Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: <security <at> mandriva.com>
Subject: [ MDVSA-2011:029 ] kernel
Newsgroups: gmane.linux.mandrake.security.announce
Date: Thursday 17th February 2011 22:48:01 UTC (over 5 years ago)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2011:029
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : kernel
 Date    : February 17, 2011
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability was discovered and corrected in the Linux 2.6 kernel:
 The X.25 implementation does not properly parse facilities, which
 allows remote attackers to cause a denial of service (heap memory
 corruption and panic) or possibly have
 unspecified other impact via malformed data, a different vulnerability
 than CVE-2010-4164. (CVE-2010-3873)
 
 The bcm_connect function Broadcast Manager in the Controller Area
 Network (CAN) implementation in the Linux creates a publicly accessible
 file with a filename containing a kernel memory address, which allows
 local users to obtain potentially sensitive information about kernel
 memory use by listing this filename. (CVE-2010-4565)
 
 The install_special_mapping function in mm/mmap.c does not make an
 expected security_file_mmap function call, which allows local users
 to bypass intended mmap_min_addr restrictions and possibly conduct
 NULL pointer dereference attacks via a crafted assembly-language
 application. (CVE-2010-4346)
 
 The sk_run_filter function does not check whether a certain memory
 location has been initialized before executing a BPF_S_LD_MEM
 or BPF_S_LDX_MEM instruction, which allows local users to obtain
 potentially sensitive information from kernel stack memory via a
 crafted socket filter. (CVE-2010-4158)
 
 Heap-based buffer overflow in the bcm_connect function the Broadcast
 Manager in the Controller Area Network (CAN)on 64-bit platforms might
 allow local users to cause a denial of service (memory corruption)
 via a connect operation. (CVE-2010-3874)
 
 The blk_rq_map_user_iov function in block/blk-map.c allows local
 users to cause a denial of service (panic) via a zero-length I/O
 request in a device ioctl to a SCSI device. (CVE-2010-4163)
 
 Multiple integer underflows in the x25_parse_facilities function in
 allow remote attackers to cause a denial of service (system crash)
 via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3)
 X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data. (CVE-2010-4164)
 
 Race condition in the do_setlk function allows local users to cause a
 denial of service (crash) via vectors resulting in an interrupted RPC
 call that leads to a stray FL_POSIX lock, related to improper handling
 of a race between fcntl and close in the EINTR case. (CVE-2009-4307)
 
 Multiple integer overflows in fs/bio.c allow local users to cause
 a denial of service (system crash) via a crafted device ioctl to a
 SCSI device. (CVE-2010-4162)
 
 Integer overflow in the ext4_ext_get_blocks function in
 fs/ext4/extents.c allows local users to cause a denial of service
 (BUG and system crash) via a write operation on the last block of a
 large file, followed by a sync operation. (CVE-2010-3015)
 
 The do_exit function in kernel/exit.c does not properly handle a
 KERNEL_DS get_fs value, which allows local users to bypass intended
 access_ok restrictions, overwrite arbitrary kernel memory locations,
 and gain privileges by leveraging a (1) BUG, (2) NULL pointer
 dereference, or (3) page fault, as demonstrated by vectors involving
 the clear_child_tid feature and the splice system call. (CVE-2010-4258)
 
 The ax25_getname function in net/ax25/af_ax25.c does not initialize
 a certain structure, which allows local users to obtain potentially
 sensitive information from kernel stack memory by reading a copy of
 this structure. (CVE-2010-3875)
 
 Integer overflow in the do_io_submit function in fs/aio.c allows local
 users to cause a denial of service or possibly have unspecified other
 impact via crafted use of the io_submit system call. (CVE-2010-3067)
 
 Race condition in the __exit_signal function in kernel/exit.c
 allows local users to cause a denial of service via vectors
 related to multithreaded exec, the use of a thread group leader in
 kernel/posix-cpu-timers.c, and the selection of a new thread group
 leader in the de_thread function in fs/exec.c. (CVE-2010-4248)
 
