ID CVE-2005-1767 Type cve Reporter NVD Modified 2017-10-10T21:30:10
Description
traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).
{"osvdb": [{"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "description": "## Vulnerability Description\nLinux contains a flaw related to the kernel that may allow an attacker to cause a stack fault exception, resulting in a local denial of service. No further details have been provided.\n## Solution Description\nUpgrade to kernel version 2.4.21-297 (i586) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nLinux contains a flaw related to the kernel that may allow an attacker to cause a stack fault exception, resulting in a local denial of service. No further details have been provided.\n## References:\nVendor URL: http://www.kernel.org/\n[Vendor Specific Advisory URL](http://www.novell.com/linux/security/advisories/2005_44_kernel.html)\n[Vendor Specific Advisory URL](http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044)\nSecurity Tracker: 1014623\n[Secunia Advisory ID:16321](https://secuniaresearch.flexerasoftware.com/advisories/16321/)\n[Secunia Advisory ID:17002](https://secuniaresearch.flexerasoftware.com/advisories/17002/)\n[Secunia Advisory ID:16927](https://secuniaresearch.flexerasoftware.com/advisories/16927/)\n[Secunia Advisory ID:18059](https://secuniaresearch.flexerasoftware.com/advisories/18059/)\n[Secunia Advisory ID:18977](https://secuniaresearch.flexerasoftware.com/advisories/18977/)\n[Secunia Advisory ID:18056](https://secuniaresearch.flexerasoftware.com/advisories/18056/)\nRedHat RHSA: RHSA-2005:663\nOther Advisory URL: http://www.ubuntu.com/usn/usn-187-1\nOther Advisory URL: http://www.debian.org/security/2005/dsa-921\nOther Advisory URL: http://www.debian.org/security/2005/dsa-922\n[Nessus Plugin ID:19382](https://vulners.com/search?query=pluginID:19382)\n[CVE-2005-1767](https://vulners.com/cve/CVE-2005-1767)\nBugtraq ID: 14467\n", "modified": "2005-08-04T22:59:52", "published": "2005-08-04T22:59:52", "href": "https://vulners.com/osvdb/OSVDB:18702", "id": "OSVDB:18702", "type": "osvdb", "title": "SuSE Linux Kernel Unspecified Stack Fault Exception Local DoS", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2018-08-31T00:09:58", "bulletinFamily": "unix", "description": "A Denial of Service vulnerability was detected in the stack segment fault handler. A local attacker could exploit this by causing stack fault exceptions under special circumstances (scheduling), which lead to a kernel crash. (CAN-2005-1767)\n\nVasiliy Averin discovered a Denial of Service vulnerability in the \u201ctiocgdev\u201d ioctl call and in the \u201crouting_ioctl\u201d function. By calling fget() and fput() in special ways, a local attacker could exploit this to destroy file descriptor structures and crash the kernel. (CAN-2005-3044)", "modified": "2005-09-25T00:00:00", "published": "2005-09-25T00:00:00", "id": "USN-187-1", "href": "https://usn.ubuntu.com/187-1/", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "nessus": [{"lastseen": "2019-01-16T20:06:29", "bulletinFamily": "scanner", "description": "A Denial of Service vulnerability was detected in the stack segment\nfault handler. A local attacker could exploit this by causing stack\nfault exceptions under special circumstances (scheduling), which lead\nto a kernel crash. (CAN-2005-1767)\n\nVasiliy Averin discovered a Denial of Service vulnerability in the\n'tiocgdev' ioctl call and in the 'routing_ioctl' function. By calling\nfget() and fput() in special ways, a local attacker could exploit this\nto destroy file descriptor structures and crash the kernel.\n(CAN-2005-3044).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2018-08-15T00:00:00", "published": "2006-01-15T00:00:00", "id": "UBUNTU_USN-187-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=20599", "title": "Ubuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-187-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-187-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20599);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2018/08/15 16:35:43\");\n\n script_cve_id(\"CVE-2005-1767\", \"CVE-2005-3044\");\n script_xref(name:\"USN\", value:\"187-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-187-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A Denial of Service vulnerability was detected in the stack segment\nfault handler. A local attacker could exploit this by causing stack\nfault exceptions under special circumstances (scheduling), which lead\nto a kernel crash. (CAN-2005-1767)\n\nVasiliy Averin discovered a Denial of Service vulnerability in the\n'tiocgdev' ioctl call and in the 'routing_ioctl' function. By calling\nfget() and fput() in special ways, a local attacker could exploit this\nto destroy file descriptor structures and crash the kernel.\n(CAN-2005-3044).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/08/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2018 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-doc-2.6.8.1\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-386\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-686\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-686-smp\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-generic\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-k8\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-k8-smp\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-xeon\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-386\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-686\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-686-smp\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-generic\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-k8\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-k8-smp\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-xeon\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-patch-debian-2.6.8.1\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-source-2.6.8.1\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-tree-2.6.8.1\", pkgver:\"2.6.8.1-16.23\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-doc-2.6.10\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-386\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-686\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-686-smp\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-generic\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-k8\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-k8-smp\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-xeon\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-386\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-686\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-686-smp\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-generic\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-k8\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-k8-smp\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-xeon\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-patch-ubuntu-2.6.10\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-source-2.6.10\", pkgver:\"2.6.10-34.6\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-tree-2.6.10\", pkgver:\"2.6.10-34.6\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.10 / linux-doc-2.6.8.1 / linux-headers-2.6 / etc\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:06:56", "bulletinFamily": "scanner", "description": "Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2005-0756\n Alexander Nyberg discovered that the ptrace() system\n call does not properly verify addresses on the amd64\n architecture which can be exploited by a local attacker\n to crash the kernel.