LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: December 22nd, 2014
Linux Advisory Watch: December 19th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandrake: kernel 2.2 and 2.4 Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Mandrake A problem was discovered in the CIPE (VPN tunnel) implementation in the Linux kernel where a malformed packet could cause a crash.


________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           kernel 2.2 and 2.4
Advisory ID:            MDKSA-2002:041
Date:                   July 4th, 2002
Affected versions:      7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1,
                        Single Network Firewall 7.2
________________________________________________________________________

Problem Description:

 A problem was discovered in the CIPE (VPN tunnel) implementation in the
 Linux kernel where a malformed packet could cause a crash.

 Andrew Griffiths discovered a vulnerability that allows remote machines
 to read random memory by utilizing a bug in the ICMP implementation of
 Linux kernels.  This only affects kernels prior to 2.4.0-test6 and
 2.2.18; all Mandrake Linux 2.4 kernels are not vulnerable to this
 problem.

 Another problem was discovered by the Linux Netfilter team in the IRC
 connection tracking component of netfilter in Linux 2.4 kernels.  It
 consists of a very broad netmask setting which is applied to check if
 an IRC DCC connection through a masqueraded firewall should be allowed.
 This would lead to unwanted ports being opened on the firewall which
 could possibly allow inbound connections depending on the firewall
 rules in use.

 The 2.2 and 2.4 kernels are also affected by the zlib double-free()
 problem as routines from the compression library are used by functions
 that uncompress filesystems loaded into ramdisks and other occassions
 that are not security-critical.  The kernel also uses the compression

 library in the PPP layer as well as the freeswan IPSec kernel module.

 As well, a number of other non-security fixes are present in these
 kernels, including new and enhanced drivers, LSB compliance, and more.

 MandrakeSoft encourages all users to upgrade their kernel as soon as
 possible to these new 2.2 and 2.4 kernels.

 NOTE: This update cannot be accomplished via MandrakeUpdate; it must be
 done on the console.  This prevents one from upgrading a kernel instead
 of installing a new kernel.  To upgrade, please ensure that you have
 first upgraded iptables, mkinitrd, and initscripts packages if they are
 applicable to your platform.  Use "rpm -ivh kernel_package" to install
 the new kernel.  Prior to rebooting, double-check your /etc/lilo.conf,
 /boot/grub/menu.lst, or /etc/yaboot.conf (PPC users only) to ensure
 that you are able to boot properly into both old and new kernels (this
 will allow you to boot into the old kernel if the new kernel does not
 work to your liking).

 LILO users should execute "/sbin/lilo -v", GRUB users should execute
 "sh /boot/grun/install.sh", and PPC users must type "/sbin/ybin -v" to
 write the boot record in order to reboot into the new kernel if you
 made any changes to the respective boot configuration files.

 New kernels for Mandrake Linux 8.1/IA64 will be available shortly.
________________________________________________________________________

References:

________________________________________________________________________

Updated Packages:

 Linux-Mandrake 7.1:
 89a74479d4a0a685f88b5b49dd51b741  7.1/RPMS/alsa-2.2.19_0.5.10b-6.4mdk.i586.rpm
 1a212b6a82a3d69e89b9c04beba8c378  7.1/RPMS/alsa-source-2.2.19_0.5.10b-6.4mdk.i586.rpm
 6df92e7ba462cb3d7b18047b800b7b92  7.1/RPMS/kernel-2.2.19-6.4mdk.i586.rpm
 1b9e5b47ff585c2400db9d4a36369242  7.1/RPMS/kernel-doc-2.2.19-6.4mdk.i586.rpm
 388da5e5ab45099131ee2be2d1400700  7.1/RPMS/kernel-headers-2.2.19-6.4mdk.i586.rpm
 a2955bcbf45d9398dde4663dcb082154  7.1/RPMS/kernel-pcmcia-cs-2.2.19-6.4mdk.i586.rpm
 b12e2f865349de601f3e2504c96ca696  7.1/RPMS/kernel-secure-2.2.19-6.4mdk.i586.rpm
 5f97b418b9493e1d06bc4850ed2f0d29  7.1/RPMS/kernel-smp-2.2.19-6.4mdk.i586.rpm
 705081b8274b2975e863057b7dabf785  7.1/RPMS/kernel-source-2.2.19-6.4mdk.i586.rpm
 b1346849b552e0ea0ed7506f6feb7e71  7.1/RPMS/kernel-utils-2.2.19-6.4mdk.i586.rpm
 c528ec474457a7a25ded1bf1c2ada7eb  7.1/RPMS/reiserfs-utils-2.2.19_3.5.29-6.4mdk.i586.rpm
 53ed02aabbbc6b39499e9916722ee3b4  7.1/SRPMS/kernel-2.2.19-6.4mdk.src.rpm