 Integer signedness error in the pkt_find_dev_from_minor function
 in drivers/block/pktcdvd.c allows local users to obtain sensitive
 information from kernel memory or cause a denial of service (invalid
 pointer dereference and system crash) via a crafted index value in
 a PKT_CTRL_CMD_STATUS ioctl call. (CVE-2010-3437)
 
 The get_name function in net/tipc/socket.c does not initialize a
 certain structure, which allows local users to obtain potentially
 sensitive information from kernel stack memory by reading a copy of
 this structure. (CVE-2010-3877)
 
 Stack-based buffer overflow in the parse_tag_11_packet function
 in fs/ecryptfs/keystore.c in the eCryptfs subsystem allows local
 users to cause a denial of service (system crash) or possibly gain
 privileges via vectors involving a crafted eCryptfs file, related
 to not ensuring that the key signature length in a Tag 11 packet is
 compatible with the key signature buffer size. (CVE-2009-2406)
 
 Multiple integer signedness errors in the TIPC implementation allow
 local users to gain privileges via a crafted sendmsg call that
 triggers a heap-based buffer overflow, related to the tipc_msg_build
 function in net/tipc/msg.c and the verify_iovec function in
 net/core/iovec.c. (CVE-2010-3859)
 
 The ipc subsystem does not initialize certain structures, which allows
 local users to obtain potentially sensitive information from kernel
 stack memory via vectors related to the (1) compat_sys_semctl, (2)
 compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c;
 and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr
 functions in ipc/compat_mq.c. (CVE-2010-4073)
 
 The copy_shmid_to_user function does not initialize a certain
 structure, which allows local users to obtain potentially sensitive
 information from kernel stack memory via vectors related to the shmctl
 system call and the old shm interface. (CVE-2010-4072)
 
 The sctp_auth_asoc_get_hmac function in net/sctp/auth.c does not
 properly validate the hmac_ids array of an SCTP peer, which allows
 remote attackers to cause a denial of service (memory corruption
 and panic) via a crafted value in the last element of this
 array. (CVE-2010-3705)
 
 The do_tcp_setsockopt function in net/ipv4/tcp.c does not properly
 restrict TCP_MAXSEG (aka MSS) values, which allows local users to
 cause a denial of service (OOPS) via a setsockopt call that specifies
 a small value, leading to a divide-by-zero error or incorrect use of
 a signed integer. (CVE-2010-4165)
 
 Multiple integer signedness errors in net/rose/af_rose.c allow local
 users to cause a denial of service (heap memory corruption) or possibly
 have unspecified other impact via a rose_getname function call,
 related to the rose_bind and rose_connect functions. (CVE-2010-3310)
 
 The KVM implementation does not properly reload the FS and GS segment
 registers, which allows host OS users to cause a denial of service
 (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified
 Local Descriptor Table (LDT). (CVE-2010-3698)
 
 This update disable the iommu hardware in order to avoid crash with
 some DELL servers (R510, R710,...)
 
 To update your kernel, please follow the directions located at:
 