\n\n - CVE-2005-0757\n A problem in the offset handling in the xattr file\n system code for ext3 has been discovered that may allow\n users on 64-bit systems that have access to an ext3\n filesystem with extended attributes to cause the kernel\n to crash.\n\n - CVE-2005-1762\n A vulnerability has been discovered in the ptrace()\n system call on the amd64 architecture that allows a\n local attacker to cause the kernel to crash.\n\n - CVE-2005-1767\n A vulnerability has been discovered in the stack segment\n fault handler that could allow a local attacker to cause\n a stack exception that will lead the kernel to crash\n under certain circumstances.\n\n - CVE-2005-1768\n Ilja van Sprundel discovered a race condition in the\n IA32 (x86) compatibility execve() systemcall for amd64\n and IA64 that allows local attackers to cause the kernel\n to panic and possibly execute arbitrary code.\n\n - CVE-2005-2456\n Balazs Scheidler discovered that a local attacker could\n call setsockopt() with an invalid xfrm_user policy\n message which would cause the kernel to write beyond the\n boundaries of an array and crash.\n\n - CVE-2005-2458\n Vladimir Volovich discovered a bug in the zlib routines\n which are also present in the Linux kernel and allows\n remote attackers to crash the kernel.\n\n - CVE-2005-2459\n Another vulnerability has been discovered in the zlib\n routines which are also present in the Linux kernel and\n allows remote attackers to crash the kernel.\n\n - CVE-2005-2553\n A NULL pointer dereference in ptrace when tracing a\n 64-bit executable can cause the kernel to crash.\n\n - CVE-2005-2801\n Andreas Gruenbacher discovered a bug in the ext2 and\n ext3 file systems. When data areas are to be shared\n among two inodes not all information were compared for\n equality, which could expose wrong ACLs for files.\n\n - CVE-2005-2872\n Chad Walstrom discovered that the ipt_recent kernel\n module to stop SSH bruteforce attacks could cause the\n kernel to crash on 64-bit architectures.\n\n - CVE-2005-3275\n An error in the NAT code allows remote attackers to\n cause a denial of service (memory corruption) by causing\n two packets for the same protocol to be NATed at the\n same time, which leads to memory corruption.", "modified": "2018-07-20T00:00:00", "published": "2006-10-14T00:00:00", "id": "DEBIAN_DSA-921.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=22787", "title": "Debian DSA-921-1 : kernel-source-2.4.27 - several vulnerabilities", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-921. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(22787);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2018/07/20 2:17:12\");\n\n script_cve_id(\"CVE-2005-0756\", \"CVE-2005-0757\", \"CVE-2005-1762\", \"CVE-2005-1767\", \"CVE-2005-1768\", \"CVE-2005-2456\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2553\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3275\");\n script_bugtraq_id(14477);\n script_xref(name:\"DSA\", value:\"921\");\n\n script_name(english:\"Debian DSA-921-1 : kernel-source-2.4.27 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2005-0756\n Alexander Nyberg discovered that the ptrace() system\n call does not properly verify addresses on the amd64\n architecture which can be exploited by a local attacker\n to crash the kernel.\n\n - CVE-2005-0757\n A problem in the offset handling in the xattr file\n system code for ext3 has been discovered that may allow\n users on 64-bit systems that have access to an ext3\n filesystem with extended attributes to cause the kernel\n to crash.\n\n - CVE-2005-1762\n A vulnerability has been discovered in the ptrace()\n system call on the amd64 architecture that allows a\n local attacker to cause the kernel to crash.\n\n - CVE-2005-1767\n A vulnerability has been discovered in the stack segment\n fault handler that could allow a local attacker to cause\n a stack exception that will lead the kernel to crash\n under certain circumstances.\n\n - CVE-2005-1768\n Ilja van Sprundel discovered a race condition in the\n IA32 (x86) compatibility execve() systemcall for amd64\n and IA64 that allows local attackers to cause the kernel\n to panic and possibly execute arbitrary code.\n\n - CVE-2005-2456\n Balazs Scheidler discovered that a local attacker could\n call setsockopt() with an invalid xfrm_user policy\n message which would cause the kernel to write beyond the\n boundaries of an array and crash.\n\n - CVE-2005-2458\n Vladimir Volovich discovered a bug in the zlib routines\n which are also present in the Linux kernel and allows\n remote attackers to crash the kernel.\n\n - CVE-2005-2459\n Another vulnerability has been discovered in the zlib\n routines which are also present in the Linux kernel and\n allows remote attackers to crash the kernel.\n\n - CVE-2005-2553\n A NULL pointer dereference in ptrace when tracing a\n 64-bit executable can cause the kernel to crash.\n\n - CVE-2005-2801\n Andreas Gruenbacher discovered a bug in the ext2 and\n ext3 file systems. When data areas are to be shared\n among two inodes not all information were compared for\n equality, which could expose wrong ACLs for files.\n\n - CVE-2005-2872\n Chad Walstrom discovered that the ipt_recent kernel\n module to stop SSH bruteforce attacks could cause the\n kernel to crash on 64-bit architectures.\n\n - CVE-2005-3275\n An error in the NAT code allows remote attackers to\n cause a denial of service (memory corruption) by causing\n two packets for the same protocol to be NATed at the\n same time, which leads to memory corruption.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=311164\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-921\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package immediately and reboot the machine.