 Linux-Mandrake 7.2:
 3e82e3f62ec09628c8cbfcd14144df3f  7.2/RPMS/alsa-2.2.19_0.5.10b-6.4mdk.i586.rpm
 aa2e6331cab7608c2c53f35e727e49e0  7.2/RPMS/alsa-source-2.2.19_0.5.10b-6.4mdk.i586.rpm
 188d0fbedf71b069cb00d6b43dabece8  7.2/RPMS/kernel-2.2.19-6.4mdk.i586.rpm
 78e13bab41130b6a1f07831dc9dd89b7  7.2/RPMS/kernel-doc-2.2.19-6.4mdk.i586.rpm
 37299985c82a109f23ef9243a0297351  7.2/RPMS/kernel-headers-2.2.19-6.4mdk.i586.rpm
 ab7069405fe8b1bd613621ffb82e89bc  7.2/RPMS/kernel-pcmcia-cs-2.2.19-6.4mdk.i586.rpm
 a0f63847e48c8947b06459b8a7f83224  7.2/RPMS/kernel-secure-2.2.19-6.4mdk.i586.rpm
 1fd0b4d6bf8b7a6113eeb0ff85915ac7  7.2/RPMS/kernel-smp-2.2.19-6.4mdk.i586.rpm
 1732e14ced4ec669a0e939afe024382c  7.2/RPMS/kernel-source-2.2.19-6.4mdk.i586.rpm
 c70835ae90d4fce0f8111f5d29be1cf3  7.2/RPMS/kernel-utils-2.2.19-6.4mdk.i586.rpm
 5931d3bda493d937b26a5ad83b0263d6  7.2/RPMS/reiserfs-utils-2.2.19_3.5.29-6.4mdk.i586.rpm
 53ed02aabbbc6b39499e9916722ee3b4  7.2/SRPMS/kernel-2.2.19-6.4mdk.src.rpm

 Mandrake Linux 8.0:
 6a8e28c0d1c8d2b3ce3e26a304b3f146  8.0/RPMS/initscripts-5.83-7.1mdk.i586.rpm
 15a22adbed6ba7939acce1129fc08c63  8.0/RPMS/iptables-1.2.5-1.1mdk.i586.rpm
 18d0f2803934688bdb00c3833daceb00  8.0/RPMS/iptables-ipv6-1.2.5-1.1mdk.i586.rpm
 280ff798cc5215a8e5d0ba600e56735c  8.0/RPMS/kernel-2.4.18.8.2mdk-1-3mdk.i586.rpm
 c5e21fba0203a05179b8c4bd7eddb0d6  8.0/RPMS/kernel-2.4.18.8.2mdk-pcmcia-cs-1-3mdk.i586.rpm
 4aff00e0df570a380be6b8f5c0803a3c  8.0/RPMS/kernel-BOOT-2.4.18.8.2mdk-1-3mdk.i586.rpm
 074a3539369e8a3324fd3881b8b7811e  8.0/RPMS/kernel-doc-2.4.18-8.2mdk.i586.rpm
 b8a3586edf1003e150848203e676ee2f  8.0/RPMS/kernel-doc-html-2.4.18-8.2mdk.i586.rpm
 df5af818d1ee2c765061bd43869d3e5a  8.0/RPMS/kernel-doc-pdf-2.4.18-8.2mdk.i586.rpm
 9a33086e43750f0f687f97130f9fa590  8.0/RPMS/kernel-doc-ps-2.4.18-8.2mdk.i586.rpm
 76a496110a624afac0ffe2fdaaa89e47  8.0/RPMS/kernel-enterprise-2.4.18.8.2mdk-1-3mdk.i586.rpm
 1b827d3e66e19d30629923cf0365a37b  8.0/RPMS/kernel-secure-2.4.18.8.2mdk-1-3mdk.i586.rpm
 b958d00f0d3bb37228328a838133f76a  8.0/RPMS/kernel-smp-2.4.18.8.2mdk-1-3mdk.i586.rpm
 0092267146ac3a774a77bb85d8c40109  8.0/RPMS/kernel-source-2.4.18-8.2mdk.i586.rpm
 0a18529d9bbb8f4f8dd7210f7878cc15  8.0/RPMS/kernel22-2.2.20-9.2mdk.i586.rpm
 a47458e6cdc0bc3741714c70f393cb35  8.0/RPMS/kernel22-smp-2.2.20-9.2mdk.i586.rpm
 e76c465f909695ddf0221e8100dde47a  8.0/RPMS/kernel22-source-2.2.20-9.2mdk.i586.rpm
 795dbae0b1befb5e5ea040c465b94a31  8.0/RPMS/mkinitrd-3.1.6-28.1mdk.i586.rpm
 4deb9724b61a696185ae7153d71aad40  8.0/SRPMS/initscripts-5.83-7.1mdk.src.rpm
 7ac99ba7e3baf59966a22d3bad5a860a  8.0/SRPMS/iptables-1.2.5-1.1mdk.src.rpm
 cbac2540c632f2c03b9b82f187086614  8.0/SRPMS/kernel-2.4.18.8.2mdk-1-3mdk.src.rpm
 8b3994c11c9c024744c319ad621a4b13  8.0/SRPMS/kernel22-2.2.20-9.2mdk.src.rpm
 441cb1f8eaefc707ad1ba47da5224de7  8.0/SRPMS/mkinitrd-3.1.6-28.1mdk.src.rpm

