-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2011:029 http://www.mandriva.com/security/ _______________________________________________________________________ Package : kernel Date : February 17, 2011 Affected: Enterprise Server 5.0 _______________________________________________________________________ Problem Description: A vulnerability was discovered and corrected in the Linux 2.6 kernel: The X.25 implementation does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed data, a different vulnerability than CVE-2010-4164. (CVE-2010-3873) The bcm_connect function Broadcast Manager in the Controller Area Network (CAN) implementation in the Linux creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename. (CVE-2010-4565) The install_special_mapping function in mm/mmap.c does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application. (CVE-2010-4346) The sk_run_filter function does not check whether a certain memory location has been initialized before executing a BPF_S_LD_MEM or BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter. (CVE-2010-4158) Heap-based buffer overflow in the bcm_connect function the Broadcast Manager in the Controller Area Network (CAN)on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation. (CVE-2010-3874) The blk_rq_map_user_iov function in block/blk-map.c allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device. (CVE-2010-4163) Multiple integer underflows in the x25_parse_facilities function in allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data. (CVE-2010-4164) Race condition in the do_setlk function allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case. (CVE-2009-4307) Multiple integer overflows in fs/bio.c allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device. (CVE-2010-4162) Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c allows local users to cause a denial of service (BUG and system crash) via a write operation on the last block of a large file, followed by a sync operation. (CVE-2010-3015) The do_exit function in kernel/exit.c does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call. (CVE-2010-4258) The ax25_getname function in net/ax25/af_ax25.c does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure. (CVE-2010-3875) Integer overflow in the do_io_submit function in fs/aio.c allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call. (CVE-2010-3067) Race condition in the __exit_signal function in kernel/exit.c allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c. (CVE-2010-4248) Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call. (CVE-2010-3437) The get_name function in net/tipc/socket.c does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure. (CVE-2010-3877) Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size. (CVE-2009-2406) Multiple integer signedness errors in the TIPC implementation allow local users to gain privileges via a crafted sendmsg call that triggers a heap-based buffer overflow, related to the tipc_msg_build function in net/tipc/msg.c and the verify_iovec function in net/core/iovec.c. (CVE-2010-3859) The ipc subsystem does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c. (CVE-2010-4073) The copy_shmid_to_user function does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the