Avis du CERT RENATER

Par défaut, cette page vous affichera les derniers messages envoyés par le CERT RENATER à la communauté. Vous pouvez affiner par année ou par type de message. Si aucun critère n'est précisé, seuls les derniers messages sont affichés
Date : Fri, 18 Feb 2011 13:32:20 +0100
Type : VULN
Sujet : CERT-Renater : 2011/VULN134 (Mandriva Linux : Multiple vulnerabilities fixed in kernel)
====================================================================                                   CERT-Renater

                        Note d'Information No. 2011/VULN134
_____________________________________________________________________

DATE                      : 18/02/2011

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Mandriva Linux Enterprise Server version 5.0
                              running Linux 2.6 kernel.

======================================================================
http://www.mandriva.com/support/security/advisories/?dis=mes5&name=MDVSA-2011:029
______________________________________________________________________

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2011:029
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : kernel
 Date    : February 17, 2011
 Affected: Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability was discovered and corrected in the Linux 2.6 kernel:
 The X.25 implementation does not properly parse facilities, which
 allows remote attackers to cause a denial of service (heap memory
 corruption and panic) or possibly have
 unspecified other impact via malformed data, a different vulnerability
 than CVE-2010-4164. (CVE-2010-3873)

 The bcm_connect function Broadcast Manager in the Controller Area
 Network (CAN) implementation in the Linux creates a publicly accessible
 file with a filename containing a kernel memory address, which allows
 local users to obtain potentially sensitive information about kernel
 memory use by listing this filename. (CVE-2010-4565)

 The install_special_mapping function in mm/mmap.c does not make an
 expected security_file_mmap function call, which allows local users
 to bypass intended mmap_min_addr restrictions and possibly conduct
 NULL pointer dereference attacks via a crafted assembly-language
 application. (CVE-2010-4346)

 The sk_run_filter function does not check whether a certain memory
 location has been initialized before executing a BPF_S_LD_MEM
 or BPF_S_LDX_MEM instruction, which allows local users to obtain
 potentially sensitive information from kernel stack memory via a
 crafted socket filter. (CVE-2010-4158)

 Heap-based buffer overflow in the bcm_connect function the Broadcast
 Manager in the Controller Area Network (CAN)on 64-bit platforms might
 allow local users to cause a denial of service (memory corruption)
 via a connect operation. (CVE-2010-3874)

 The blk_rq_map_user_iov function in block/blk-map.c allows local
 users to cause a denial of service (panic) via a zero-length I/O
 request in a device ioctl to a SCSI device. (CVE-2010-4163)

 Multiple integer underflows in the x25_parse_facilities function in
 allow remote attackers to cause a denial of service (system crash)
 via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3)
 X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data. (CVE-2010-4164)

 Race condition in the do_setlk function allows local users to cause a
 denial of service (crash) via vectors resulting in an interrupted RPC
 call that leads to a stray FL_POSIX lock, related to improper handling
 of a race between fcntl and close in the EINTR case. (CVE-2009-4307)

 Multiple integer overflows in fs/bio.c allow local users to cause
 a denial of service (system crash) via a crafted device ioctl to a
 SCSI device. (CVE-2010-4162)

 Integer overflow in the ext4_ext_get_blocks function in
 fs/ext4/extents.c allows local users to cause a denial of service
 (BUG and system crash) via a write operation on the last block of a
 large file, followed by a sync operation. (CVE-2010-3015)

 The do_exit function in kernel/exit.c does not properly handle a
 KERNEL_DS get_fs value, which allows local users to bypass intended
 access_ok restrictions, overwrite arbitrary kernel memory locations,
 and gain privileges by leveraging a (1) BUG, (2) NULL pointer
 dereference, or (3) page fault, as demonstrated by vectors involving
 the clear_child_tid feature and the splice system call. (CVE-2010-4258)

 The ax25_getname function in net/ax25/af_ax25.c does not initialize
 a certain structure, which allows local users to obtain potentially
 sensitive information from kernel stack memory by reading a copy of
 this structure. (CVE-2010-3875)

 Integer overflow in the do_io_submit function in fs/aio.c allows local
 users to cause a denial of service or possibly have unspecified other
 impact via crafted use of the io_submit system call. (CVE-2010-3067)