 Mandrake Linux 8.0/ppc:
 f6290470bdff3220ecc3ede9ba21b147  ppc/8.0/RPMS/initscripts-5.83-7.1mdk.ppc.rpm
 1eed80705d99d242d47f75878822c690  ppc/8.0/RPMS/iptables-1.2.5-1.1mdk.ppc.rpm
 7ba74fffc19c7d7587f5d9efcb99357e  ppc/8.0/RPMS/iptables-ipv6-1.2.5-1.1mdk.ppc.rpm
 50b3fe21d25c8842819f7dba157c6681  ppc/8.0/RPMS/kernel-2.4.18.8.2mdk-1-3mdk.ppc.rpm
 aae89320d2d41b2caf1e6c7b9ef8d756  ppc/8.0/RPMS/kernel-2.4.18.8.2mdk-pcmcia-cs-1-3mdk.ppc.rpm
 cee26bdf384252b87c10baf9f273bdfa  ppc/8.0/RPMS/kernel-doc-2.4.18-8.2mdk.ppc.rpm
 8f2417c851137bfe3ffb89e328709cac  ppc/8.0/RPMS/kernel-doc-html-2.4.18-8.2mdk.ppc.rpm
 542e188fb022174c9fb3bfb7fac263c8  ppc/8.0/RPMS/kernel-doc-pdf-2.4.18-8.2mdk.ppc.rpm
 6a2bf33e2e1448c1fa711dfcaaaec59f  ppc/8.0/RPMS/kernel-doc-ps-2.4.18-8.2mdk.ppc.rpm
 b905355774f5449e1e9ccd33ee4bda4d  ppc/8.0/RPMS/kernel-enterprise-2.4.18.8.2mdk-1-3mdk.ppc.rpm
 f116d2c4fdbca61e387a2f5af4cd9e70  ppc/8.0/RPMS/kernel-smp-2.4.18.8.2mdk-1-3mdk.ppc.rpm
 dd070919e6b9a1c6b32dcdc63cdf193c  ppc/8.0/RPMS/kernel-source-2.4.18-8.2mdk.ppc.rpm
 8540df4b8fd1410132e55a88b709a388  ppc/8.0/RPMS/kernel22-2.2.20-9.2mdk.ppc.rpm
 2ed0bb03780967c0a954f3945e155ff5  ppc/8.0/RPMS/kernel22-smp-2.2.20-9.2mdk.ppc.rpm
 9a64bcbcc95395dd17907102c9da44e8  ppc/8.0/RPMS/kernel22-source-2.2.20-9.2mdk.ppc.rpm
 b3d983312e9f964ef765e007451131a6  ppc/8.0/RPMS/mkinitrd-3.1.6-28.1mdk.ppc.rpm
 4deb9724b61a696185ae7153d71aad40  ppc/8.0/SRPMS/initscripts-5.83-7.1mdk.src.rpm
 7ac99ba7e3baf59966a22d3bad5a860a  ppc/8.0/SRPMS/iptables-1.2.5-1.1mdk.src.rpm
 cbac2540c632f2c03b9b82f187086614  ppc/8.0/SRPMS/kernel-2.4.18.8.2mdk-1-3mdk.src.rpm
 8b3994c11c9c024744c319ad621a4b13  ppc/8.0/SRPMS/kernel22-2.2.20-9.2mdk.src.rpm
 441cb1f8eaefc707ad1ba47da5224de7  ppc/8.0/SRPMS/mkinitrd-3.1.6-28.1mdk.src.rpm