old shm interface. (CVE-2010-4072) The sctp_auth_asoc_get_hmac function in net/sctp/auth.c does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array. (CVE-2010-3705) The do_tcp_setsockopt function in net/ipv4/tcp.c does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer. (CVE-2010-4165) Multiple integer signedness errors in net/rose/af_rose.c allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions. (CVE-2010-3310) The KVM implementation does not properly reload the FS and GS segment registers, which allows host OS users to cause a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified Local Descriptor Table (LDT). (CVE-2010-3698) This update disable the iommu hardware in order to avoid crash with some DELL servers (R510, R710,...) To update your kernel, please follow the directions located at: http://www.mandriva.com/en/security/kernelupdate _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4346 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3015 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4248 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3698 https://qa.mandriva.com/62522 _______________________________________________________________________ Updated Packages: Mandriva Enterprise Server 5: a3455fb1479b38f9923f84eaecfe66d7 mes5/i586/drm-experimental-kernel-2.6.27.56-desktop-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm dd333ca803c2533fb5c09cf4d186debd mes5/i586/drm-experimental-kernel-2.6.27.56-desktop586-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm 5df5c97b2c664286e6501a76064aa9a2 mes5/i586/drm-experimental-kernel-2.6.27.56-server-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm 3913aa3eb13e887831d86f4a0cfa88aa mes5/i586/drm-experimental-kernel-desktop586-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm c51a01dee1105cb6f0a30bfe1acaa2b6 mes5/i586/drm-experimental-kernel-desktop-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm fcc25ef3d30966eff0273c03858ce0f2 mes5/i586/drm-experimental-kernel-server-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm e3f4a601b0669e9637a4295c0f5b5623 mes5/i586/fglrx-kernel-2.6.27.56-desktop-2mnb-8.522-3mdv2009.0.i586.rpm 6097c3c9050fac6e8af7d9d17b567024 mes5/i586/fglrx-kernel-2.6.27.56-desktop586-2mnb-8.522-3mdv2009.0.i586.rpm b2e6ea2d5677b7dfeb1cf89bb15a1b40 mes5/i586/fglrx-kernel-2.6.27.56-server-2mnb-8.522-3mdv2009.0.i586.rpm e94306e6ab9d1d1da456c086604a93c6 mes5/i586/fglrx-kernel-desktop586-latest-8.522-1.20110216.3mdv2009.0.i586.rpm e2720f1cb9e3ed93829bd0d5d523e412 mes5/i586/fglrx-kernel-desktop-latest-8.522-1.20110216.3mdv2009.0.i586.rpm 3233fa77b8b8f3f980225864e523692c mes5/i586/fglrx-kernel-server-latest-8.522-1.20110216.3mdv2009.0.i586.rpm 01fc685fa34ce857d1c276cb0094a78c mes5/i586/iscsitarget-kernel-2.6.27.56-desktop-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm dde17d568af82d4d0fcabc52b9393c95 mes5/i586/iscsitarget-kernel-2.6.27.56-desktop586-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm ca1f7ce08ec87a0c06a72a30882e9e3a mes5/i586/iscsitarget-kernel-2.6.27.56-server-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm e3c2368a0b0ed533bcfb12a444851384 mes5/i586/iscsitarget-kernel-desktop586-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm be33f035a2fdcca45322b9117328ef33 mes5/i586/iscsitarget-kernel-desktop-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm bb1c83a43c7a975ce91b01bc7c674bf7 mes5/i586/iscsitarget-kernel-server-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm d5d842b38061e1532d1f340c637b91e9 mes5/i586/kernel-2.6.27.56-2mnb-1-1mnb2.i586.rpm 0989e9bb357692a284391306a715a76e mes5/i586/kernel-desktop-2.6.27.56-2mnb-1-1mnb2.i586.rpm ccf4d9c1a3d5e1d9626b6ce893f72200 mes5/i586/kernel-desktop586-2.6.27.56-2mnb-1-1mnb2.i586.rpm ed99ebe5b806ac4e8f4ea23a65b61832 mes5/i586/kernel-desktop586-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm 619bd6031126ee028787be855580a470 mes5/i586/kernel-desktop586-devel-latest-2.6.27.56-2mnb2.i586.rpm 3b0864031b1ff1b9e574208d971b984b mes5/i586/kernel-desktop586-latest-2.6.27.56-2mnb2.i586.rpm c66aea10f5f8bc84fc095388392006db mes5/i586/kernel-desktop-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm 13fe690840e0026b35ba781a1eb18ce1 mes5/i586/kernel-desktop-devel-latest-2.6.27.56-2mnb2.i586.rpm 3323e1d08cec08036205842560ab7179 mes5/i586/kernel-desktop-latest-2.6.27.56-2mnb2.i586.rpm 6de830a855c1d92bde173c56a859a080 mes5/i586/kernel-doc-2.6.27.56-2mnb2.i586.rpm f6661b094c7ce232280d94a4d4c3fd30 mes5/i586/kernel-server-2.6.27.56-2mnb-1-1mnb2.i586.rpm b5c5d854b344ef630b964ec57c75a5fb mes5/i586/kernel-server-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm af57e82b86a7af33c0b63df17b0e07a5 mes5/i586/kernel-server-devel-latest-2.6.27.56-2mnb2.i586.rpm 38cd88b4dfd68872ef6a24a7909bf8d7 mes5/i586/kernel-server-latest-2.6.27.56-2mnb2.i586.rpm 6dfa8e791336c906cef8e65c225ae120 mes5/i586/kernel-source-2.6.27.56-2mnb-1-1mnb2.i586.rpm 03bd0ce5f3354f4923dbee5c9838e4ca mes5/i586/kernel-source-latest-2.6.27.56-2mnb2.i586.rpm 5843a25ec60d13cbd90b1eb0520b7e0e mes5/i586/kqemu-kernel-2.6.27.56-desktop-2mnb-1.4.0pre1-0.i586.rpm e93c44266df87ef2ca975240b64e94a5 mes5/i586/kqemu-kernel-2.6.27.56-desktop586-2mnb-1.4.0pre1-0.i586.rpm 073240e168447c95bf0848ef39c201e7 mes5/i586/kqemu-kernel-2.6.27.56-server-2mnb-1.4.0pre1-0.i586.rpm 95809d47bd1327d6888ed8b98e4c2b7a mes5/i586/kqemu-kernel-desktop586-latest-1.4.0pre1-1.20110216.0.i586.rpm babe60e138b903b4e3675a32f42b204e mes5/i586/kqemu-kernel-desktop-latest-1.4.0pre1-1.20110216.0.i586.rpm 366210833c482dc2413a8a8a2d138390 mes5/i586/kqemu-kernel-server-latest-1.4.0pre1-1.20110216.0.i586.rpm 70d601acad9ee4d726b1358bf145ecec mes5/i586/libafs-kernel-2.6.27.56-desktop-2mnb-1.4.7-5.2mdv2009.0.i586.rpm d770b0e0a27a1c4c90409d1f8cfdbe42 mes5/i586/libafs-kernel-2.6.27.56-desktop586-2mnb-1.4.7-5.2mdv2009.0.i586.rpm 181aecd13b56cd3a2aa3136782c9e617 mes5/i586/libafs-kernel-2.6.27.56-server-2mnb-1.4.7-5.2mdv2009.0.i586.rpm 080c989ed2f875c64035210cbb92d4fd mes5/i586/libafs-kernel-desktop586-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm 0c34b7bc40d76df5c6a99d11b3e787f6 mes5/i586/libafs-kernel-desktop-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm a260774ccab8a2c3f7efd820be90ca5d mes5/i586/libafs-kernel-server-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm a6fa3d2aa67889b7110ae8c5d17bc450 mes5/i586/madwifi-kernel-2.6.27.56-desktop-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm 8f8b50af48c03f78994ee7efa35ae212 