0c79aaca 2007.0/x86_64/kernel-source-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
 de1f522536c1b6615b30269f6824ba18 2007.0/x86_64/kernel-source-stripped-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
 6001c99297c562f99c827ee123d9379c 2007.0/x86_64/kernel-xen0-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
 7534d9a0b31ad88e5191d94dcede38f9 2007.0/x86_64/kernel-xenU-2.6.17.15mdv-1-1mdv2007.0.x86_64.rpm
 d6845e3410f8f468b2c1e30ce2a4c4de 2007.0/SRPMS/kernel-2.6.17.15mdv-1-1mdv2007.0.src.rpm
 Mandriva Linux 2007.1:
 7ecc4ad79ff8ba1f28d440aae4bae1e0 2007.1/i586/kernel-2.6.17.15mdv-1-1mdv2007.1.i586.rpm
 490f409ed0f979718b4491c79e90ca51 2007.1/i586/kernel-doc-2.6.17.15mdv-1-1mdv2007.1.i586.rpm
 eb01284da75d113ca144c75bdbf7bbd7 2007.1/i586/kernel-doc-latest-2.6.17-15mdv.i586.rpm
 f62258545c302e8bd6333fb1b22fdd1c 2007.1/i586/kernel-enterprise-2.6.17.15mdv-1-1mdv2007.1.i586.rpm
 d22574eaff9ffc7c66a1504bc8f5072e 2007.1/i586/kernel-enterprise-latest-2.6.17-15mdv.i586.rpm
 6721155375ef23a8d7fc6f005acb271e 2007.1/i586/kernel-latest-2.6.17-15mdv.i586.rpm
 93ec8479cf3b047f1d7b4a209641defe 2007.1/i586/kernel-legacy-2.6.17.15mdv-1-1mdv2007.1.i586.rpm
 a2036553e6c5688c2d98041d7f784c96 2007.1/i586/kernel-legacy-latest-2.6.17-15mdv.i586.rpm
 718543542ed69def4d941d9abf51913c 2007.1/i586/kernel-source-2.6.17.15mdv-1-1mdv2007.1.i586.rpm
 e808ecec927f34cd276eb0b8d40ae6a8 2007.1/i586/kernel-source-latest-2.6.17-15mdv.i586.rpm
 dfca6b82dc93cf8f8a1042c95e45c279 2007.1/i586/kernel-source-stripped-2.6.17.15mdv-1-1mdv2007.1.i586.rpm
 a289ed33d6e597e7ddaab03fb7c7d726 2007.1/i586/kernel-source-stripped-latest-2.6.17-15mdv.i586.rpm
 d7302d839d738503b4fb79e187a7144c 2007.1/i586/kernel-xen0-2.6.17.15mdv-1-1mdv2007.1.i586.rpm
 09cdb36a943e21a6e26a34879e8a7b94 2007.1/i586/kernel-xen0-latest-2.6.17-15mdv.i586.rpm
 baf363280921a090134bbe9e8e646f10 2007.1/i586/kernel-xenU-2.6.17.15mdv-1-1mdv2007.1.i586.rpm
 90317de9412ace8f3f5d2d29dde72977 2007.1/i586/kernel-xenU-latest-2.6.17-15mdv.i586.rpm
 364e7f83e4948ba15c894b4da4642161 2007.1/SRPMS/kernel-2.6.17.15mdv-1-1mdv2007.1.src.rpm
 Mandriva Linux 2007.1/X86_64:
 4b0a0e1ccbd82e9130243af1bf0a8848 2007.1/x86_64/kernel-2.6.17.15mdv-1-1mdv2007.1.x86_64.rpm
 ef962dd6f6c5c6c0a88bf340701f6ba9 2007.1/x86_64/kernel-doc-2.6.17.15mdv-1-1mdv2007.1.x86_64.rpm
 2611fb6d342c0c57e68199ae9cff1aad 2007.1/x86_64/kernel-doc-latest-2.6.17-15mdv.x86_64.rpm
 002d07f36a0caf770b4e9be713421c1e 2007.1/x86_64/kernel-latest-2.6.17-15mdv.x86_64.rpm
 01a245502f9b0dd70bb03b81ab791951 2007.1/x86_64/kernel-source-2.6.17.15mdv-1-1mdv2007.1.x86_64.rpm
 cde593c1b74843033072bf39b55aad51 2007.1/x86_64/kernel-source-latest-2.6.17-15mdv.x86_64.rpm
 6c80e89a69737f853a5c28a4ef9c26e8 2007.1/x86_64/kernel-source-stripped-2.6.17.15mdv-1-1mdv2007.1.x86_64.rpm
 f36ca98ce2f577675e864feec1936d95 2007.1/x86_64/kernel-source-stripped-latest-2.6.17-15mdv.x86_64.rpm
 e8f1196c4a6a8c3948327c1fdb2287b3 2007.1/x86_64/kernel-xen0-2.6.17.15mdv-1-1mdv2007.1.x86_64.rpm
 01f1acb664885bc6587b6cb96dec3de3 2007.1/x86_64/kernel-xen0-latest-2.6.17-15mdv.x86_64.rpm
 6eb46e2f4045b78d1f89f76a9ce04ee5 2007.1/x86_64/kernel-xenU-2.6.17.15mdv-1-1mdv2007.1.x86_64.rpm
 bf51ac4bde7a22fb8c5d40fff840ed58 2007.1/x86_64/kernel-xenU-latest-2.6.17-15mdv.x86_64.rpm
 364e7f83e4948ba15c894b4da4642161 2007.1/SRPMS/kernel-2.6.17.15mdv-1-1mdv2007.1.src.rpm