 Mandrake Linux 8.1:
 05c5b96aafcf2fd0d4dabbaed8e5bb72  8.1/RPMS/iptables-1.2.5-1.1mdk.i586.rpm
 e51e1c114518bf35db324a80b52f6f80  8.1/RPMS/iptables-ipv6-1.2.5-1.1mdk.i586.rpm
 ff744515582a1c4aaf086db157c4206f  8.1/RPMS/kernel-2.4.18.8.2mdk-1-3mdk.i586.rpm
 134c6b5b65568b932d76c1fabd3deffc  8.1/RPMS/kernel-2.4.18.8.2mdk-pcmcia-cs-1-3mdk.i586.rpm
 d13a440bf10b438a3af314b60d7a865c  8.1/RPMS/kernel-doc-2.4.18-8.2mdk.i586.rpm
 309676e8e0d8df03d05ca7d5ec8619ec  8.1/RPMS/kernel-doc-html-2.4.18-8.2mdk.i586.rpm
 5f51054a2e39beab7bb8e04992f65458  8.1/RPMS/kernel-doc-pdf-2.4.18-8.2mdk.i586.rpm
 c6a78308ecd332a7e7134e41761a35ba  8.1/RPMS/kernel-doc-ps-2.4.18-8.2mdk.i586.rpm
 81886f368c2d1b7fc7fe1b1494bd55eb  8.1/RPMS/kernel-enterprise-2.4.18.8.2mdk-1-3mdk.i586.rpm
 65a86c68e312349b7525f15eba9648d2  8.1/RPMS/kernel-secure-2.4.18.8.2mdk-1-3mdk.i586.rpm
 cf0f8237835f21ee9ff611966094296e  8.1/RPMS/kernel-smp-2.4.18.8.2mdk-1-3mdk.i586.rpm
 bd8ba58d623f1467a41f764e20378dc3  8.1/RPMS/kernel-source-2.4.18-8.2mdk.i586.rpm
 54dbc921dfd376e073f2fa4cbdd99f43  8.1/RPMS/kernel22-2.2.20-9.2mdk.i586.rpm
 0a1abeec31a25fe2120d9968c8ef0d90  8.1/RPMS/kernel22-smp-2.2.20-9.2mdk.i586.rpm
 f0e89d7e072078d2435d6957908ef1f5  8.1/RPMS/kernel22-source-2.2.20-9.2mdk.i586.rpm
 10f7e9c656fb926439addbb1705aa77a  8.1/RPMS/mkinitrd-3.1.6-28.1mdk.i586.rpm
 7ac99ba7e3baf59966a22d3bad5a860a  8.1/SRPMS/iptables-1.2.5-1.1mdk.src.rpm
 cbac2540c632f2c03b9b82f187086614  8.1/SRPMS/kernel-2.4.18.8.2mdk-1-3mdk.src.rpm
 8b3994c11c9c024744c319ad621a4b13  8.1/SRPMS/kernel22-2.2.20-9.2mdk.src.rpm
 441cb1f8eaefc707ad1ba47da5224de7  8.1/SRPMS/mkinitrd-3.1.6-28.1mdk.src.rpm

