Updated kernel packages fix multiple vulnerabilities and bugs
A flaw in the vmsplice system call did not properly verify address
arguments passed by user-space processes, which allowed local attackers
to overwrite arbitrary kernel memory and gain root privileges.
Mandriva urges all users to upgrade to these new kernels immediately
as this flaw is being actively exploited. This issue only affects
2.6.17 and newer Linux kernels, so neither Corporate 3.0 nor Corporate
4.0 are affected.
To update your kernel, please follow the directions located at:
http://www.mandriva.com/en/security/kernelupdate