 Race condition in the __exit_signal function in kernel/exit.c
 allows local users to cause a denial of service via vectors
 related to multithreaded exec, the use of a thread group leader in
 kernel/posix-cpu-timers.c, and the selection of a new thread group
 leader in the de_thread function in fs/exec.c. (CVE-2010-4248)

 Integer signedness error in the pkt_find_dev_from_minor function
 in drivers/block/pktcdvd.c allows local users to obtain sensitive
 information from kernel memory or cause a denial of service (invalid
 pointer dereference and system crash) via a crafted index value in
 a PKT_CTRL_CMD_STATUS ioctl call. (CVE-2010-3437)

 The get_name function in net/tipc/socket.c does not initialize a
 certain structure, which allows local users to obtain potentially
 sensitive information from kernel stack memory by reading a copy of
 this structure. (CVE-2010-3877)

 Stack-based buffer overflow in the parse_tag_11_packet function
 in fs/ecryptfs/keystore.c in the eCryptfs subsystem allows local
 users to cause a denial of service (system crash) or possibly gain
 privileges via vectors involving a crafted eCryptfs file, related
 to not ensuring that the key signature length in a Tag 11 packet is
 compatible with the key signature buffer size. (CVE-2009-2406)

 Multiple integer signedness errors in the TIPC implementation allow
 local users to gain privileges via a crafted sendmsg call that
 triggers a heap-based buffer overflow, related to the tipc_msg_build
 function in net/tipc/msg.c and the verify_iovec function in
 net/core/iovec.c. (CVE-2010-3859)

 The ipc subsystem does not initialize certain structures, which allows
 local users to obtain potentially sensitive information from kernel
 stack memory via vectors related to the (1) compat_sys_semctl, (2)
 compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c;
 and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr
 functions in ipc/compat_mq.c. (CVE-2010-4073)

 The copy_shmid_to_user function does not initialize a certain
 structure, which allows local users to obtain potentially sensitive
 information from kernel stack memory via vectors related to the shmctl
 system call and the old shm interface. (CVE-2010-4072)

 The sctp_auth_asoc_get_hmac function in net/sctp/auth.c does not
 properly validate the hmac_ids array of an SCTP peer, which allows
 remote attackers to cause a denial of service (memory corruption
 and panic) via a crafted value in the last element of this
 array. (CVE-2010-3705)

 The do_tcp_setsockopt function in net/ipv4/tcp.c does not properly
 restrict TCP_MAXSEG (aka MSS) values, which allows local users to
 cause a denial of service (OOPS) via a setsockopt call that specifies
 a small value, leading to a divide-by-zero error or incorrect use of
 a signed integer. (CVE-2010-4165)

 Multiple integer signedness errors in net/rose/af_rose.c allow local
 users to cause a denial of service (heap memory corruption) or possibly
 have unspecified other impact via a rose_getname function call,
 related to the rose_bind and rose_connect functions. (CVE-2010-3310)

 The KVM implementation does not properly reload the FS and GS segment
 registers, which allows host OS users to cause a denial of service
 (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified
 Local Descriptor Table (LDT). (CVE-2010-3698)

 This update disable the iommu hardware in order to avoid crash with
 some DELL servers (R510, R710,...)

 To update your kernel, please follow the directions located at:

