exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2011-029

Mandriva Linux Security Advisory 2011-029
Posted Feb 18, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-029 - Multiple vulnerabilities have been discovered and fixed in the Linux 2.6 kernel. The X.25 implementation does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed data, a different vulnerability than CVE-2010-4164. The bcm_connect function Broadcast Manager in the Controller Area Network implementation in the Linux creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename. The install_special_mapping function in mm/mmap.c does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application. Various other issues have also been addressed.

tags | advisory, remote, denial of service, kernel, local, vulnerability
systems | linux, mandriva
advisories | CVE-2010-3873, CVE-2010-4565, CVE-2010-4346, CVE-2010-4158, CVE-2010-3874, CVE-2010-4163, CVE-2010-4164, CVE-2009-4307, CVE-2010-4162, CVE-2010-3015, CVE-2010-4258, CVE-2010-3875, CVE-2010-3067, CVE-2010-4248, CVE-2010-3437, CVE-2010-3877, CVE-2009-2406, CVE-2010-3859, CVE-2010-4073, CVE-2010-4072, CVE-2010-3705, CVE-2010-4165, CVE-2010-3310, CVE-2010-3698
SHA-256 | 65f216d797172b0ef5fb798cc0c6bfad2e1a9bea20f92874be16068901dbc644

Mandriva Linux Security Advisory 2011-029

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:029
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kernel
Date : February 17, 2011
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability was discovered and corrected in the Linux 2.6 kernel:
The X.25 implementation does not properly parse facilities, which
allows remote attackers to cause a denial of service (heap memory
corruption and panic) or possibly have
unspecified other impact via malformed data, a different vulnerability
than CVE-2010-4164. (CVE-2010-3873)

The bcm_connect function Broadcast Manager in the Controller Area
Network (CAN) implementation in the Linux creates a publicly accessible
file with a filename containing a kernel memory address, which allows
local users to obtain potentially sensitive information about kernel
memory use by listing this filename. (CVE-2010-4565)

The install_special_mapping function in mm/mmap.c does not make an
expected security_file_mmap function call, which allows local users
to bypass intended mmap_min_addr restrictions and possibly conduct
NULL pointer dereference attacks via a crafted assembly-language
application. (CVE-2010-4346)

The sk_run_filter function does not check whether a certain memory
location has been initialized before executing a BPF_S_LD_MEM
or BPF_S_LDX_MEM instruction, which allows local users to obtain
potentially sensitive information from kernel stack memory via a
crafted socket filter. (CVE-2010-4158)

Heap-based buffer overflow in the bcm_connect function the Broadcast
Manager in the Controller Area Network (CAN)on 64-bit platforms might
allow local users to cause a denial of service (memory corruption)
via a connect operation. (CVE-2010-3874)

The blk_rq_map_user_iov function in block/blk-map.c allows local
users to cause a denial of service (panic) via a zero-length I/O
request in a device ioctl to a SCSI device. (CVE-2010-4163)

Multiple integer underflows in the x25_parse_facilities function in
allow remote attackers to cause a denial of service (system crash)
via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3)
X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data. (CVE-2010-4164)

Race condition in the do_setlk function allows local users to cause a
denial of service (crash) via vectors resulting in an interrupted RPC
call that leads to a stray FL_POSIX lock, related to improper handling
of a race between fcntl and close in the EINTR case. (CVE-2009-4307)

Multiple integer overflows in fs/bio.c allow local users to cause
a denial of service (system crash) via a crafted device ioctl to a
SCSI device. (CVE-2010-4162)

Integer overflow in the ext4_ext_get_blocks function in
fs/ext4/extents.c allows local users to cause a denial of service
(BUG and system crash) via a write operation on the last block of a
large file, followed by a sync operation. (CVE-2010-3015)

The do_exit function in kernel/exit.c does not properly handle a
KERNEL_DS get_fs value, which allows local users to bypass intended
access_ok restrictions, overwrite arbitrary kernel memory locations,
and gain privileges by leveraging a (1) BUG, (2) NULL pointer
dereference, or (3) page fault, as demonstrated by vectors involving
the clear_child_tid feature and the splice system call. (CVE-2010-4258)