mes5/i586/madwifi-kernel-2.6.27.56-desktop586-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm 13831ae378c4bcb64296cbbec6fff463 mes5/i586/madwifi-kernel-2.6.27.56-server-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm 3f404c51664671b3e7a72850f14b01a9 mes5/i586/madwifi-kernel-desktop586-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm 2835f4499861a690ad15c23e914aedbb mes5/i586/madwifi-kernel-desktop-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm 395bf7cd291ca7a27b3fc9399d2dac8e mes5/i586/madwifi-kernel-server-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm 802f63ff931a069dfe9708f4369eba9d mes5/i586/nvidia173-kernel-2.6.27.56-desktop-2mnb-173.14.12-4mdv2009.0.i586.rpm 629ca2fd770c4a9d43f7e9ca4e58bf6f mes5/i586/nvidia173-kernel-2.6.27.56-desktop586-2mnb-173.14.12-4mdv2009.0.i586.rpm 07dcb8bf57196dafc64766314a076dec mes5/i586/nvidia173-kernel-desktop586-latest-173.14.12-1.20110216.4mdv2009.0.i586.rpm f272a6d64ba457361480155f25698032 mes5/i586/nvidia173-kernel-desktop-latest-173.14.12-1.20110216.4mdv2009.0.i586.rpm b0048509e68362da030b162be9d31cac mes5/i586/nvidia71xx-kernel-2.6.27.56-desktop-2mnb-71.86.06-5mdv2009.0.i586.rpm ce059ab58ae23a7b81616565294b1e21 mes5/i586/nvidia71xx-kernel-2.6.27.56-desktop586-2mnb-71.86.06-5mdv2009.0.i586.rpm 10779ab700911d465153f3aa8e8329d2 mes5/i586/nvidia71xx-kernel-2.6.27.56-server-2mnb-71.86.06-5mdv2009.0.i586.rpm 31f707095f0eb92e74a9cd4ea36181b4 mes5/i586/nvidia71xx-kernel-desktop586-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm fbba45072884b367c6328e11765be53b mes5/i586/nvidia71xx-kernel-desktop-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm a4321c58842a586f95d105d9776321ca mes5/i586/nvidia71xx-kernel-server-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm 65348d32eded5c5e30a3e6eb5ee8568b mes5/i586/nvidia96xx-kernel-2.6.27.56-desktop-2mnb-96.43.07-5mdv2009.0.i586.rpm 84490f0a84246ef16877177d8155e6ba mes5/i586/nvidia96xx-kernel-2.6.27.56-desktop586-2mnb-96.43.07-5mdv2009.0.i586.rpm cc1fa87cd288e7101a3533e527326f21 mes5/i586/nvidia96xx-kernel-2.6.27.56-server-2mnb-96.43.07-5mdv2009.0.i586.rpm efbe4ac6832c3129215a39f905e3882f mes5/i586/nvidia96xx-kernel-desktop586-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm f05fee55d8dbb639a11a98a436aa0b23 mes5/i586/nvidia96xx-kernel-desktop-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm 5a506931f6948b1368c837cbc0a0aa34 mes5/i586/nvidia96xx-kernel-server-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm 347cd0b589220dd24e2b6723f0009d75 mes5/i586/nvidia-current-kernel-2.6.27.56-desktop-2mnb-177.70-2.3mdv2009.0.i586.rpm 216a8ff2c73743f00630245222b6d576 mes5/i586/nvidia-current-kernel-2.6.27.56-desktop586-2mnb-177.70-2.3mdv2009.0.i586.rpm f2c2c9d52771bdb1306e80c21d3bfdc7 mes5/i586/nvidia-current-kernel-2.6.27.56-server-2mnb-177.70-2.3mdv2009.0.i586.rpm 752d2ca298db4b88edc9484a048bffba mes5/i586/nvidia-current-kernel-desktop586-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm 881b4a3160d2181476724291df394ede mes5/i586/nvidia-current-kernel-desktop-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm 4217b6d471e08ecabefa4abcd07b13eb mes5/i586/nvidia-current-kernel-server-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm 70668fe70ad415f1928492af492448e6 