   http://www.mandriva.com/en/security/kernelupdate
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4565
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4346
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3015
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4248
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3859
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3698
 https://qa.mandriva.com/62522
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 a3455fb1479b38f9923f84eaecfe66d7  mes5/i586/drm-experimental-kernel-2.6.27.56-desktop-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
 dd333ca803c2533fb5c09cf4d186debd  mes5/i586/drm-experimental-kernel-2.6.27.56-desktop586-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
 5df5c97b2c664286e6501a76064aa9a2  mes5/i586/drm-experimental-kernel-2.6.27.56-server-2mnb-2.3.0-2.20080912.1mdv2009.0.i586.rpm
 3913aa3eb13e887831d86f4a0cfa88aa  mes5/i586/drm-experimental-kernel-desktop586-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
 c51a01dee1105cb6f0a30bfe1acaa2b6  mes5/i586/drm-experimental-kernel-desktop-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
 fcc25ef3d30966eff0273c03858ce0f2  mes5/i586/drm-experimental-kernel-server-latest-2.3.0-1.20110216.2.20080912.1mdv2009.0.i586.rpm
 e3f4a601b0669e9637a4295c0f5b5623  mes5/i586/fglrx-kernel-2.6.27.56-desktop-2mnb-8.522-3mdv2009.0.i586.rpm
 6097c3c9050fac6e8af7d9d17b567024  mes5/i586/fglrx-kernel-2.6.27.56-desktop586-2mnb-8.522-3mdv2009.0.i586.rpm
 b2e6ea2d5677b7dfeb1cf89bb15a1b40  mes5/i586/fglrx-kernel-2.6.27.56-server-2mnb-8.522-3mdv2009.0.i586.rpm
 e94306e6ab9d1d1da456c086604a93c6  mes5/i586/fglrx-kernel-desktop586-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
 e2720f1cb9e3ed93829bd0d5d523e412  mes5/i586/fglrx-kernel-desktop-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
 3233fa77b8b8f3f980225864e523692c  mes5/i586/fglrx-kernel-server-latest-8.522-1.20110216.3mdv2009.0.i586.rpm
 01fc685fa34ce857d1c276cb0094a78c  mes5/i586/iscsitarget-kernel-2.6.27.56-desktop-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
 dde17d568af82d4d0fcabc52b9393c95  mes5/i586/iscsitarget-kernel-2.6.27.56-desktop586-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
 ca1f7ce08ec87a0c06a72a30882e9e3a  mes5/i586/iscsitarget-kernel-2.6.27.56-server-2mnb-0.4.16-4.1mdvmes5.1.i586.rpm
 e3c2368a0b0ed533bcfb12a444851384  mes5/i586/iscsitarget-kernel-desktop586-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
 be33f035a2fdcca45322b9117328ef33  mes5/i586/iscsitarget-kernel-desktop-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
 bb1c83a43c7a975ce91b01bc7c674bf7  mes5/i586/iscsitarget-kernel-server-latest-0.4.16-1.20110216.4.1mdvmes5.1.i586.rpm
 d5d842b38061e1532d1f340c637b91e9  mes5/i586/kernel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 0989e9bb357692a284391306a715a76e  mes5/i586/kernel-desktop-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 ccf4d9c1a3d5e1d9626b6ce893f72200  mes5/i586/kernel-desktop586-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 ed99ebe5b806ac4e8f4ea23a65b61832  mes5/i586/kernel-desktop586-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 619bd6031126ee028787be855580a470  mes5/i586/kernel-desktop586-devel-latest-2.6.27.56-2mnb2.i586.rpm