 Mandrake Linux 8.2:
 a784430846ca56b52151b64f74744528  8.2/RPMS/devfsd-1.3.25-1.1mdk.i586.rpm
 32969698f7badf0c3bc7fa3e4f278977  8.2/RPMS/kernel-2.4.18.8.1mdk-1-3mdk.i586.rpm
 8780d75e33c52ddc0fee1c84fcab35b3  8.2/RPMS/kernel-BOOT-2.4.18.8.1mdk-1-3mdk.i586.rpm
 09998125ec43033ec81857713a0c8426  8.2/RPMS/kernel-doc-2.4.18-8.1mdk.i586.rpm
 885b857618b0aa899b6d0a4fe6f0b111  8.2/RPMS/kernel-doc-html-2.4.18-8.1mdk.i586.rpm
 4129c6390bf04f90e910904748dc53ea  8.2/RPMS/kernel-doc-pdf-2.4.18-8.1mdk.i586.rpm
 a7a833d162893b3afe5e082a9bcbffe5  8.2/RPMS/kernel-doc-ps-2.4.18-8.1mdk.i586.rpm
 a1ba4d745bf80add95b73006634fcbc6  8.2/RPMS/kernel-enterprise-2.4.18.8.1mdk-1-3mdk.i586.rpm
 cf7a7343bff1a12796d68fe7b12c5403  8.2/RPMS/kernel-secure-2.4.18.8.1mdk-1-3mdk.i586.rpm
 215e844621ba72e68b73756d1fad4ff3  8.2/RPMS/kernel-smp-2.4.18.8.1mdk-1-3mdk.i586.rpm
 b40235a56e88bef36e827fd3baec374c  8.2/RPMS/kernel-source-2.4.18-8.1mdk.i586.rpm
 d19ee6183a1fad278df1990b8c23e9bb  8.2/RPMS/kernel22-2.2.20-9.1mdk.i586.rpm
 5bd5d0df44876a9252869ce39a63a675  8.2/RPMS/kernel22-smp-2.2.20-9.1mdk.i586.rpm
 6f34d89907d78997c2cd55a31ed4e86e  8.2/RPMS/kernel22-source-2.2.20-9.1mdk.i586.rpm
 6abfb4e1be1194616f267eb624065491  8.2/SRPMS/devfsd-1.3.25-1.1mdk.src.rpm
 883ac7630080a1120323adabf2f80113  8.2/SRPMS/kernel-2.4.18.8.1mdk-1-3mdk.src.rpm
 5583ac07de85a815e9947304c32fa1c1  8.2/SRPMS/kernel22-2.2.20-9.1mdk.src.rpm

 Mandrake Linux 8.2/ppc:
 3e845487107a567eef546362d274acc4  ppc/8.2/RPMS/kernel-2.4.18.8.1mdk-1-3mdk.ppc.rpm
 5c5d749e10f85c2759e4726f1bef988b  ppc/8.2/RPMS/kernel-doc-2.4.18-8.1mdk.ppc.rpm
 f30e3ae0f42e9ac4936f8e4aaf3c7255  ppc/8.2/RPMS/kernel-doc-html-2.4.18-8.1mdk.ppc.rpm
 abc3f86f3c264bf4e329bba78a7f0b35  ppc/8.2/RPMS/kernel-doc-pdf-2.4.18-8.1mdk.ppc.rpm
 09c27bae3001380592e5a30b64b3a7b3  ppc/8.2/RPMS/kernel-doc-ps-2.4.18-8.1mdk.ppc.rpm
 86f8dccb5db21ba9161e23a65a580186  ppc/8.2/RPMS/kernel-enterprise-2.4.18.8.1mdk-1-3mdk.ppc.rpm
 ec7f88601b5d1de1d56b6e52c7f75b8b  ppc/8.2/RPMS/kernel-smp-2.4.18.8.1mdk-1-3mdk.ppc.rpm
 4c57b54857d78250c12b0c4f886bbc8b  ppc/8.2/RPMS/kernel-source-2.4.18-8.1mdk.ppc.rpm
 2ba95aa5905599843be289616f57610f  ppc/8.2/RPMS/kernel22-2.2.20-9.1mdk.ppc.rpm
 85b9d2407847420d73fe3b5220c575b3  ppc/8.2/RPMS/kernel22-smp-2.2.20-9.1mdk.ppc.rpm
 38f6a6bed062f20afadf6fd485633b29  ppc/8.2/RPMS/kernel22-source-2.2.20-9.1mdk.ppc.rpm
 883ac7630080a1120323adabf2f80113  ppc/8.2/SRPMS/kernel-2.4.18.8.1mdk-1-3mdk.src.rpm
 5583ac07de85a815e9947304c32fa1c1  ppc/8.2/SRPMS/kernel22-2.2.20-9.1mdk.src.rpm