The ax25_getname function in net/ax25/af_ax25.c does not initialize
a certain structure, which allows local users to obtain potentially
sensitive information from kernel stack memory by reading a copy of
this structure. (CVE-2010-3875)

Integer overflow in the do_io_submit function in fs/aio.c allows local
users to cause a denial of service or possibly have unspecified other
impact via crafted use of the io_submit system call. (CVE-2010-3067)

Race condition in the __exit_signal function in kernel/exit.c
allows local users to cause a denial of service via vectors
related to multithreaded exec, the use of a thread group leader in
kernel/posix-cpu-timers.c, and the selection of a new thread group
leader in the de_thread function in fs/exec.c. (CVE-2010-4248)

Integer signedness error in the pkt_find_dev_from_minor function
in drivers/block/pktcdvd.c allows local users to obtain sensitive
information from kernel memory or cause a denial of service (invalid
pointer dereference and system crash) via a crafted index value in
a PKT_CTRL_CMD_STATUS ioctl call. (CVE-2010-3437)

The get_name function in net/tipc/socket.c does not initialize a
certain structure, which allows local users to obtain potentially
sensitive information from kernel stack memory by reading a copy of
this structure. (CVE-2010-3877)

Stack-based buffer overflow in the parse_tag_11_packet function
in fs/ecryptfs/keystore.c in the eCryptfs subsystem allows local
users to cause a denial of service (system crash) or possibly gain
privileges via vectors involving a crafted eCryptfs file, related
to not ensuring that the key signature length in a Tag 11 packet is
compatible with the key signature buffer size. (CVE-2009-2406)

Multiple integer signedness errors in the TIPC implementation allow
local users to gain privileges via a crafted sendmsg call that
triggers a heap-based buffer overflow, related to the tipc_msg_build
function in net/tipc/msg.c and the verify_iovec function in
net/core/iovec.c. (CVE-2010-3859)

The ipc subsystem does not initialize certain structures, which allows
local users to obtain potentially sensitive information from kernel
stack memory via vectors related to the (1) compat_sys_semctl, (2)
compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c;
and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr
functions in ipc/compat_mq.c. (CVE-2010-4073)

The copy_shmid_to_user function does not initialize a certain
structure, which allows local users to obtain potentially sensitive
information from kernel stack memory via vectors related to the shmctl
system call and the old shm interface. (CVE-2010-4072)

The sctp_auth_asoc_get_hmac function in net/sctp/auth.c does not
properly validate the hmac_ids array of an SCTP peer, which allows
remote attackers to cause a denial of service (memory corruption
and panic) via a crafted value in the last element of this
array. (CVE-2010-3705)

The do_tcp_setsockopt function in net/ipv4/tcp.c does not properly
restrict TCP_MAXSEG (aka MSS) values, which allows local users to
cause a denial of service (OOPS) via a setsockopt call that specifies
a small value, leading to a divide-by-zero error or incorrect use of
a signed integer. (CVE-2010-4165)

Multiple integer signedness errors in net/rose/af_rose.c allow local
users to cause a denial of service (heap memory corruption) or possibly
have unspecified other impact via a rose_getname function call,
related to the rose_bind and rose_connect functions. (CVE-2010-3310)

The KVM implementation does not properly reload the FS and GS segment
registers, which allows host OS users to cause a denial of service
(host OS crash) via a KVM_RUN ioctl call in conjunction with a modified
Local Descriptor Table (LDT). (CVE-2010-3698)

This update disable the iommu hardware in order to avoid crash with
some DELL servers (R510, R710,...)