\n\nThe following matrix explains which kernel version for which\narchitecture fix the problems mentioned above :\n\n Debian 3.1 (sarge) \n Source 2.4.27-10sarge1 \n Alpha architecture 2.4.27-10sarge1 \n ARM architecture 2.4.27-2sarge1 \n Intel IA-32 architecture 2.4.27-10sarge1 \n Intel IA-64 architecture 2.4.27-10sarge1 \n Motorola 680x0 architecture 2.4.27-3sarge1 \n Big endian MIPS architecture 2.4.27-10.sarge1.040815-1 \n Little endian MIPS architecture 2.4.27-10.sarge1.040815-1 \n PowerPC architecture 2.4.27-10sarge1 \n IBM S/390 architecture 2.4.27-2sarge1 \n Sun Sparc architecture 2.4.27-9sarge1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.4.27\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/01/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-2\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-apus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-nubus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.4.27\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-generic\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-itanium\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-itanium-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-mckinley\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-mckinley-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc32\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc32-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc64\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc64-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-apus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-nubus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-powerpc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-generic\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-itanium\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-itanium-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-mckinley\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-mckinley-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390-tape\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390x\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc32\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc32-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc64\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc64-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-amiga\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-apus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-atari\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bast\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bvme6000\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-lart\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mac\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme147\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme16x\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-netwinder\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-nubus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-q40\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r3k-kn02\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-ip22\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-kn04\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-cobalt\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-ip22\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-lasat\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscpc\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscstation\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-sb1-swarm-bn\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-xxs1500\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-apus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-arm\", reference:\"2.4.27-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-nubus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-powerpc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.4.27\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.4.27\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.4.27\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mips-tools\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:06:20", "bulletinFamily": "scanner", "description": "Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 3. This is the\nsixth regular update.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the sixth regular kernel update to Red Hat Enterprise Linux 3.\n\nNew features introduced by this update include :\n\n - diskdump support on HP Smart Array devices -\n netconsole/netdump support over bonded interfaces - new\n chipset and device support via PCI table updates -\n support for new 'oom-kill' and 'kscand_work_percent'\n sysctls - support for dual core processors and ACPI\n Power Management timers on AMD64 and Intel EM64T systems\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated\nbelow). Other key areas affected by fixes in this update include\nkswapd, inode handling, the SATA subsystem, diskdump handling,\nptrace() syscall support, and signal handling.\n\nThe following device drivers have been upgraded to new versions :\n\n3w-9xxx ---- 2.24.03.008RH cciss ------ 2.4.58.RH1 e100 -------\n3.4.8-k2 e1000 ------ 6.0.54-k2 emulex ----- 7.3.2 fusion -----\n2.06.16i.01 iscsi ------ 3.6.2.1 ipmi ------- 35.4 lpfcdfc ---- 1.2.1\nqlogic ----- 7.05.00-RH1 tg3 -------- 3.27RH\n\nThe following security bugs were fixed in this update :\n\n - a flaw in syscall argument checking on Itanium systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-0136)\n\n - a flaw in stack expansion that allowed a local user of\n mlockall() to cause a denial of service (memory\n exhaustion) (CVE-2005-0179)\n\n - a small memory leak in network packet defragmenting that\n allowed a remote user to cause a denial of service\n (memory exhaustion) on systems using netfilter\n (CVE-2005-0210)\n\n - flaws in ptrace() syscall handling on AMD64 and Intel\n EM64T systems that allowed a local user to cause a\n denial of service (crash) (CVE-2005-0756, CVE-2005-1762,\n CVE-2005-2553)\n\n - flaws in ISO-9660 file system handling that allowed the\n mounting of an invalid image on a CD-ROM to cause a\n denial of service (crash) or potentially execute\n arbitrary code (CVE-2005-0815)\n\n - a flaw in ptrace() syscall handling on Itanium systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-1761)\n\n - a flaw in the alternate stack switching on AMD64 and\n Intel EM64T systems that allowed a local user to cause a\n denial of service (crash) (CVE-2005-1767)\n\n - race conditions in the ia32-compat support for exec()\n syscalls on AMD64, Intel EM64T, and Itanium systems that\n could allow a local user to cause a denial of service\n (crash) (CVE-2005-1768)\n\n - flaws in IPSEC network handling that allowed a local\n user to cause a denial of service or potentially gain\n privileges (CVE-2005-2456, CVE-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2490)\n\n - flaws in unsupported modules that allowed\n denial-of-service attacks (crashes) or local privilege\n escalations on systems using the drm, coda, or moxa\n modules (CVE-2004-1056, CVE-2005-0124, CVE-2005-0504)\n\n - potential leaks of kernel data from jfs and ext2 file\n system handling (CVE-2004-0181, CVE-2005-0400)\n\nNote: The kernel-unsupported package contains various drivers and\nmodules that are unsupported and therefore might contain security\nproblems that have not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "modified": "2018-11-15T00:00:00", "published": "2005-10-05T00:00:00", "id": "REDHAT-RHSA-2005-663.