 Corporate Server 1.0.1:
 89a74479d4a0a685f88b5b49dd51b741  1.0.1/RPMS/alsa-2.2.19_0.5.10b-6.4mdk.i586.rpm
 1a212b6a82a3d69e89b9c04beba8c378  1.0.1/RPMS/alsa-source-2.2.19_0.5.10b-6.4mdk.i586.rpm
 6df92e7ba462cb3d7b18047b800b7b92  1.0.1/RPMS/kernel-2.2.19-6.4mdk.i586.rpm
 1b9e5b47ff585c2400db9d4a36369242  1.0.1/RPMS/kernel-doc-2.2.19-6.4mdk.i586.rpm
 388da5e5ab45099131ee2be2d1400700  1.0.1/RPMS/kernel-headers-2.2.19-6.4mdk.i586.rpm
 a2955bcbf45d9398dde4663dcb082154  1.0.1/RPMS/kernel-pcmcia-cs-2.2.19-6.4mdk.i586.rpm
 b12e2f865349de601f3e2504c96ca696  1.0.1/RPMS/kernel-secure-2.2.19-6.4mdk.i586.rpm
 5f97b418b9493e1d06bc4850ed2f0d29  1.0.1/RPMS/kernel-smp-2.2.19-6.4mdk.i586.rpm
 705081b8274b2975e863057b7dabf785  1.0.1/RPMS/kernel-source-2.2.19-6.4mdk.i586.rpm
 b1346849b552e0ea0ed7506f6feb7e71  1.0.1/RPMS/kernel-utils-2.2.19-6.4mdk.i586.rpm
 c528ec474457a7a25ded1bf1c2ada7eb  1.0.1/RPMS/reiserfs-utils-2.2.19_3.5.29-6.4mdk.i586.rpm
 53ed02aabbbc6b39499e9916722ee3b4  1.0.1/SRPMS/kernel-2.2.19-6.4mdk.src.rpm

 Single Network Firewall 7.2:
 188d0fbedf71b069cb00d6b43dabece8  snf7.2/RPMS/kernel-2.2.19-6.4mdk.i586.rpm
 78e13bab41130b6a1f07831dc9dd89b7  snf7.2/RPMS/kernel-doc-2.2.19-6.4mdk.i586.rpm
 37299985c82a109f23ef9243a0297351  snf7.2/RPMS/kernel-headers-2.2.19-6.4mdk.i586.rpm
 ab7069405fe8b1bd613621ffb82e89bc  snf7.2/RPMS/kernel-pcmcia-cs-2.2.19-6.4mdk.i586.rpm
 a0f63847e48c8947b06459b8a7f83224  snf7.2/RPMS/kernel-secure-2.2.19-6.4mdk.i586.rpm
 1fd0b4d6bf8b7a6113eeb0ff85915ac7  snf7.2/RPMS/kernel-smp-2.2.19-6.4mdk.i586.rpm
 1732e14ced4ec669a0e939afe024382c  snf7.2/RPMS/kernel-source-2.2.19-6.4mdk.i586.rpm
 c70835ae90d4fce0f8111f5d29be1cf3  snf7.2/RPMS/kernel-utils-2.2.19-6.4mdk.i586.rpm
 5931d3bda493d937b26a5ad83b0263d6  snf7.2/RPMS/reiserfs-utils-2.2.19_3.5.29-6.4mdk.i586.rpm
 53ed02aabbbc6b39499e9916722ee3b4  snf7.2/SRPMS/kernel-2.2.19-6.4mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one 
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

   http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig 

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to 
update.

You can view other update advisories for Mandrake Linux at:

   http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by
visiting:

   http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com
________________________________________________________________________

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security@linux-mandrake.com>


 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.