mes5/i586/vpnclient-kernel-2.6.27.56-desktop-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm f183f45adcc9814c1a0c4de96c88d1aa mes5/i586/vpnclient-kernel-2.6.27.56-desktop586-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm 3e7a51a3365d9f7d2cf81f49d3702703 mes5/i586/vpnclient-kernel-2.6.27.56-server-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm bc05d233333e5e6f5ee13f44152ce761 mes5/i586/vpnclient-kernel-desktop586-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm 4dd4f299a208a8aacaa595f265a67d97 mes5/i586/vpnclient-kernel-desktop-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm 2976845e4e19df1265a9301a8a61a987 mes5/i586/vpnclient-kernel-server-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm a3defefb7cd881e1c1f1cb7effbbe821 mes5/SRPMS/kernel-2.6.27.56-2mnb2.src.rpm Mandriva Enterprise Server 5/X86_64: d3fe6c3d8d2bb1412c2667359a0edf03 mes5/x86_64/iscsitarget-kernel-2.6.27.56-desktop-2mnb-0.4.16-4.1mdvmes5.1.x86_64.rpm 9210101a3c5fe2acefb1164bd6ec4fe9 mes5/x86_64/iscsitarget-kernel-2.6.27.56-server-2mnb-0.4.16-4.1mdvmes5.1.x86_64.rpm 71634b92d548a17e2510d31f22cf41c3 mes5/x86_64/iscsitarget-kernel-desktop-latest-0.4.16-1.20110217.4.1mdvmes5.1.x86_64.rpm 331c70875670ae314263480bf0b43cb8 mes5/x86_64/iscsitarget-kernel-server-latest-0.4.16-1.20110217.4.1mdvmes5.1.x86_64.rpm 6f83035970b3f4a2d4af31270782aa46 mes5/x86_64/kernel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm 51b720b121409efbee1ccb74dbc863dd mes5/x86_64/kernel-desktop-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm 5b430384c3214153209b46ed4d3adca4 mes5/x86_64/kernel-desktop-devel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm a8f74928d097de5da822e5d2ad2c0569 mes5/x86_64/kernel-desktop-devel-latest-2.6.27.56-2mnb2.x86_64.rpm cffbd65d58376ff719f9a3e9c0bb84ef mes5/x86_64/kernel-desktop-latest-2.6.27.56-2mnb2.x86_64.rpm 014b61f1efe483cd5b67939ced2ebddd mes5/x86_64/kernel-doc-2.6.27.56-2mnb2.x86_64.rpm efd3a82c1afaafbd49306a092dc887f2 mes5/x86_64/kernel-server-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm a0c214e6e7f06b7d3012fb2e3a28e322 mes5/x86_64/kernel-server-devel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm f7a128fa091ab280940a242ad4b63221 mes5/x86_64/kernel-server-devel-latest-2.6.27.56-2mnb2.x86_64.rpm 7716733dab8fd837efcf0f5e5809ee21 mes5/x86_64/kernel-server-latest-2.6.27.56-2mnb2.x86_64.rpm 46a1d3760a87c5b8196f7c384295e986 mes5/x86_64/kernel-source-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm 9da3abcad5166a813570d662d62cad90 mes5/x86_64/kernel-source-latest-2.6.27.56-2mnb2.x86_64.rpm 4d820d15a8ff1851f4c5a216f75b4402 mes5/x86_64/kqemu-kernel-2.6.27.56-desktop-2mnb-1.4.0pre1-0.x86_64.rpm c2986edb44def3a9ab3e1eceed17e172 mes5/x86_64/kqemu-kernel-2.6.27.56-server-2mnb-1.4.0pre1-0.x86_64.rpm fe87743af9b9acc1d356dcc27ff2a17e mes5/x86_64/kqemu-kernel-desktop-latest-1.4.0pre1-1.20110217.0.x86_64.rpm 58b432b88122095a7b25a798ae4238be mes5/x86_64/kqemu-kernel-server-latest-1.4.0pre1-1.20110217.0.x86_64.rpm e0f33f22957824003950168b6296b077 mes5/x86_64/libafs-kernel-2.6.27.56-desktop-2mnb-1.4.7-5.1mdv2009.0.x86_64.rpm c201f8d7ddc904ad57673d64e1340a6d mes5/x86_64/libafs-kernel-2.6.27.56-server-2mnb-1.4.7-5.1mdv2009.0.x86_64.rpm 8bc2d5ea3063209e63bb94306e8eebe4 