   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4565
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4346
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3015
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3698
 https://qa.mandriva.com/62522
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 a3455fb1479b38f9923f84eaecfe66d7 
mes5/i586/drm-experimental-kernel-2.6.27.56-desktop-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
 dd333ca803c2533fb5c09cf4d186debd 
mes5/i586/drm-experimental-kernel-2.6.27.56-desktop586-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
 5df5c97b2c664286e6501a76064aa9a2 
mes5/i586/drm-experimental-kernel-2.6.27.56-server-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
 3913aa3eb13e887831d86f4a0cfa88aa 
mes5/i586/drm-experimental-kernel-desktop586-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
 c51a01dee1105cb6f0a30bfe1acaa2b6 
mes5/i586/drm-experimental-kernel-desktop-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
 fcc25ef3d30966eff0273c03858ce0f2 
mes5/i586/drm-experimental-kernel-server-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
 e3f4a601b0669e9637a4295c0f5b5623 
mes5/i586/fglrx-kernel-2.6.27.56-desktop-2mnb-8.522-3mdv2009.0.i586.rpm
 6097c3c9050fac6e8af7d9d17b567024 
mes5/i586/fglrx-kernel-2.6.27.56-desktop586-2mnb-8.522-3mdv2009.0.i586.rpm
 b2e6ea2d5677b7dfeb1cf89bb15a1b40 
mes5/i586/fglrx-kernel-2.6.27.56-server-2mnb-8.522-3mdv2009.0.i586.rpm
 e94306e6ab9d1d1da456c086604a93c6 
mes5/i586/fglrx-kernel-desktop586-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
 e2720f1cb9e3ed93829bd0d5d523e412 
mes5/i586/fglrx-kernel-desktop-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
 3233fa77b8b8f3f980225864e523692c 
mes5/i586/fglrx-kernel-server-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
 01fc685fa34ce857d1c276cb0094a78c 
mes5/i586/iscsitarget-kernel-2.6.27.56-desktop-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
 dde17d568af82d4d0fcabc52b9393c95 
mes5/i586/iscsitarget-kernel-2.6.27.56-desktop586-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
 ca1f7ce08ec87a0c06a72a30882e9e3a 
mes5/i586/iscsitarget-kernel-2.6.27.56-server-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
 e3c2368a0b0ed533bcfb12a444851384 
mes5/i586/iscsitarget-kernel-desktop586-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
 be33f035a2fdcca45322b9117328ef33 
mes5/i586/iscsitarget-kernel-desktop-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
 bb1c83a43c7a975ce91b01bc7c674bf7 
mes5/i586/iscsitarget-kernel-server-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
 d5d842b38061e1532d1f340c637b91e9 
mes5/i586/kernel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 0989e9bb357692a284391306a715a76e 
mes5/i586/kernel-desktop-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 ccf4d9c1a3d5e1d9626b6ce893f72200 
mes5/i586/kernel-desktop586-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 ed99ebe5b806ac4e8f4ea23a65b61832 
mes5/i586/kernel-desktop586-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 619bd6031126ee028787be855580a470 
mes5/i586/kernel-desktop586-devel-latest-2.6.27.56-2mnb2.i586.rpm
 3b0864031b1ff1b9e574208d971b984b 
mes5/i586/kernel-desktop586-latest-2.6.27.56-2mnb2.i586.rpm
 c66aea10f5f8bc84fc095388392006db 