Mandriva 2007.0: new kernel packages.
New packages are available:
 
 Mandriva Linux 2007.0:
 7eba457234782c9f83c47cd26be3de80 2007.0/i586/kernel-2.6.17.8mdv-1-1mdv2007.0.i586.rpm
 80f104e8ff3081e7e868e3482f50fd81 2007.0/i586/kernel-enterprise-2.6.17.8mdv-1-1mdv2007.0.i586.rpm
 72964c8645531460b742f9e54d118488 2007.0/i586/kernel-legacy-2.6.17.8mdv-1-1mdv2007.0.i586.rpm
 bc52255a4290284600dfc0e97e5797cd 2007.0/i586/kernel-source-2.6.17.8mdv-1-1mdv2007.0.i586.rpm
 fbfc24233bf616eab08b247194210fe7 2007.0/i586/kernel-source-stripped-2.6.17.8mdv-1-1mdv2007.0.i586.rpm
 e30ec4041c80756ab8e004b6335337cd 2007.0/i586/kernel-xen0-2.6.17.8mdv-1-1mdv2007.0.i586.rpm
 4da4e24805a2a2301bf7f97f6e0fb974 2007.0/i586/kernel-xenU-2.6.17.8mdv-1-1mdv2007.0.i586.rpm
 0cb62354da7ae0bd1dd6b851bedd9496 2007.0/SRPMS/kernel-2.6.17.8mdv-1-1mdv2007.0.src.rpm
 Mandriva Linux 2007.0/X86_64:
 d4c8250e75b57b227b308e2a975ae13c 2007.0/x86_64/kernel-2.6.17.8mdv-1-1mdv2007.0.x86_64.rpm
 3cb5a059bc3d352da95fb285f2c31f80 2007.0/x86_64/kernel-source-2.6.17.8mdv-1-1mdv2007.0.x86_64.rpm
 9ff265225b8624a083058b5ec16174c2 2007.0/x86_64/kernel-source-stripped-2.6.17.8mdv-1-1mdv2007.0.x86_64.rpm
 23ba072d883bac51179e42df654aba79 2007.0/x86_64/kernel-xen0-2.6.17.8mdv-1-1mdv2007.0.x86_64.rpm
 268ac512e41476f1e0df9d94299c317b 2007.0/x86_64/kernel-xenU-2.6.17.8mdv-1-1mdv2007.0.x86_64.rpm
 0cb62354da7ae0bd1dd6b851bedd9496 2007.0/SRPMS/kernel-2.6.17.8mdv-1-1mdv2007.0.src.rpm

RHEL 5: new kernel packages.
New packages are available:
  kernel-2.6.18-92.1.17.el5

SUSE Linux: new kernel packages.
New packages are available:
   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel*-2.6.16.27-0.6.i586.rpm
   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel*-2.6.13-15.13.i586.rpm
   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel*-2.6.11.4-21.15.i586.rpm
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computer vulnerability note. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.