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4346
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4248
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3698
https://qa.mandriva.com/62522
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
a3455fb1479b38f9923f84eaecfe66d7 mes5/i586/drm-experimental-kernel-2.6.27.56-desktop-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
dd333ca803c2533fb5c09cf4d186debd mes5/i586/drm-experimental-kernel-2.6.27.56-desktop586-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
5df5c97b2c664286e6501a76064aa9a2 mes5/i586/drm-experimental-kernel-2.6.27.56-server-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
3913aa3eb13e887831d86f4a0cfa88aa mes5/i586/drm-experimental-kernel-desktop586-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
c51a01dee1105cb6f0a30bfe1acaa2b6 mes5/i586/drm-experimental-kernel-desktop-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
fcc25ef3d30966eff0273c03858ce0f2 mes5/i586/drm-experimental-kernel-server-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
e3f4a601b0669e9637a4295c0f5b5623 mes5/i586/fglrx-kernel-2.6.27.56-desktop-2mnb-8.522-3mdv2009.0.i586.rpm
6097c3c9050fac6e8af7d9d17b567024 mes5/i586/fglrx-kernel-2.6.27.56-desktop586-2mnb-8.522-3mdv2009.0.i586.rpm
b2e6ea2d5677b7dfeb1cf89bb15a1b40 mes5/i586/fglrx-kernel-2.6.27.56-server-2mnb-8.522-3mdv2009.0.i586.rpm
e94306e6ab9d1d1da456c086604a93c6 mes5/i586/fglrx-kernel-desktop586-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
e2720f1cb9e3ed93829bd0d5d523e412 mes5/i586/fglrx-kernel-desktop-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
3233fa77b8b8f3f980225864e523692c mes5/i586/fglrx-kernel-server-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
01fc685fa34ce857d1c276cb0094a78c mes5/i586/iscsitarget-kernel-2.6.27.56-desktop-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
dde17d568af82d4d0fcabc52b9393c95 mes5/i586/iscsitarget-kernel-2.6.27.56-desktop586-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
ca1f7ce08ec87a0c06a72a30882e9e3a mes5/i586/iscsitarget-kernel-2.6.27.56-server-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
e3c2368a0b0ed533bcfb12a444851384 mes5/i586/iscsitarget-kernel-desktop586-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
be33f035a2fdcca45322b9117328ef33 mes5/i586/iscsitarget-kernel-desktop-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
bb1c83a43c7a975ce91b01bc7c674bf7 mes5/i586/iscsitarget-kernel-server-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
d5d842b38061e1532d1f340c637b91e9 mes5/i586/kernel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
0989e9bb357692a284391306a715a76e mes5/i586/kernel-desktop-2.6.27.56-2mnb-1-1mnb2.i586.rpm
ccf4d9c1a3d5e1d9626b6ce893f72200 mes5/i586/kernel-desktop586-2.6.27.56-2mnb-1-1mnb2.i586.rpm
ed99ebe5b806ac4e8f4ea23a65b61832 mes5/i586/kernel-desktop586-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
619bd6031126ee028787be855580a470 mes5/i586/kernel-desktop586-devel-latest-2.6.27.56-2mnb2.i586.rpm
3b0864031b1ff1b9e574208d971b984b mes5/i586/kernel-desktop586-latest-2.6.27.56-2mnb2.i586.rpm
c66aea10f5f8bc84fc095388392006db mes5/i586/kernel-desktop-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