mes5/i586/kernel-desktop-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 13fe690840e0026b35ba781a1eb18ce1 
mes5/i586/kernel-desktop-devel-latest-2.6.27.56-2mnb2.i586.rpm
 3323e1d08cec08036205842560ab7179 
mes5/i586/kernel-desktop-latest-2.6.27.56-2mnb2.i586.rpm
 6de830a855c1d92bde173c56a859a080 
mes5/i586/kernel-doc-2.6.27.56-2mnb2.i586.rpm
 f6661b094c7ce232280d94a4d4c3fd30 
mes5/i586/kernel-server-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 b5c5d854b344ef630b964ec57c75a5fb 
mes5/i586/kernel-server-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 af57e82b86a7af33c0b63df17b0e07a5 
mes5/i586/kernel-server-devel-latest-2.6.27.56-2mnb2.i586.rpm
 38cd88b4dfd68872ef6a24a7909bf8d7 
mes5/i586/kernel-server-latest-2.6.27.56-2mnb2.i586.rpm
 6dfa8e791336c906cef8e65c225ae120 
mes5/i586/kernel-source-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 03bd0ce5f3354f4923dbee5c9838e4ca 
mes5/i586/kernel-source-latest-2.6.27.56-2mnb2.i586.rpm
 5843a25ec60d13cbd90b1eb0520b7e0e 
mes5/i586/kqemu-kernel-2.6.27.56-desktop-2mnb-1.4.0pre1-0.i586.rpm
 e93c44266df87ef2ca975240b64e94a5 
mes5/i586/kqemu-kernel-2.6.27.56-desktop586-2mnb-1.4.0pre1-0.i586.rpm
 073240e168447c95bf0848ef39c201e7 
mes5/i586/kqemu-kernel-2.6.27.56-server-2mnb-1.4.0pre1-0.i586.rpm
 95809d47bd1327d6888ed8b98e4c2b7a 
mes5/i586/kqemu-kernel-desktop586-latest-1.4.0pre1-1.20110216.0.i586.rpm
 babe60e138b903b4e3675a32f42b204e 
mes5/i586/kqemu-kernel-desktop-latest-1.4.0pre1-1.20110216.0.i586.rpm
 366210833c482dc2413a8a8a2d138390 
mes5/i586/kqemu-kernel-server-latest-1.4.0pre1-1.20110216.0.i586.rpm
 70d601acad9ee4d726b1358bf145ecec 
mes5/i586/libafs-kernel-2.6.27.56-desktop-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
 d770b0e0a27a1c4c90409d1f8cfdbe42 
mes5/i586/libafs-kernel-2.6.27.56-desktop586-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
 181aecd13b56cd3a2aa3136782c9e617 
mes5/i586/libafs-kernel-2.6.27.56-server-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
 080c989ed2f875c64035210cbb92d4fd 
mes5/i586/libafs-kernel-desktop586-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
 0c34b7bc40d76df5c6a99d11b3e787f6 
mes5/i586/libafs-kernel-desktop-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
 a260774ccab8a2c3f7efd820be90ca5d 
mes5/i586/libafs-kernel-server-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
 a6fa3d2aa67889b7110ae8c5d17bc450 
mes5/i586/madwifi-kernel-2.6.27.56-desktop-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
 8f8b50af48c03f78994ee7efa35ae212 
mes5/i586/madwifi-kernel-2.6.27.56-desktop586-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
 13831ae378c4bcb64296cbbec6fff463 
mes5/i586/madwifi-kernel-2.6.27.56-server-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
 3f404c51664671b3e7a72850f14b01a9 
mes5/i586/madwifi-kernel-desktop586-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
 2835f4499861a690ad15c23e914aedbb 
mes5/i586/madwifi-kernel-desktop-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
 395bf7cd291ca7a27b3fc9399d2dac8e 
mes5/i586/madwifi-kernel-server-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
 802f63ff931a069dfe9708f4369eba9d 
mes5/i586/nvidia173-kernel-2.6.27.56-desktop-2mnb-173.14.12-4mdv2009.0.i586.rpm
 629ca2fd770c4a9d43f7e9ca4e58bf6f 