 3b0864031b1ff1b9e574208d971b984b  mes5/i586/kernel-desktop586-latest-2.6.27.56-2mnb2.i586.rpm
 c66aea10f5f8bc84fc095388392006db  mes5/i586/kernel-desktop-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 13fe690840e0026b35ba781a1eb18ce1  mes5/i586/kernel-desktop-devel-latest-2.6.27.56-2mnb2.i586.rpm
 3323e1d08cec08036205842560ab7179  mes5/i586/kernel-desktop-latest-2.6.27.56-2mnb2.i586.rpm
 6de830a855c1d92bde173c56a859a080  mes5/i586/kernel-doc-2.6.27.56-2mnb2.i586.rpm
 f6661b094c7ce232280d94a4d4c3fd30  mes5/i586/kernel-server-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 b5c5d854b344ef630b964ec57c75a5fb  mes5/i586/kernel-server-devel-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 af57e82b86a7af33c0b63df17b0e07a5  mes5/i586/kernel-server-devel-latest-2.6.27.56-2mnb2.i586.rpm
 38cd88b4dfd68872ef6a24a7909bf8d7  mes5/i586/kernel-server-latest-2.6.27.56-2mnb2.i586.rpm
 6dfa8e791336c906cef8e65c225ae120  mes5/i586/kernel-source-2.6.27.56-2mnb-1-1mnb2.i586.rpm
 03bd0ce5f3354f4923dbee5c9838e4ca  mes5/i586/kernel-source-latest-2.6.27.56-2mnb2.i586.rpm
 5843a25ec60d13cbd90b1eb0520b7e0e  mes5/i586/kqemu-kernel-2.6.27.56-desktop-2mnb-1.4.0pre1-0.i586.rpm
 e93c44266df87ef2ca975240b64e94a5  mes5/i586/kqemu-kernel-2.6.27.56-desktop586-2mnb-1.4.0pre1-0.i586.rpm
 073240e168447c95bf0848ef39c201e7  mes5/i586/kqemu-kernel-2.6.27.56-server-2mnb-1.4.0pre1-0.i586.rpm
 95809d47bd1327d6888ed8b98e4c2b7a  mes5/i586/kqemu-kernel-desktop586-latest-1.4.0pre1-1.20110216.0.i586.rpm
 babe60e138b903b4e3675a32f42b204e  mes5/i586/kqemu-kernel-desktop-latest-1.4.0pre1-1.20110216.0.i586.rpm
 366210833c482dc2413a8a8a2d138390  mes5/i586/kqemu-kernel-server-latest-1.4.0pre1-1.20110216.0.i586.rpm
 70d601acad9ee4d726b1358bf145ecec  mes5/i586/libafs-kernel-2.6.27.56-desktop-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
 d770b0e0a27a1c4c90409d1f8cfdbe42  mes5/i586/libafs-kernel-2.6.27.56-desktop586-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
 181aecd13b56cd3a2aa3136782c9e617  mes5/i586/libafs-kernel-2.6.27.56-server-2mnb-1.4.7-5.2mdv2009.0.i586.rpm
 080c989ed2f875c64035210cbb92d4fd  mes5/i586/libafs-kernel-desktop586-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
 0c34b7bc40d76df5c6a99d11b3e787f6  mes5/i586/libafs-kernel-desktop-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
 a260774ccab8a2c3f7efd820be90ca5d  mes5/i586/libafs-kernel-server-latest-1.4.7-1.20110216.5.2mdv2009.0.i586.rpm
 a6fa3d2aa67889b7110ae8c5d17bc450  mes5/i586/madwifi-kernel-2.6.27.56-desktop-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
 8f8b50af48c03f78994ee7efa35ae212  mes5/i586/madwifi-kernel-2.6.27.56-desktop586-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
 13831ae378c4bcb64296cbbec6fff463  mes5/i586/madwifi-kernel-2.6.27.56-server-2mnb-0.9.4-3.r3835mdv2009.0.i586.rpm
 3f404c51664671b3e7a72850f14b01a9  mes5/i586/madwifi-kernel-desktop586-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