13fe690840e0026b35ba781a1eb18ce1 mes5/i586/kernel-desktop-devel-latest-2.6.27.56-2mnb2.i586.rpm
3323e1d08cec08036205842560ab7179 mes5/i586/kernel-desktop-latest-2.6.27.56-2mnb2.i586.rpm
6de830a855c1d92bde173c56a859a080 mes5/i586/kernel-doc-2.6.27.56-2mnb2.i586.rpm
f6661b094c7ce232280d94a4d4c3fd30 mes5/i586/kernel-server-2.6.27.56-2mnb-1-1mnb2.i586.rpm
b5c5d854b344ef630b964ec57c75a5fb mes5/i586/kernel-server-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
af57e82b86a7af33c0b63df17b0e07a5 mes5/i586/kernel-server-devel-latest-2.6.27.56-2mnb2.i586.rpm
38cd88b4dfd68872ef6a24a7909bf8d7 mes5/i586/kernel-server-latest-2.6.27.56-2mnb2.i586.rpm
6dfa8e791336c906cef8e65c225ae120 mes5/i586/kernel-source-2.6.27.56-2mnb-1-1mnb2.i586.rpm
03bd0ce5f3354f4923dbee5c9838e4ca mes5/i586/kernel-source-latest-2.6.27.56-2mnb2.i586.rpm
5843a25ec60d13cbd90b1eb0520b7e0e mes5/i586/kqemu-kernel-2.6.27.56-desktop-2mnb-1.4.0pre1-0.i586.rpm
e93c44266df87ef2ca975240b64e94a5 mes5/i586/kqemu-kernel-2.6.27.56-desktop586-2mnb-1.4.0pre1-0.i586.rpm
073240e168447c95bf0848ef39c201e7 mes5/i586/kqemu-kernel-2.6.27.56-server-2mnb-1.4.0pre1-0.i586.rpm
95809d47bd1327d6888ed8b98e4c2b7a mes5/i586/kqemu-kernel-desktop586-latest-1.4.0pre1-1.20110216.0.i586.rpm
babe60e138b903b4e3675a32f42b204e mes5/i586/kqemu-kernel-desktop-latest-1.4.0pre1-1.20110216.0.i586.rpm
366210833c482dc2413a8a8a2d138390 mes5/i586/kqemu-kernel-server-latest-1.4.0pre1-1.20110216.0.i586.rpm
70d601acad9ee4d726b1358bf145ecec mes5/i586/libafs-kernel-2.6.27.56-desktop-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
d770b0e0a27a1c4c90409d1f8cfdbe42 mes5/i586/libafs-kernel-2.6.27.56-desktop586-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
181aecd13b56cd3a2aa3136782c9e617 mes5/i586/libafs-kernel-2.6.27.56-server-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
080c989ed2f875c64035210cbb92d4fd mes5/i586/libafs-kernel-desktop586-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
0c34b7bc40d76df5c6a99d11b3e787f6 mes5/i586/libafs-kernel-desktop-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
a260774ccab8a2c3f7efd820be90ca5d mes5/i586/libafs-kernel-server-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
a6fa3d2aa67889b7110ae8c5d17bc450 mes5/i586/madwifi-kernel-2.6.27.56-desktop-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
8f8b50af48c03f78994ee7efa35ae212 mes5/i586/madwifi-kernel-2.6.27.56-desktop586-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
13831ae378c4bcb64296cbbec6fff463 mes5/i586/madwifi-kernel-2.6.27.56-server-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
3f404c51664671b3e7a72850f14b01a9 mes5/i586/madwifi-kernel-desktop586-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
2835f4499861a690ad15c23e914aedbb mes5/i586/madwifi-kernel-desktop-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
395bf7cd291ca7a27b3fc9399d2dac8e mes5/i586/madwifi-kernel-server-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
802f63ff931a069dfe9708f4369eba9d mes5/i586/nvidia173-kernel-2.6.27.56-desktop-2mnb-173.14.12-4mdv2009.0.i586.rpm
629ca2fd770c4a9d43f7e9ca4e58bf6f mes5/i586/nvidia173-kernel-2.6.27.56-desktop586-2mnb-173.14.12-4mdv2009.0.i586.rpm