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=19832", "title": "RHEL 3 : kernel (RHSA-2005:663)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:663. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19832);\n script_version (\"1.21\");\n script_cvs_date(\"Date: 2018/11/15 11:40:30\");\n\n script_cve_id(\"CVE-2004-0181\", \"CVE-2004-1056\", \"CVE-2005-0124\", \"CVE-2005-0136\", \"CVE-2005-0179\", \"CVE-2005-0210\", \"CVE-2005-0400\", \"CVE-2005-0504\", \"CVE-2005-0756\", \"CVE-2005-0815\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1767\", \"CVE-2005-1768\", \"CVE-2005-2456\", \"CVE-2005-2490\", \"CVE-2005-2553\", \"CVE-2005-2555\", \"CVE-2005-3273\", \"CVE-2005-3274\");\n script_xref(name:\"RHSA\", value:\"2005:663\");\n\n script_name(english:\"RHEL 3 : kernel (RHSA-2005:663)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 3. This is the\nsixth regular update.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the sixth regular kernel update to Red Hat Enterprise Linux 3.\n\nNew features introduced by this update include :\n\n - diskdump support on HP Smart Array devices -\n netconsole/netdump support over bonded interfaces - new\n chipset and device support via PCI table updates -\n support for new 'oom-kill' and 'kscand_work_percent'\n sysctls - support for dual core processors and ACPI\n Power Management timers on AMD64 and Intel EM64T systems\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated\nbelow). Other key areas affected by fixes in this update include\nkswapd, inode handling, the SATA subsystem, diskdump handling,\nptrace() syscall support, and signal handling.\n\nThe following device drivers have been upgraded to new versions :\n\n3w-9xxx ---- 2.24.03.008RH cciss ------ 2.4.58.RH1 e100 -------\n3.4.8-k2 e1000 ------ 6.0.54-k2 emulex ----- 7.3.2 fusion -----\n2.06.16i.01 iscsi ------ 3.6.2.1 ipmi ------- 35.4 lpfcdfc ---- 1.2.1\nqlogic ----- 7.05.00-RH1 tg3 -------- 3.27RH\n\nThe following security bugs were fixed in this update :\n\n - a flaw in syscall argument checking on Itanium systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-0136)\n\n - a flaw in stack expansion that allowed a local user of\n mlockall() to cause a denial of service (memory\n exhaustion) (CVE-2005-0179)\n\n - a small memory leak in network packet defragmenting that\n allowed a remote user to cause a denial of service\n (memory exhaustion) on systems using netfilter\n (CVE-2005-0210)\n\n - flaws in ptrace() syscall handling on AMD64 and Intel\n EM64T systems that allowed a local user to cause a\n denial of service (crash) (CVE-2005-0756, CVE-2005-1762,\n CVE-2005-2553)\n\n - flaws in ISO-9660 file system handling that allowed the\n mounting of an invalid image on a CD-ROM to cause a\n denial of service (crash) or potentially execute\n arbitrary code (CVE-2005-0815)\n\n - a flaw in ptrace() syscall handling on Itanium systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-1761)\n\n - a flaw in the alternate stack switching on AMD64 and\n Intel EM64T systems that allowed a local user to cause a\n denial of service (crash) (CVE-2005-1767)\n\n - race conditions in the ia32-compat support for exec()\n syscalls on AMD64, Intel EM64T, and Itanium systems that\n could allow a local user to cause a denial of service\n (crash) (CVE-2005-1768)\n\n - flaws in IPSEC network handling that allowed a local\n user to cause a denial of service or potentially gain\n privileges (CVE-2005-2456, CVE-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2490)\n\n - flaws in unsupported modules that allowed\n denial-of-service attacks (crashes) or local privilege\n escalations on systems using the drm, coda, or moxa\n modules (CVE-2004-1056, CVE-2005-0124, CVE-2005-0504)\n\n - potential leaks of kernel data from jfs and ext2 file\n system handling (CVE-2004-0181, CVE-2005-0400)\n\nNote: The kernel-unsupported package contains various drivers and\nmodules that are unsupported and therefore might contain security\nproblems that have not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-0181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1056\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0136\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0179\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0210\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0504\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0756\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0815\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-1761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-1762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-1767\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-1768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2456\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2490\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2553\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3273\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:663\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_cwe_id(20, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/09/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:663\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-doc-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-unsupported-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-unsupported-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-source-2.4.21-37.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-unsupported-2.4.21-37.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:06:40", "bulletinFamily": "scanner", "description": "Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 3. This is the\nsixth regular update.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the sixth regular kernel update to Red Hat Enterprise Linux 3.\n\nNew features introduced by this update include :\n\n - diskdump support on HP Smart Array devices -\n netconsole/netdump support over bonded interfaces - new\n chipset and device support via PCI table updates -\n support for new 'oom-kill' and 'kscand_work_percent'\n sysctls - support for dual core processors and ACPI\n Power Management timers on AMD64 and Intel EM64T systems\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated\nbelow). Other key areas affected by fixes in this update include\nkswapd, inode handling, the SATA subsystem, diskdump handling,\nptrace() syscall support, and signal handling.