mes5/i586/nvidia173-kernel-2.6.27.56-desktop586-2mnb-173.14.12-4mdv2009.0.i586.rpm
 07dcb8bf57196dafc64766314a076dec 
mes5/i586/nvidia173-kernel-desktop586-latest-173.14.12-1.20110216.4mdv2009.0.i586.rpm
 f272a6d64ba457361480155f25698032 
mes5/i586/nvidia173-kernel-desktop-latest-173.14.12-1.20110216.4mdv2009.0.i586.rpm
 b0048509e68362da030b162be9d31cac 
mes5/i586/nvidia71xx-kernel-2.6.27.56-desktop-2mnb-71.86.06-5mdv2009.0.i586.rpm
 ce059ab58ae23a7b81616565294b1e21 
mes5/i586/nvidia71xx-kernel-2.6.27.56-desktop586-2mnb-71.86.06-5mdv2009.0.i586.rpm
 10779ab700911d465153f3aa8e8329d2 
mes5/i586/nvidia71xx-kernel-2.6.27.56-server-2mnb-71.86.06-5mdv2009.0.i586.rpm
 31f707095f0eb92e74a9cd4ea36181b4 
mes5/i586/nvidia71xx-kernel-desktop586-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
 fbba45072884b367c6328e11765be53b 
mes5/i586/nvidia71xx-kernel-desktop-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
 a4321c58842a586f95d105d9776321ca 
mes5/i586/nvidia71xx-kernel-server-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
 65348d32eded5c5e30a3e6eb5ee8568b 
mes5/i586/nvidia96xx-kernel-2.6.27.56-desktop-2mnb-96.43.07-5mdv2009.0.i586.rpm
 84490f0a84246ef16877177d8155e6ba 
mes5/i586/nvidia96xx-kernel-2.6.27.56-desktop586-2mnb-96.43.07-5mdv2009.0.i586.rpm
 cc1fa87cd288e7101a3533e527326f21 
mes5/i586/nvidia96xx-kernel-2.6.27.56-server-2mnb-96.43.07-5mdv2009.0.i586.rpm
 efbe4ac6832c3129215a39f905e3882f 
mes5/i586/nvidia96xx-kernel-desktop586-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
 f05fee55d8dbb639a11a98a436aa0b23 
mes5/i586/nvidia96xx-kernel-desktop-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
 5a506931f6948b1368c837cbc0a0aa34 
mes5/i586/nvidia96xx-kernel-server-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
 347cd0b589220dd24e2b6723f0009d75 
mes5/i586/nvidia-current-kernel-2.6.27.56-desktop-2mnb-177.70-2.3mdv2009.0.i586.rpm
 216a8ff2c73743f00630245222b6d576 
mes5/i586/nvidia-current-kernel-2.6.27.56-desktop586-2mnb-177.70-2.3mdv2009.0.i586.rpm
 f2c2c9d52771bdb1306e80c21d3bfdc7 
mes5/i586/nvidia-current-kernel-2.6.27.56-server-2mnb-177.70-2.3mdv2009.0.i586.rpm
 752d2ca298db4b88edc9484a048bffba 
mes5/i586/nvidia-current-kernel-desktop586-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
 881b4a3160d2181476724291df394ede 
mes5/i586/nvidia-current-kernel-desktop-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
 4217b6d471e08ecabefa4abcd07b13eb 
mes5/i586/nvidia-current-kernel-server-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
 70668fe70ad415f1928492af492448e6 
mes5/i586/vpnclient-kernel-2.6.27.56-desktop-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
 f183f45adcc9814c1a0c4de96c88d1aa 
mes5/i586/vpnclient-kernel-2.6.27.56-desktop586-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
 3e7a51a3365d9f7d2cf81f49d3702703 
mes5/i586/vpnclient-kernel-2.6.27.56-server-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
 bc05d233333e5e6f5ee13f44152ce761 
mes5/i586/vpnclient-kernel-desktop586-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm
 4dd4f299a208a8aacaa595f265a67d97 
mes5/i586/vpnclient-kernel-desktop-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm
 2976845e4e19df1265a9301a8a61a987 
mes5/i586/vpnclient-kernel-server-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm

 a3defefb7cd881e1c1f1cb7effbbe821 
mes5/SRPMS/kernel-2.6.27.56-2mnb2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 d3fe6c3d8d2bb1412c2667359a0edf03 
mes5/x86_64/iscsitarget-kernel-2.6.27.56-desktop-2mnb-0.4.16-4.1mdvmes5.1.x86_64.rpm
 9210101a3c5fe2acefb1164bd6ec4fe9 
mes5/x86_64/iscsitarget-kernel-2.6.27.56-server-2mnb-0.4.16-4.1mdvmes5.1.x86_64.rpm
 71634b92d548a17e2510d31f22cf41c3 
mes5/x86_64/iscsitarget-kernel-desktop-latest-0.4.16-1.20110217.4.1mdvmes5.1.x86_64.rpm
 331c70875670ae314263480bf0b43cb8 
mes5/x86_64/iscsitarget-kernel-server-latest-0.4.16-1.20110217.4.1mdvmes5.1.x86_64.rpm
 6f83035970b3f4a2d4af31270782aa46 
mes5/x86_64/kernel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 51b720b121409efbee1ccb74dbc863dd 
mes5/x86_64/kernel-desktop-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 5b430384c3214153209b46ed4d3adca4 
mes5/x86_64/kernel-desktop-devel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 a8f74928d097de5da822e5d2ad2c0569 
mes5/x86_64/kernel-desktop-devel-latest-2.6.27.56-2mnb2.x86_64.rpm
 cffbd65d58376ff719f9a3e9c0bb84ef 
mes5/x86_64/kernel-desktop-latest-2.6.27.56-2mnb2.x86_64.rpm
 014b61f1efe483cd5b67939ced2ebddd 
mes5/x86_64/kernel-doc-2.6.27.56-2mnb2.x86_64.rpm
 efd3a82c1afaafbd49306a092dc887f2 
mes5/x86_64/kernel-server-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 a0c214e6e7f06b7d3012fb2e3a28e322 
mes5/x86_64/kernel-server-devel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 f7a128fa091ab280940a242ad4b63221 
mes5/x86_64/kernel-server-devel-latest-2.6.27.56-2mnb2.x86_64.rpm
 7716733dab8fd837efcf0f5e5809ee21 
mes5/x86_64/kernel-server-latest-2.6.27.56-2mnb2.x86_64.rpm
 46a1d3760a87c5b8196f7c384295e986 
mes5/x86_64/kernel-source-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 9da3abcad5166a813570d662d62cad90 
mes5/x86_64/kernel-source-latest-2.6.27.56-2mnb2.x86_64.rpm
 4d820d15a8ff1851f4c5a216f75b4402 
mes5/x86_64/kqemu-kernel-2.6.27.56-desktop-2mnb-1.4.0pre1-0.x86_64.rpm
 c2986edb44def3a9ab3e1eceed17e172 
mes5/x86_64/kqemu-kernel-2.6.27.56-server-2mnb-1.4.0pre1-0.x86_64.rpm
 fe87743af9b9acc1d356dcc27ff2a17e 
mes5/x86_64/kqemu-kernel-desktop-latest-1.4.0pre1-1.20110217.0.x86_64.rpm
 58b432b88122095a7b25a798ae4238be 
mes5/x86_64/kqemu-kernel-server-latest-1.4.0pre1-1.20110217.0.x86_64.rpm
 e0f33f22957824003950168b6296b077 
mes5/x86_64/libafs-kernel-2.6.27.56-desktop-2mnb-1.4.7-5.1mdv2009.0.x86_64.rpm
 c201f8d7ddc904ad57673d64e1340a6d 
mes5/x86_64/libafs-kernel-2.6.27.56-server-2mnb-1.4.7-5.1mdv2009.0.x86_64.rpm
 8bc2d5ea3063209e63bb94306e8eebe4 
mes5/x86_64/libafs-kernel-desktop-latest-1.4.7-1.20110217.5.1mdv2009.0.x86_64.rpm
 e47558aace1e43853da202e1ba2b80e8 
mes5/x86_64/libafs-kernel-server-latest-1.4.7-1.20110217.5.1mdv2009.0.x86_64.rpm
 0728e365d83b1d9088effd5dd4f07cd1 
mes5/x86_64/madwifi-kernel-2.6.27.56-desktop-2mnb-0.9.4-3.r3835mdv2009.0.x86_64.rpm
 316c42e818066be99ac240747cd1548a 
mes5/x86_64/madwifi-kernel-2.6.27.56-server-2mnb-0.9.4-3.r3835mdv2009.0.x86_64.rpm