07dcb8bf57196dafc64766314a076dec mes5/i586/nvidia173-kernel-desktop586-latest-173.14.12-1.20110216.4mdv2009.0.i586.rpm
f272a6d64ba457361480155f25698032 mes5/i586/nvidia173-kernel-desktop-latest-173.14.12-1.20110216.4mdv2009.0.i586.rpm
b0048509e68362da030b162be9d31cac mes5/i586/nvidia71xx-kernel-2.6.27.56-desktop-2mnb-71.86.06-5mdv2009.0.i586.rpm
ce059ab58ae23a7b81616565294b1e21 mes5/i586/nvidia71xx-kernel-2.6.27.56-desktop586-2mnb-71.86.06-5mdv2009.0.i586.rpm
10779ab700911d465153f3aa8e8329d2 mes5/i586/nvidia71xx-kernel-2.6.27.56-server-2mnb-71.86.06-5mdv2009.0.i586.rpm
31f707095f0eb92e74a9cd4ea36181b4 mes5/i586/nvidia71xx-kernel-desktop586-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
fbba45072884b367c6328e11765be53b mes5/i586/nvidia71xx-kernel-desktop-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
a4321c58842a586f95d105d9776321ca mes5/i586/nvidia71xx-kernel-server-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
65348d32eded5c5e30a3e6eb5ee8568b mes5/i586/nvidia96xx-kernel-2.6.27.56-desktop-2mnb-96.43.07-5mdv2009.0.i586.rpm
84490f0a84246ef16877177d8155e6ba mes5/i586/nvidia96xx-kernel-2.6.27.56-desktop586-2mnb-96.43.07-5mdv2009.0.i586.rpm
cc1fa87cd288e7101a3533e527326f21 mes5/i586/nvidia96xx-kernel-2.6.27.56-server-2mnb-96.43.07-5mdv2009.0.i586.rpm
efbe4ac6832c3129215a39f905e3882f mes5/i586/nvidia96xx-kernel-desktop586-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
f05fee55d8dbb639a11a98a436aa0b23 mes5/i586/nvidia96xx-kernel-desktop-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
5a506931f6948b1368c837cbc0a0aa34 mes5/i586/nvidia96xx-kernel-server-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
347cd0b589220dd24e2b6723f0009d75 mes5/i586/nvidia-current-kernel-2.6.27.56-desktop-2mnb-177.70-2.3mdv2009.0.i586.rpm
216a8ff2c73743f00630245222b6d576 mes5/i586/nvidia-current-kernel-2.6.27.56-desktop586-2mnb-177.70-2.3mdv2009.0.i586.rpm
f2c2c9d52771bdb1306e80c21d3bfdc7 mes5/i586/nvidia-current-kernel-2.6.27.56-server-2mnb-177.70-2.3mdv2009.0.i586.rpm
752d2ca298db4b88edc9484a048bffba mes5/i586/nvidia-current-kernel-desktop586-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
881b4a3160d2181476724291df394ede mes5/i586/nvidia-current-kernel-desktop-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
4217b6d471e08ecabefa4abcd07b13eb mes5/i586/nvidia-current-kernel-server-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
70668fe70ad415f1928492af492448e6 mes5/i586/vpnclient-kernel-2.6.27.56-desktop-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
f183f45adcc9814c1a0c4de96c88d1aa mes5/i586/vpnclient-kernel-2.6.27.56-desktop586-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
3e7a51a3365d9f7d2cf81f49d3702703 mes5/i586/vpnclient-kernel-2.6.27.56-server-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
bc05d233333e5e6f5ee13f44152ce761 mes5/i586/vpnclient-kernel-desktop586-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm
4dd4f299a208a8aacaa595f265a67d97 mes5/i586/vpnclient-kernel-desktop-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm
2976845e4e19df1265a9301a8a61a987 mes5/i586/vpnclient-kernel-server-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm
a3defefb7cd881e1c1f1cb7effbbe821 mes5/SRPMS/kernel-2.6.27.56-2mnb2.src.rpm