\n\nThe following device drivers have been upgraded to new versions :\n\n3w-9xxx ---- 2.24.03.008RH cciss ------ 2.4.58.RH1 e100 -------\n3.4.8-k2 e1000 ------ 6.0.54-k2 emulex ----- 7.3.2 fusion -----\n2.06.16i.01 iscsi ------ 3.6.2.1 ipmi ------- 35.4 lpfcdfc ---- 1.2.1\nqlogic ----- 7.05.00-RH1 tg3 -------- 3.27RH\n\nThe following security bugs were fixed in this update :\n\n - a flaw in syscall argument checking on Itanium systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-0136)\n\n - a flaw in stack expansion that allowed a local user of\n mlockall() to cause a denial of service (memory\n exhaustion) (CVE-2005-0179)\n\n - a small memory leak in network packet defragmenting that\n allowed a remote user to cause a denial of service\n (memory exhaustion) on systems using netfilter\n (CVE-2005-0210)\n\n - flaws in ptrace() syscall handling on AMD64 and Intel\n EM64T systems that allowed a local user to cause a\n denial of service (crash) (CVE-2005-0756, CVE-2005-1762,\n CVE-2005-2553)\n\n - flaws in ISO-9660 file system handling that allowed the\n mounting of an invalid image on a CD-ROM to cause a\n denial of service (crash) or potentially execute\n arbitrary code (CVE-2005-0815)\n\n - a flaw in ptrace() syscall handling on Itanium systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-1761)\n\n - a flaw in the alternate stack switching on AMD64 and\n Intel EM64T systems that allowed a local user to cause a\n denial of service (crash) (CVE-2005-1767)\n\n - race conditions in the ia32-compat support for exec()\n syscalls on AMD64, Intel EM64T, and Itanium systems that\n could allow a local user to cause a denial of service\n (crash) (CVE-2005-1768)\n\n - flaws in IPSEC network handling that allowed a local\n user to cause a denial of service or potentially gain\n privileges (CVE-2005-2456, CVE-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2490)\n\n - flaws in unsupported modules that allowed\n denial-of-service attacks (crashes) or local privilege\n escalations on systems using the drm, coda, or moxa\n modules (CVE-2004-1056, CVE-2005-0124, CVE-2005-0504)\n\n - potential leaks of kernel data from jfs and ext2 file\n system handling (CVE-2004-0181, CVE-2005-0400)\n\nNote: The kernel-unsupported package contains various drivers and\nmodules that are unsupported and therefore might contain security\nproblems that have not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "modified": "2018-11-10T00:00:00", "published": "2006-07-03T00:00:00", "id": "CENTOS_RHSA-2005-663.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21849", "title": "CentOS 3 : kernel (CESA-2005:663)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:663 and \n# CentOS Errata and Security Advisory 2005:663 respectively.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21849);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2018/11/10 11:49:27\");\n\n script_cve_id(\"CVE-2004-0181\", \"CVE-2004-1056\", \"CVE-2005-0124\", \"CVE-2005-0136\", \"CVE-2005-0179\", \"CVE-2005-0210\", \"CVE-2005-0400\", \"CVE-2005-0504\", \"CVE-2005-0756\", \"CVE-2005-0815\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1767\", \"CVE-2005-1768\", \"CVE-2005-2456\", \"CVE-2005-2490\", \"CVE-2005-2553\", \"CVE-2005-2555\", \"CVE-2005-3273\", \"CVE-2005-3274\");\n script_xref(name:\"RHSA\", value:\"2005:663\");\n\n script_name(english:\"CentOS 3 : kernel (CESA-2005:663)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 3. This is the\nsixth regular update.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the sixth regular kernel update to Red Hat Enterprise Linux 3.\n\nNew features introduced by this update include :\n\n - diskdump support on HP Smart Array devices -\n netconsole/netdump support over bonded interfaces - new\n chipset and device support via PCI table updates -\n support for new 'oom-kill' and 'kscand_work_percent'\n sysctls - support for dual core processors and ACPI\n Power Management timers on AMD64 and Intel EM64T systems\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated\nbelow). Other key areas affected by fixes in this update include\nkswapd, inode handling, the SATA subsystem, diskdump handling,\nptrace() syscall support, and signal handling.\n\nThe following device drivers have been upgraded to new versions :\n\n3w-9xxx ---- 2.24.03.008RH cciss ------ 2.4.58.RH1 e100 -------\n3.4.8-k2 e1000 ------ 6.0.54-k2 emulex ----- 7.3.2 fusion -----\n2.06.16i.01 iscsi ------ 3.6.2.1 ipmi ------- 35.4 lpfcdfc ---- 1.2.1\nqlogic ----- 7.05.00-RH1 tg3 -------- 3.27RH\n\nThe following security bugs were fixed in this update :\n\n - a flaw in syscall argument checking on Itanium systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-0136)\n\n - a flaw in stack expansion that allowed a local user of\n mlockall() to cause a denial of service (memory\n exhaustion) (CVE-2005-0179)\n\n - a small memory leak in network packet defragmenting that\n allowed a remote user to cause a denial of service\n (memory exhaustion) on systems using netfilter\n (CVE-2005-0210)\n\n - flaws in ptrace() syscall handling on AMD64 and Intel\n EM64T systems that allowed a local user to cause a\n denial of service (crash) (CVE-2005-0756, CVE-2005-1762,\n CVE-2005-2553)\n\n - flaws in ISO-9660 file system handling that allowed the\n mounting of an invalid image on a CD-ROM to cause a\n denial of service (crash) or potentially execute\n arbitrary code (CVE-2005-0815)\n\n - a flaw in ptrace() syscall handling on Itanium systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-1761)\n\n - a flaw in the alternate stack switching on AMD64 and\n Intel EM64T systems that allowed a local user to cause a\n denial of service (crash) (CVE-2005-1767)\n\n - race conditions in the ia32-compat support for exec()\n syscalls on AMD64, Intel EM64T, and Itanium systems that\n could allow a local user to cause a denial of service\n (crash) (CVE-2005-1768)\n\n - flaws in IPSEC network handling that allowed a local\n user to cause a denial of service or potentially gain\n privileges (CVE-2005-2456, CVE-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2490)\n\n - flaws in unsupported modules that allowed\n denial-of-service attacks (crashes) or local privilege\n escalations on systems using the drm, coda, or moxa\n modules (CVE-2004-1056, CVE-2005-0124, CVE-2005-0504)\n\n - potential leaks of kernel data from jfs and ext2 file\n system handling (CVE-2004-0181, CVE-2005-0400)\n\nNote: The kernel-unsupported package contains various drivers and\nmodules that are unsupported and therefore might contain security\nproblems that have not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-September/012214.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c562b3df\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-September/012233.