 2835f4499861a690ad15c23e914aedbb  mes5/i586/madwifi-kernel-desktop-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
 395bf7cd291ca7a27b3fc9399d2dac8e  mes5/i586/madwifi-kernel-server-latest-0.9.4-1.20110216.3.r3835mdv2009.0.i586.rpm
 802f63ff931a069dfe9708f4369eba9d  mes5/i586/nvidia173-kernel-2.6.27.56-desktop-2mnb-173.14.12-4mdv2009.0.i586.rpm
 629ca2fd770c4a9d43f7e9ca4e58bf6f  mes5/i586/nvidia173-kernel-2.6.27.56-desktop586-2mnb-173.14.12-4mdv2009.0.i586.rpm
 07dcb8bf57196dafc64766314a076dec  mes5/i586/nvidia173-kernel-desktop586-latest-173.14.12-1.20110216.4mdv2009.0.i586.rpm
 f272a6d64ba457361480155f25698032  mes5/i586/nvidia173-kernel-desktop-latest-173.14.12-1.20110216.4mdv2009.0.i586.rpm
 b0048509e68362da030b162be9d31cac  mes5/i586/nvidia71xx-kernel-2.6.27.56-desktop-2mnb-71.86.06-5mdv2009.0.i586.rpm
 ce059ab58ae23a7b81616565294b1e21  mes5/i586/nvidia71xx-kernel-2.6.27.56-desktop586-2mnb-71.86.06-5mdv2009.0.i586.rpm
 10779ab700911d465153f3aa8e8329d2  mes5/i586/nvidia71xx-kernel-2.6.27.56-server-2mnb-71.86.06-5mdv2009.0.i586.rpm
 31f707095f0eb92e74a9cd4ea36181b4  mes5/i586/nvidia71xx-kernel-desktop586-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
 fbba45072884b367c6328e11765be53b  mes5/i586/nvidia71xx-kernel-desktop-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
 a4321c58842a586f95d105d9776321ca  mes5/i586/nvidia71xx-kernel-server-latest-71.86.06-1.20110216.5mdv2009.0.i586.rpm
 65348d32eded5c5e30a3e6eb5ee8568b  mes5/i586/nvidia96xx-kernel-2.6.27.56-desktop-2mnb-96.43.07-5mdv2009.0.i586.rpm
 84490f0a84246ef16877177d8155e6ba  mes5/i586/nvidia96xx-kernel-2.6.27.56-desktop586-2mnb-96.43.07-5mdv2009.0.i586.rpm
 cc1fa87cd288e7101a3533e527326f21  mes5/i586/nvidia96xx-kernel-2.6.27.56-server-2mnb-96.43.07-5mdv2009.0.i586.rpm
 efbe4ac6832c3129215a39f905e3882f  mes5/i586/nvidia96xx-kernel-desktop586-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
 f05fee55d8dbb639a11a98a436aa0b23  mes5/i586/nvidia96xx-kernel-desktop-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
 5a506931f6948b1368c837cbc0a0aa34  mes5/i586/nvidia96xx-kernel-server-latest-96.43.07-1.20110216.5mdv2009.0.i586.rpm
 347cd0b589220dd24e2b6723f0009d75  mes5/i586/nvidia-current-kernel-2.6.27.56-desktop-2mnb-177.70-2.3mdv2009.0.i586.rpm
 216a8ff2c73743f00630245222b6d576  mes5/i586/nvidia-current-kernel-2.6.27.56-desktop586-2mnb-177.70-2.3mdv2009.0.i586.rpm
 f2c2c9d52771bdb1306e80c21d3bfdc7  mes5/i586/nvidia-current-kernel-2.6.27.56-server-2mnb-177.70-2.3mdv2009.0.i586.rpm
 752d2ca298db4b88edc9484a048bffba  mes5/i586/nvidia-current-kernel-desktop586-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
 881b4a3160d2181476724291df394ede  mes5/i586/nvidia-current-kernel-desktop-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
 4217b6d471e08ecabefa4abcd07b13eb  mes5/i586/nvidia-current-kernel-server-latest-177.70-1.20110216.2.3mdv2009.0.i586.rpm
 70668fe70ad415f1928492af492448e6  mes5/i586/vpnclient-kernel-2.6.27.56-desktop-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
 f183f45adcc9814c1a0c4de96c88d1aa  mes5/i586/vpnclient-kernel-2.6.27.56-desktop586-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
