The remote host is missing an update to kernel announced via advisory MDVSA-2009:233.
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:233
A vulnerability was discovered and corrected in the Linux 2.6 kernel: The Linux kernel 2.6.0 through 22.214.171.124, and 2.4.4 through 126.96.36.199, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation on a PF_PPPOX socket. (CVE-2009-2692) To update your kernel, please follow the directions located at: http://www.mandriva.com/en/security/kernelupdate Affected: 2008.1, Corporate 3.0, Corporate 4.0, Multi Network Firewall 2.0