 e14ddddbb6bc49167ca90b6f3abb6738 
mes5/x86_64/madwifi-kernel-desktop-latest-0.9.4-1.20110217.3.r3835mdv2009.0.x86_64.rpm
 e0f52fef6c65cb4a2ce64fff312629e1 
mes5/x86_64/madwifi-kernel-server-latest-0.9.4-1.20110217.3.r3835mdv2009.0.x86_64.rpm
 cb9374aea397f81efb4bef546f508755 
mes5/x86_64/nvidia173-kernel-2.6.27.56-desktop-2mnb-173.14.12-4mdv2009.0.x86_64.rpm
 1cc65102b999c34d4187051a7ab492f4 
mes5/x86_64/nvidia173-kernel-2.6.27.56-server-2mnb-173.14.12-4mdv2009.0.x86_64.rpm
 3e58f7d90f654393fd567444cee03369 
mes5/x86_64/nvidia173-kernel-desktop-latest-173.14.12-1.20110217.4mdv2009.0.x86_64.rpm
 e0f670662095b6b58a496b4c964f8eb2 
mes5/x86_64/nvidia173-kernel-server-latest-173.14.12-1.20110217.4mdv2009.0.x86_64.rpm
 08395094ec9d572af5913f544634624e 
mes5/x86_64/nvidia71xx-kernel-2.6.27.56-desktop-2mnb-71.86.06-5mdv2009.0.x86_64.rpm
 4434e0cc8ed4c747345c8357b956a535 
mes5/x86_64/nvidia71xx-kernel-2.6.27.56-server-2mnb-71.86.06-5mdv2009.0.x86_64.rpm
 3c2fea46053d442cfd8db07a4fe92e99 
mes5/x86_64/nvidia71xx-kernel-desktop-latest-71.86.06-1.20110217.5mdv2009.0.x86_64.rpm
 a5a315c117a8c84a09aa69f6e990e4f4 
mes5/x86_64/nvidia71xx-kernel-server-latest-71.86.06-1.20110217.5mdv2009.0.x86_64.rpm
 3dafc431b60beb32418a062ceb9bb4e2 
mes5/x86_64/nvidia96xx-kernel-2.6.27.56-desktop-2mnb-96.43.07-5mdv2009.0.x86_64.rpm
 4b20671069d711a274d1d0948b766fcd 
mes5/x86_64/nvidia96xx-kernel-2.6.27.56-server-2mnb-96.43.07-5mdv2009.0.x86_64.rpm
 8a484a45e986709daf2128f83394a19d 
mes5/x86_64/nvidia96xx-kernel-desktop-latest-96.43.07-1.20110217.5mdv2009.0.x86_64.rpm
 57d68d64cfcea66c660457d9247df1d3 
mes5/x86_64/nvidia96xx-kernel-server-latest-96.43.07-1.20110217.5mdv2009.0.x86_64.rpm
 cb86ee77b7683c1f46a0b390fe7834e6 
mes5/x86_64/nvidia-current-kernel-2.6.27.56-desktop-2mnb-177.70-2.3mdv2009.0.x86_64.rpm
 60dc82052cf57a231b4ce15f10434cd1 
mes5/x86_64/nvidia-current-kernel-2.6.27.56-server-2mnb-177.70-2.3mdv2009.0.x86_64.rpm
 1ced8cf75b42dd1850a402a0d7cc2627 
mes5/x86_64/nvidia-current-kernel-desktop-latest-177.70-1.20110217.2.3mdv2009.0.x86_64.rpm
 c9dd11cd682e1ca0396e9b297e4b3598 
mes5/x86_64/nvidia-current-kernel-server-latest-177.70-1.20110217.2.3mdv2009.0.x86_64.rpm
 25f24832a62f7b9a99e5fd70fb70afa9 
mes5/x86_64/vpnclient-kernel-2.6.27.56-desktop-2mnb-4.8.01.0640-3mdv2009.0.x86_64.rpm
 4b7efd43a34d1e816cea69b6b43c0686 
mes5/x86_64/vpnclient-kernel-2.6.27.56-server-2mnb-4.8.01.0640-3mdv2009.0.x86_64.rpm
 0fb2705351a7a8b5fb2ca6bc285d519f 
mes5/x86_64/vpnclient-kernel-desktop-latest-4.8.01.0640-1.20110217.3mdv2009.0.x86_64.rpm
 6a8d3a4242319446040fcb011f81b23a 
mes5/x86_64/vpnclient-kernel-server-latest-4.8.01.0640-1.20110217.3mdv2009.0.x86_64.rpm

 a3defefb7cd881e1c1f1cb7effbbe821 
mes5/SRPMS/kernel-2.6.27.56-2mnb2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNXXyKmqjQ0CJFipgRAggNAJ98qyQbJ0M46X3GnMY+nVt/7E8aigCgzknq
BUXFLWk38hbAGct/K7lvdOE=
=g9HX
-----END PGP SIGNATURE-----
 
CD: 3ms