 3e7a51a3365d9f7d2cf81f49d3702703  mes5/i586/vpnclient-kernel-2.6.27.56-server-2mnb-4.8.01.0640-3mdv2009.0.i586.rpm
 bc05d233333e5e6f5ee13f44152ce761  mes5/i586/vpnclient-kernel-desktop586-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm
 4dd4f299a208a8aacaa595f265a67d97  mes5/i586/vpnclient-kernel-desktop-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm
 2976845e4e19df1265a9301a8a61a987  mes5/i586/vpnclient-kernel-server-latest-4.8.01.0640-1.20110216.3mdv2009.0.i586.rpm
 a3defefb7cd881e1c1f1cb7effbbe821  mes5/SRPMS/kernel-2.6.27.56-2mnb2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 d3fe6c3d8d2bb1412c2667359a0edf03  mes5/x86_64/iscsitarget-kernel-2.6.27.56-desktop-2mnb-0.4.16-4.1mdvmes5.1.x86_64.rpm
 9210101a3c5fe2acefb1164bd6ec4fe9  mes5/x86_64/iscsitarget-kernel-2.6.27.56-server-2mnb-0.4.16-4.1mdvmes5.1.x86_64.rpm
 71634b92d548a17e2510d31f22cf41c3  mes5/x86_64/iscsitarget-kernel-desktop-latest-0.4.16-1.20110217.4.1mdvmes5.1.x86_64.rpm
 331c70875670ae314263480bf0b43cb8  mes5/x86_64/iscsitarget-kernel-server-latest-0.4.16-1.20110217.4.1mdvmes5.1.x86_64.rpm
 6f83035970b3f4a2d4af31270782aa46  mes5/x86_64/kernel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 51b720b121409efbee1ccb74dbc863dd  mes5/x86_64/kernel-desktop-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 5b430384c3214153209b46ed4d3adca4  mes5/x86_64/kernel-desktop-devel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 a8f74928d097de5da822e5d2ad2c0569  mes5/x86_64/kernel-desktop-devel-latest-2.6.27.56-2mnb2.x86_64.rpm
 cffbd65d58376ff719f9a3e9c0bb84ef  mes5/x86_64/kernel-desktop-latest-2.6.27.56-2mnb2.x86_64.rpm
 014b61f1efe483cd5b67939ced2ebddd  mes5/x86_64/kernel-doc-2.6.27.56-2mnb2.x86_64.rpm
 efd3a82c1afaafbd49306a092dc887f2  mes5/x86_64/kernel-server-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 a0c214e6e7f06b7d3012fb2e3a28e322  mes5/x86_64/kernel-server-devel-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 f7a128fa091ab280940a242ad4b63221  mes5/x86_64/kernel-server-devel-latest-2.6.27.56-2mnb2.x86_64.rpm
 7716733dab8fd837efcf0f5e5809ee21  mes5/x86_64/kernel-server-latest-2.6.27.56-2mnb2.x86_64.rpm
 46a1d3760a87c5b8196f7c384295e986  mes5/x86_64/kernel-source-2.6.27.56-2mnb-1-1mnb2.x86_64.rpm
 9da3abcad5166a813570d662d62cad90  mes5/x86_64/kernel-source-latest-2.6.27.56-2mnb2.x86_64.rpm
 4d820d15a8ff1851f4c5a216f75b4402  mes5/x86_64/kqemu-kernel-2.6.27.56-desktop-2mnb-1.4.0pre1-0.x86_64.rpm
 c2986edb44def3a9ab3e1eceed17e172  mes5/x86_64/kqemu-kernel-2.6.27.56-server-2mnb-1.4.0pre1-0.x86_64.rpm
 fe87743af9b9acc1d356dcc27ff2a17e  mes5/x86_64/kqemu-kernel-desktop-latest-1.4.0pre1-1.20110217.0.x86_64.rpm
 58b432b88122095a7b25a798ae4238be  mes5/x86_64/kqemu-kernel-server-latest-1.4.0pre1-1.20110217.0.x86_64.rpm
 e0f33f22957824003950168b6296b077  mes5/x86_64/libafs-kernel-2.6.27.56-desktop-2mnb-1.4.7-5.1mdv2009.0.x86_64.rpm
 c201f8d7ddc904ad57673d64e1340a6d  mes5/x86_64/libafs-kernel-2.6.27.56-server-2mnb-1.4.7-5.1mdv2009.0.x86_64.rpm
 8bc2d5ea3063209e63bb94306e8eebe4  mes5/x86_64/libafs-kernel-desktop-latest-1.4.7-1.20110217.5.1mdv2009.0.x86_64.rpm