mes5/x86_64/libafs-kernel-desktop-latest-1.4.7-1.20110217.5.1mdv2009.0.x86_64.rpm e47558aace1e43853da202e1ba2b80e8 mes5/x86_64/libafs-kernel-server-latest-1.4.7-1.20110217.5.1mdv2009.0.x86_64.rpm 0728e365d83b1d9088effd5dd4f07cd1 mes5/x86_64/madwifi-kernel-2.6.27.56-desktop-2mnb-0.9.4-3.r3835mdv2009.0.x86_64.rpm 316c42e818066be99ac240747cd1548a mes5/x86_64/madwifi-kernel-2.6.27.56-server-2mnb-0.9.4-3.r3835mdv2009.0.x86_64.rpm e14ddddbb6bc49167ca90b6f3abb6738 mes5/x86_64/madwifi-kernel-desktop-latest-0.9.4-1.20110217.3.r3835mdv2009.0.x86_64.rpm e0f52fef6c65cb4a2ce64fff312629e1 mes5/x86_64/madwifi-kernel-server-latest-0.9.4-1.20110217.3.r3835mdv2009.0.x86_64.rpm cb9374aea397f81efb4bef546f508755 mes5/x86_64/nvidia173-kernel-2.6.27.56-desktop-2mnb-173.14.12-4mdv2009.0.x86_64.rpm 1cc65102b999c34d4187051a7ab492f4 mes5/x86_64/nvidia173-kernel-2.6.27.56-server-2mnb-173.14.12-4mdv2009.0.x86_64.rpm 3e58f7d90f654393fd567444cee03369 mes5/x86_64/nvidia173-kernel-desktop-latest-173.14.12-1.20110217.4mdv2009.0.x86_64.rpm e0f670662095b6b58a496b4c964f8eb2 mes5/x86_64/nvidia173-kernel-server-latest-173.14.12-1.20110217.4mdv2009.0.x86_64.rpm 08395094ec9d572af5913f544634624e mes5/x86_64/nvidia71xx-kernel-2.6.27.56-desktop-2mnb-71.86.06-5mdv2009.0.x86_64.rpm 4434e0cc8ed4c747345c8357b956a535 mes5/x86_64/nvidia71xx-kernel-2.6.27.56-server-2mnb-71.86.06-5mdv2009.0.x86_64.rpm 3c2fea46053d442cfd8db07a4fe92e99 mes5/x86_64/nvidia71xx-kernel-desktop-latest-71.86.06-1.20110217.5mdv2009.0.x86_64.rpm a5a315c117a8c84a09aa69f6e990e4f4 mes5/x86_64/nvidia71xx-kernel-server-latest-71.86.06-1.20110217.5mdv2009.0.x86_64.rpm 3dafc431b60beb32418a062ceb9bb4e2 mes5/x86_64/nvidia96xx-kernel-2.6.27.56-desktop-2mnb-96.43.07-5mdv2009.0.x86_64.rpm 4b20671069d711a274d1d0948b766fcd mes5/x86_64/nvidia96xx-kernel-2.6.27.56-server-2mnb-96.43.07-5mdv2009.0.x86_64.rpm 8a484a45e986709daf2128f83394a19d mes5/x86_64/nvidia96xx-kernel-desktop-latest-96.43.07-1.20110217.5mdv2009.0.x86_64.rpm 57d68d64cfcea66c660457d9247df1d3 mes5/x86_64/nvidia96xx-kernel-server-latest-96.43.07-1.20110217.5mdv2009.0.x86_64.rpm cb86ee77b7683c1f46a0b390fe7834e6 mes5/x86_64/nvidia-current-kernel-2.6.27.56-desktop-2mnb-177.70-2.3mdv2009.0.x86_64.rpm 60dc82052cf57a231b4ce15f10434cd1 mes5/x86_64/nvidia-current-kernel-2.6.27.56-server-2mnb-177.70-2.3mdv2009.0.x86_64.rpm 1ced8cf75b42dd1850a402a0d7cc2627 mes5/x86_64/nvidia-current-kernel-desktop-latest-177.70-1.20110217.2.3mdv2009.0.x86_64.rpm c9dd11cd682e1ca0396e9b297e4b3598 mes5/x86_64/nvidia-current-kernel-server-latest-177.70-1.20110217.2.3mdv2009.0.x86_64.rpm 25f24832a62f7b9a99e5fd70fb70afa9 mes5/x86_64/vpnclient-kernel-2.6.27.56-desktop-2mnb-4.8.01.0640-3mdv2009.0.x86_64.rpm 4b7efd43a34d1e816cea69b6b43c0686 mes5/x86_64/vpnclient-kernel-2.6.27.56-server-2mnb-4.8.01.0640-3mdv2009.0.x86_64.rpm 0fb2705351a7a8b5fb2ca6bc285d519f mes5/x86_64/vpnclient-kernel-desktop-latest-4.8.01.0640-1.20110217.3mdv2009.0.x86_64.rpm 6a8d3a4242319446040fcb011f81b23a mes5/x86_64/vpnclient-kernel-server-latest-4.8.01.0640-1.20110217.3mdv2009.0.x86_64.rpm a3defefb7cd881e1c1f1cb7effbbe821 mes5/SRPMS/kernel-2.6.27.56-2mnb2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFNXXyKmqjQ0CJFipgRAggNAJ98qyQbJ0M46X3GnMY+nVt/7E8aigCgzknq BUXFLWk38hbAGct/K7lvdOE= =g9HX -----END PGP SIGNATURE-----