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f0588dc8\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-September/012234.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?24cca25a\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P\");\n script_cwe_id(20, 119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/09/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/CentOS/release\")) audit(AUDIT_OS_NOT, \"CentOS\");\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-doc-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-unsupported-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-unsupported-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-source-2.4.21-37.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-unsupported-2.4.21-37.EL\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:06:56", "bulletinFamily": "scanner", "description": "Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2004-2302\n A race condition in the sysfs filesystem allows local\n users to read kernel memory and cause a denial of\n service (crash).\n\n - CVE-2005-0756\n Alexander Nyberg discovered that the ptrace() system\n call does not properly verify addresses on the amd64\n architecture which can be exploited by a local attacker\n to crash the kernel.\n\n - CVE-2005-0757\n A problem in the offset handling in the xattr file\n system code for ext3 has been discovered that may allow\n users on 64-bit systems that have access to an ext3\n filesystem with extended attributes to cause the kernel\n to crash.\n\n - CVE-2005-1265\n Chris Wright discovered that the mmap() function could\n create illegal memory maps that could be exploited by a\n local user to crash the kernel or potentially execute\n arbitrary code.\n\n - CVE-2005-1761\n A vulnerability on the IA-64 architecture can lead local\n attackers to overwrite kernel memory and crash the\n kernel.\n\n - CVE-2005-1762\n A vulnerability has been discovered in the ptrace()\n system call on the amd64 architecture that allows a\n local attacker to cause the kernel to crash.\n\n - CVE-2005-1763\n A buffer overflow in the ptrace system call for 64-bit\n architectures allows local users to write bytes into\n arbitrary kernel memory.\n\n - CVE-2005-1765\n Zou Nan Hai has discovered that a local user could cause\n the kernel to hang on the amd64 architecture after\n invoking syscall() with specially crafted arguments.\n\n - CVE-2005-1767\n A vulnerability has been discovered in the stack segment\n fault handler that could allow a local attacker to cause\n a stack exception that will lead the kernel to crash\n under certain circumstances.\n\n - CVE-2005-2456\n Balazs Scheidler discovered that a local attacker could\n call setsockopt() with an invalid xfrm_user policy\n message which would cause the kernel to write beyond the\n boundaries of an array and crash.\n\n - CVE-2005-2458\n Vladimir Volovich discovered a bug in the zlib routines\n which are also present in the Linux kernel and allows\n remote attackers to crash the kernel.\n\n - CVE-2005-2459\n Another vulnerability has been discovered in the zlib\n routines which are also present in the Linux kernel and\n allows remote attackers to crash the kernel.\n\n - CVE-2005-2548\n Peter Sandstrom noticed that snmpwalk from a remote host\n could cause a denial of service (kernel oops from null\n dereference) via certain UDP packets that lead to a\n function call with the wrong argument.\n\n - CVE-2005-2801\n Andreas Gruenbacher discovered a bug in the ext2 and\n ext3 file systems. When data areas are to be shared\n among two inodes not all information were compared for\n equality, which could expose wrong ACLs for files.\n\n - CVE-2005-2872\n Chad Walstrom discovered that the ipt_recent kernel\n module on 64-bit processors such as AMD64 allows remote\n attackers to cause a denial of service (kernel panic)\n via certain attacks such as SSH brute force.\n\n - CVE-2005-3105\n The mprotect code on Itanium IA-64 Montecito processors\n does not properly maintain cache coherency as required\n by the architecture, which allows local users to cause a\n denial of service and possibly corrupt data by modifying\n PTE protections.\n\n - CVE-2005-3106\n A race condition in the thread management may allow\n local users to cause a denial of service (deadlock) when\n threads are sharing memory and waiting for a thread that\n has just performed an exec.\n\n - CVE-2005-3107\n When one thread is tracing another thread that shares\n the same memory map a local user could cause a denial of\n service (deadlock) by forcing a core dump when the\n traced thread is in the TASK_TRACED state.\n\n - CVE-2005-3108\n A bug in the ioremap() system call has been discovered\n on the amd64 architecture that could allow local users\n to cause a denial of service or an information leak when\n performing a lookup of a non-existent memory page.\n\n - CVE-2005-3109\n The HFS and HFS+ (hfsplus) modules allow local attackers\n to cause a denial of service (oops) by using hfsplus to\n mount a filesystem that is not hfsplus.\n\n - CVE-2005-3110\n A race condition in the ebtables netfilter module on an\n SMP system running under high load may allow remote\n attackers to cause a denial of service (crash).\n\n - CVE-2005-3271\n Roland McGrath discovered that exec() does not properly\n clear posix-timers in multi-threaded environments, which\n results in a resource leak and could allow a large\n number of multiple local users to cause a denial of\n service by using more posix-timers than specified by the\n quota for a single user.\n\n - CVE-2005-3272\n The kernel allows remote attackers to poison the bridge\n forwarding table using frames that have already been\n dropped by filtering, which can cause the bridge to\n forward spoofed packets.\n\n - CVE-2005-3273\n The ioctl for the packet radio ROSE protocol does not\n properly verify the arguments when setting a new router,\n which allows attackers to trigger out-of-bounds errors.\n\n - CVE-2005-3274\n A race condition on SMP systems allows local users to\n cause a denial of service (null dereference) by causing\n a connection timer to expire while the connection table\n is being flushed before the appropriate lock is\n acquired.\n\n - CVE-2005-3275\n An error in the NAT code allows remote attackers to\n cause a denial of service (memory corruption) by causing\n two packets for the same protocol to be NATed at the\n same time, which leads to memory corruption.\n\n - CVE-2005-3276\n A missing memory cleanup in the thread handling routines\n before copying data into userspace allows a user process\n to obtain sensitive information.\n\nThis update also contains a number of corrections for issues that\nturned out to have no security implication afterwards.", "modified": "2018-07-20T00:00:00", "published": "2006-10-14T00:00:00", "id": "DEBIAN_DSA-922.