Mandriva Enterprise Server 5/X86_64:
d3fe6c3d8d2bb1412c2667359a0edf03 mes5/x86_64/iscsitarget-kernel-2.6.27.56-desktop-2mnb-0.4.16-4.1mdvmes5.1.x86_64.rpm
9210101a3c5fe2acefb1164bd6ec4fe9 mes5/x86_64/iscsitarget-kernel-2.6.27.56-server-2mnb-0.4.16-4.1mdvmes5.1.x86_64.rpm
71634b92d548a17e2510d31f22cf41c3 mes5/x86_64/iscsitarget-kernel-desktop-latest-0.4.16-1.20110217.4.1mdvmes5.1.x86_64.rpm
331c70875670ae314263480bf0b43cb8 mes5/x86_64/iscsitarget-kernel-server-latest-0.4.16-1.20110217.4.1mdvmes5.1.x86_64.rpm
6f83035970b3f4a2d4af31270782aa46 mes5/x86_64/kernel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
51b720b121409efbee1ccb74dbc863dd mes5/x86_64/kernel-desktop-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
5b430384c3214153209b46ed4d3adca4 mes5/x86_64/kernel-desktop-devel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
a8f74928d097de5da822e5d2ad2c0569 mes5/x86_64/kernel-desktop-devel-latest-2.6.27.56-2mnb2.x86_64.rpm
cffbd65d58376ff719f9a3e9c0bb84ef mes5/x86_64/kernel-desktop-latest-2.6.27.56-2mnb2.x86_64.rpm
014b61f1efe483cd5b67939ced2ebddd mes5/x86_64/kernel-doc-2.6.27.56-2mnb2.x86_64.rpm
efd3a82c1afaafbd49306a092dc887f2 mes5/x86_64/kernel-server-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
a0c214e6e7f06b7d3012fb2e3a28e322 mes5/x86_64/kernel-server-devel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
f7a128fa091ab280940a242ad4b63221 mes5/x86_64/kernel-server-devel-latest-2.6.27.56-2mnb2.x86_64.rpm
7716733dab8fd837efcf0f5e5809ee21 mes5/x86_64/kernel-server-latest-2.6.27.56-2mnb2.x86_64.rpm
46a1d3760a87c5b8196f7c384295e986 mes5/x86_64/kernel-source-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
9da3abcad5166a813570d662d62cad90 mes5/x86_64/kernel-source-latest-2.6.27.56-2mnb2.x86_64.rpm
4d820d15a8ff1851f4c5a216f75b4402 mes5/x86_64/kqemu-kernel-2.6.27.56-desktop-2mnb-1.4.0pre1-0.x86_64.rpm
c2986edb44def3a9ab3e1eceed17e172 mes5/x86_64/kqemu-kernel-2.6.27.56-server-2mnb-1.4.0pre1-0.x86_64.rpm
fe87743af9b9acc1d356dcc27ff2a17e mes5/x86_64/kqemu-kernel-desktop-latest-1.4.0pre1-1.20110217.0.x86_64.rpm
58b432b88122095a7b25a798ae4238be mes5/x86_64/kqemu-kernel-server-latest-1.4.0pre1-1.20110217.0.x86_64.rpm
e0f33f22957824003950168b6296b077 mes5/x86_64/libafs-kernel-2.6.27.56-desktop-2mnb-1.4.7-5.1mdv2009.0.x86_64.rpm
c201f8d7ddc904ad57673d64e1340a6d mes5/x86_64/libafs-kernel-2.6.27.56-server-2mnb-1.4.7-5.1mdv2009.0.x86_64.rpm
8bc2d5ea3063209e63bb94306e8eebe4 mes5/x86_64/libafs-kernel-desktop-latest-1.4.7-1.20110217.5.1mdv2009.0.x86_64.rpm
e47558aace1e43853da202e1ba2b80e8 mes5/x86_64/libafs-kernel-server-latest-1.4.7-1.20110217.5.1mdv2009.0.x86_64.rpm
0728e365d83b1d9088effd5dd4f07cd1 mes5/x86_64/madwifi-kernel-2.6.27.56-desktop-2mnb-0.9.4-3.r3835mdv2009.0.x86_64.rpm
316c42e818066be99ac240747cd1548a mes5/x86_64/madwifi-kernel-2.6.27.56-server-2mnb-0.9.4-3.r3835mdv2009.0.x86_64.rpm