 e47558aace1e43853da202e1ba2b80e8  mes5/x86_64/libafs-kernel-server-latest-1.4.7-1.20110217.5.1mdv2009.0.x86_64.rpm
 0728e365d83b1d9088effd5dd4f07cd1  mes5/x86_64/madwifi-kernel-2.6.27.56-desktop-2mnb-0.9.4-3.r3835mdv2009.0.x86_64.rpm
 316c42e818066be99ac240747cd1548a  mes5/x86_64/madwifi-kernel-2.6.27.56-server-2mnb-0.9.4-3.r3835mdv2009.0.x86_64.rpm
 e14ddddbb6bc49167ca90b6f3abb6738  mes5/x86_64/madwifi-kernel-desktop-latest-0.9.4-1.20110217.3.r3835mdv2009.0.x86_64.rpm
 e0f52fef6c65cb4a2ce64fff312629e1  mes5/x86_64/madwifi-kernel-server-latest-0.9.4-1.20110217.3.r3835mdv2009.0.x86_64.rpm
 cb9374aea397f81efb4bef546f508755  mes5/x86_64/nvidia173-kernel-2.6.27.56-desktop-2mnb-173.14.12-4mdv2009.0.x86_64.rpm
 1cc65102b999c34d4187051a7ab492f4  mes5/x86_64/nvidia173-kernel-2.6.27.56-server-2mnb-173.14.12-4mdv2009.0.x86_64.rpm
 3e58f7d90f654393fd567444cee03369  mes5/x86_64/nvidia173-kernel-desktop-latest-173.14.12-1.20110217.4mdv2009.0.x86_64.rpm
 e0f670662095b6b58a496b4c964f8eb2  mes5/x86_64/nvidia173-kernel-server-latest-173.14.12-1.20110217.4mdv2009.0.x86_64.rpm
 08395094ec9d572af5913f544634624e  mes5/x86_64/nvidia71xx-kernel-2.6.27.56-desktop-2mnb-71.86.06-5mdv2009.0.x86_64.rpm
 4434e0cc8ed4c747345c8357b956a535  mes5/x86_64/nvidia71xx-kernel-2.6.27.56-server-2mnb-71.86.06-5mdv2009.0.x86_64.rpm
 3c2fea46053d442cfd8db07a4fe92e99  mes5/x86_64/nvidia71xx-kernel-desktop-latest-71.86.06-1.20110217.5mdv2009.0.x86_64.rpm
 a5a315c117a8c84a09aa69f6e990e4f4  mes5/x86_64/nvidia71xx-kernel-server-latest-71.86.06-1.20110217.5mdv2009.0.x86_64.rpm
 3dafc431b60beb32418a062ceb9bb4e2  mes5/x86_64/nvidia96xx-kernel-2.6.27.56-desktop-2mnb-96.43.07-5mdv2009.0.x86_64.rpm
 4b20671069d711a274d1d0948b766fcd  mes5/x86_64/nvidia96xx-kernel-2.6.27.56-server-2mnb-96.43.07-5mdv2009.0.x86_64.rpm
 8a484a45e986709daf2128f83394a19d  mes5/x86_64/nvidia96xx-kernel-desktop-latest-96.43.07-1.20110217.5mdv2009.0.x86_64.rpm
 57d68d64cfcea66c660457d9247df1d3  mes5/x86_64/nvidia96xx-kernel-server-latest-96.43.07-1.20110217.5mdv2009.0.x86_64.rpm
 cb86ee77b7683c1f46a0b390fe7834e6  mes5/x86_64/nvidia-current-kernel-2.6.27.56-desktop-2mnb-177.70-2.3mdv2009.0.x86_64.rpm
 60dc82052cf57a231b4ce15f10434cd1  mes5/x86_64/nvidia-current-kernel-2.6.27.56-server-2mnb-177.70-2.3mdv2009.0.x86_64.rpm
 1ced8cf75b42dd1850a402a0d7cc2627  mes5/x86_64/nvidia-current-kernel-desktop-latest-177.70-1.20110217.2.3mdv2009.0.x86_64.rpm
 c9dd11cd682e1ca0396e9b297e4b3598  mes5/x86_64/nvidia-current-kernel-server-latest-177.70-1.20110217.2.3mdv2009.0.x86_64.rpm
 25f24832a62f7b9a99e5fd70fb70afa9  mes5/x86_64/vpnclient-kernel-2.6.27.56-desktop-2mnb-4.8.01.0640-3mdv2009.0.x86_64.rpm
 4b7efd43a34d1e816cea69b6b43c0686  mes5/x86_64/vpnclient-kernel-2.6.27.56-server-2mnb-4.8.01.0640-3mdv2009.0.x86_64.rpm
 0fb2705351a7a8b5fb2ca6bc285d519f  mes5/x86_64/vpnclient-kernel-desktop-latest-4.8.01.0640-1.20110217.3mdv2009.0.x86_64.rpm
 6a8d3a4242319446040fcb011f81b23a  mes5/x86_64/vpnclient-kernel-server-latest-4.8.01.0640-1.20110217.3mdv2009.0.x86_64.rpm
 a3defefb7cd881e1c1f1cb7effbbe821  mes5/SRPMS/kernel-2.6.27.56-2mnb2.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================