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=22788", "title": "Debian DSA-922-1 : kernel-source-2.6.8 - several vulnerabilities", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-922. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(22788);\n script_version(\"1.21\");\n script_cvs_date(\"Date: 2018/07/20 2:17:12\");\n\n script_cve_id(\"CVE-2004-2302\", \"CVE-2005-0756\", \"CVE-2005-0757\", \"CVE-2005-1265\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1763\", \"CVE-2005-1765\", \"CVE-2005-1767\", \"CVE-2005-2456\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2548\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3105\", \"CVE-2005-3106\", \"CVE-2005-3107\", \"CVE-2005-3108\", \"CVE-2005-3109\", \"CVE-2005-3110\", \"CVE-2005-3271\", \"CVE-2005-3272\", \"CVE-2005-3273\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-3276\");\n script_bugtraq_id(14477, 15527, 15528, 15533);\n script_xref(name:\"DSA\", value:\"922\");\n\n script_name(english:\"Debian DSA-922-1 : kernel-source-2.6.8 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2004-2302\n A race condition in the sysfs filesystem allows local\n users to read kernel memory and cause a denial of\n service (crash).\n\n - CVE-2005-0756\n Alexander Nyberg discovered that the ptrace() system\n call does not properly verify addresses on the amd64\n architecture which can be exploited by a local attacker\n to crash the kernel.\n\n - CVE-2005-0757\n A problem in the offset handling in the xattr file\n system code for ext3 has been discovered that may allow\n users on 64-bit systems that have access to an ext3\n filesystem with extended attributes to cause the kernel\n to crash.\n\n - CVE-2005-1265\n Chris Wright discovered that the mmap() function could\n create illegal memory maps that could be exploited by a\n local user to crash the kernel or potentially execute\n arbitrary code.\n\n - CVE-2005-1761\n A vulnerability on the IA-64 architecture can lead local\n attackers to overwrite kernel memory and crash the\n kernel.\n\n - CVE-2005-1762\n A vulnerability has been discovered in the ptrace()\n system call on the amd64 architecture that allows a\n local attacker to cause the kernel to crash.\n\n - CVE-2005-1763\n A buffer overflow in the ptrace system call for 64-bit\n architectures allows local users to write bytes into\n arbitrary kernel memory.\n\n - CVE-2005-1765\n Zou Nan Hai has discovered that a local user could cause\n the kernel to hang on the amd64 architecture after\n invoking syscall() with specially crafted arguments.\n\n - CVE-2005-1767\n A vulnerability has been discovered in the stack segment\n fault handler that could allow a local attacker to cause\n a stack exception that will lead the kernel to crash\n under certain circumstances.\n\n - CVE-2005-2456\n Balazs Scheidler discovered that a local attacker could\n call setsockopt() with an invalid xfrm_user policy\n message which would cause the kernel to write beyond the\n boundaries of an array and crash.\n\n - CVE-2005-2458\n Vladimir Volovich discovered a bug in the zlib routines\n which are also present in the Linux kernel and allows\n remote attackers to crash the kernel.\n\n - CVE-2005-2459\n Another vulnerability has been discovered in the zlib\n routines which are also present in the Linux kernel and\n allows remote attackers to crash the kernel.\n\n - CVE-2005-2548\n Peter Sandstrom noticed that snmpwalk from a remote host\n could cause a denial of service (kernel oops from null\n dereference) via certain UDP packets that lead to a\n function call with the wrong argument.\n\n - CVE-2005-2801\n Andreas Gruenbacher discovered a bug in the ext2 and\n ext3 file systems. When data areas are to be shared\n among two inodes not all information were compared for\n equality, which could expose wrong ACLs for files.\n\n - CVE-2005-2872\n Chad Walstrom discovered that the ipt_recent kernel\n module on 64-bit processors such as AMD64 allows remote\n attackers to cause a denial of service (kernel panic)\n via certain attacks such as SSH brute force.\n\n - CVE-2005-3105\n The mprotect code on Itanium IA-64 Montecito processors\n does not properly maintain cache coherency as required\n by the architecture, which allows local users to cause a\n denial of service and possibly corrupt data by modifying\n PTE protections.\n\n - CVE-2005-3106\n A race condition in the thread management may allow\n local users to cause a denial of service (deadlock) when\n threads are sharing memory and waiting for a thread that\n has just performed an exec.\n\n - CVE-2005-3107\n When one thread is tracing another thread that shares\n the same memory map a local user could cause a denial of\n service (deadlock) by forcing a core dump when the\n traced thread is in the TASK_TRACED state.\n\n - CVE-2005-3108\n A bug in the ioremap() system call has been discovered\n on the amd64 architecture that could allow local users\n to cause a denial of service or an information leak when\n performing a lookup of a non-existent memory page.\n\n - CVE-2005-3109\n The HFS and HFS+ (hfsplus) modules allow local attackers\n to cause a denial of service (oops) by using hfsplus to\n mount a filesystem that is not hfsplus.\n\n - CVE-2005-3110\n A race condition in the ebtables netfilter module on an\n SMP system running under high load may allow remote\n attackers to cause a denial of service (crash).\n\n - CVE-2005-3271\n Roland McGrath discovered that exec() does not properly\n clear posix-timers in multi-threaded environments, which\n results in a resource leak and could allow a large\n number of multiple local users to cause a denial of\n service by using more posix-timers than specified by the\n quota for a single user.\n\n - CVE-2005-3272\n The kernel allows remote attackers to poison the bridge\n forwarding table using frames that have already been\n dropped by filtering, which can cause the bridge to\n forward spoofed packets.\n\n - CVE-2005-3273\n The ioctl for the packet radio ROSE protocol does not\n properly verify the arguments when setting a new router,\n which allows attackers to trigger out-of-bounds errors.\n\n - CVE-2005-3274\n A race condition on SMP systems allows local users to\n cause a denial of service (null dereference) by causing\n a connection timer to expire while the connection table\n is being flushed before the appropriate lock is\n acquired.\n\n - CVE-2005-3275\n An error in the NAT code allows remote attackers to\n cause a denial of service (memory corruption) by causing\n two packets for the same protocol to be NATed at the\n same time, which leads to memory corruption.\n\n - CVE-2005-3276\n A missing memory cleanup in the thread handling routines\n before copying data into userspace allows a user process\n to obtain sensitive information.\n\nThis update also contains a number of corrections for issues that\nturned out to have no security implication afterwards.