e14ddddbb6bc49167ca90b6f3abb6738 mes5/x86_64/madwifi-kernel-desktop-latest-0.9.4-1.20110217.3.r3835mdv2009.0.x86_64.rpm
e0f52fef6c65cb4a2ce64fff312629e1 mes5/x86_64/madwifi-kernel-server-latest-0.9.4-1.20110217.3.r3835mdv2009.0.x86_64.rpm
cb9374aea397f81efb4bef546f508755 mes5/x86_64/nvidia173-kernel-2.6.27.56-desktop-2mnb-173.14.12-4mdv2009.0.x86_64.rpm
1cc65102b999c34d4187051a7ab492f4 mes5/x86_64/nvidia173-kernel-2.6.27.56-server-2mnb-173.14.12-4mdv2009.0.x86_64.rpm
3e58f7d90f654393fd567444cee03369 mes5/x86_64/nvidia173-kernel-desktop-latest-173.14.12-1.20110217.4mdv2009.0.x86_64.rpm
e0f670662095b6b58a496b4c964f8eb2 mes5/x86_64/nvidia173-kernel-server-latest-173.14.12-1.20110217.4mdv2009.0.x86_64.rpm
08395094ec9d572af5913f544634624e mes5/x86_64/nvidia71xx-kernel-2.6.27.56-desktop-2mnb-71.86.06-5mdv2009.0.x86_64.rpm
4434e0cc8ed4c747345c8357b956a535 mes5/x86_64/nvidia71xx-kernel-2.6.27.56-server-2mnb-71.86.06-5mdv2009.0.x86_64.rpm
3c2fea46053d442cfd8db07a4fe92e99 mes5/x86_64/nvidia71xx-kernel-desktop-latest-71.86.06-1.20110217.5mdv2009.0.x86_64.rpm
a5a315c117a8c84a09aa69f6e990e4f4 mes5/x86_64/nvidia71xx-kernel-server-latest-71.86.06-1.20110217.5mdv2009.0.x86_64.rpm
3dafc431b60beb32418a062ceb9bb4e2 mes5/x86_64/nvidia96xx-kernel-2.6.27.56-desktop-2mnb-96.43.07-5mdv2009.0.x86_64.rpm
4b20671069d711a274d1d0948b766fcd mes5/x86_64/nvidia96xx-kernel-2.6.27.56-server-2mnb-96.43.07-5mdv2009.0.x86_64.rpm
8a484a45e986709daf2128f83394a19d mes5/x86_64/nvidia96xx-kernel-desktop-latest-96.43.07-1.20110217.5mdv2009.0.x86_64.rpm
57d68d64cfcea66c660457d9247df1d3 mes5/x86_64/nvidia96xx-kernel-server-latest-96.43.07-1.20110217.5mdv2009.0.x86_64.rpm
cb86ee77b7683c1f46a0b390fe7834e6 mes5/x86_64/nvidia-current-kernel-2.6.27.56-desktop-2mnb-177.70-2.3mdv2009.0.x86_64.rpm
60dc82052cf57a231b4ce15f10434cd1 mes5/x86_64/nvidia-current-kernel-2.6.27.56-server-2mnb-177.70-2.3mdv2009.0.x86_64.rpm
1ced8cf75b42dd1850a402a0d7cc2627 mes5/x86_64/nvidia-current-kernel-desktop-latest-177.70-1.20110217.2.3mdv2009.0.x86_64.rpm
c9dd11cd682e1ca0396e9b297e4b3598 mes5/x86_64/nvidia-current-kernel-server-latest-177.70-1.20110217.2.3mdv2009.0.x86_64.rpm
25f24832a62f7b9a99e5fd70fb70afa9 mes5/x86_64/vpnclient-kernel-2.6.27.56-desktop-2mnb-4.8.01.0640-3mdv2009.0.x86_64.rpm
4b7efd43a34d1e816cea69b6b43c0686 mes5/x86_64/vpnclient-kernel-2.6.27.56-server-2mnb-4.8.01.0640-3mdv2009.0.x86_64.rpm
0fb2705351a7a8b5fb2ca6bc285d519f mes5/x86_64/vpnclient-kernel-desktop-latest-4.8.01.0640-1.20110217.3mdv2009.0.x86_64.rpm
6a8d3a4242319446040fcb011f81b23a mes5/x86_64/vpnclient-kernel-server-latest-4.8.01.0640-1.20110217.3mdv2009.0.x86_64.rpm
a3defefb7cd881e1c1f1cb7effbbe821 mes5/SRPMS/kernel-2.6.27.56-2mnb2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNXXyKmqjQ0CJFipgRAggNAJ98qyQbJ0M46X3GnMY+nVt/7E8aigCgzknq
BUXFLWk38hbAGct/K7lvdOE=
=g9HX
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close