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=309308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=311164\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322339\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-922\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package immediately and reboot the machine.\n\nThe following matrix explains which kernel version for which\narchitecture fix the problems mentioned above :\n\n Debian 3.1 (sarge) \n Source 2.6.8-16sarge1 \n Alpha architecture 2.6.8-16sarge1 \n AMD64 architecture 2.6.8-16sarge1 \n HP Precision architecture 2.6.8-6sarge1 \n Intel IA-32 architecture 2.6.8-16sarge1 \n Intel IA-64 architecture 2.6.8-14sarge1 \n Motorola 680x0 architecture 2.6.8-4sarge1 \n PowerPC architecture 2.6.8-12sarge1 \n IBM S/390 architecture 2.6.8-5sarge1 \n Sun Sparc architecture 2.6.8-15sarge1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.6.8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/11/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-2\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power3\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power3-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power4\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power4-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-powerpc\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-powerpc-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.6.8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-k8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-k8-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-em64t-p4\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-em64t-p4-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-32\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-32-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-386\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-64\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-64-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-686\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-686-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-k7\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-k7-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc32\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc64\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc64-smp\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-k8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-k8-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-em64t-p4\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-em64t-p4-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-32\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-32-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-386\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-64\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-64-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-686\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-686-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-k7\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-k7-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390-tape\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390x\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc32\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc64\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc64-smp\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-amiga\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-atari\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-bvme6000\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-hp\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mac\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mvme147\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mvme16x\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power3\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power3-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power4\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power4-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-powerpc\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-powerpc-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-q40\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-sun3\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.6.8-s390\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.6.8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.6.8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.6.8\", reference:\"2.6.8-16sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "suse": [{"lastseen": "2016-09-04T11:32:36", "bulletinFamily": "unix", "description": "The Linux kernel is the core component of the Linux system. This update fixes various security as well as non-security problems discovered since the last round of kernel updates. Not all kernels are affected by all the problems, each of the problems has an affected note attached to it. The CAN-YYYY-NNNN IDs are Mitre CVE Candidate IDs, please see http://www.mitre.org for more information. The following security problems have been fixed: - local users could crash the system by causing stack fault exceptions (CAN-2005-1767) SUSE Linux 9.0 and SLES8 are affected. - local users could use ptrace to crash the kernel (CAN-2005-1761). SLES8 on the ia64 architecture is affected. - by causing an overflow in the 32bit execve function users could crash the kernel or even execute code (CAN-2005-1768). SLES 9 on the x86-64 and ia64 architectures and SUSE Linux 9.1 on the x86-64 architecture are affected. - an overflow when validating XDR data for the nfsacl protocol could crash the kernel. SUSE Linux 9.2 and 9.3 are affected. - local users could crash the kernel by reading from large offsets in sysfs files SUSE Linux 9.2 is affected. On SUSE Linux 9.1 this update contains the kernel used by the SUSE Linux Enterprise Server 9, Service Pack 2. This kernel adds among many bugfixes and driver updates support for non-executable pages (NX) on x86 CPUs and improves dual core CPU support.\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2005-08-04T08:25:33", "published": "2005-08-04T08:25:33", "id": "SUSE-SA:2005:044", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-08/msg00008.html", "type": "suse", "title": "local privilege escalation in kernel", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:04", "bulletinFamily": "scanner", "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 921-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=56013", "id": "OPENVAS:56013", "title": "Debian Security Advisory DSA 921-1 (kernel-source-2.4.27)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_921_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 921-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. For details on the vulnerabilities addressed by\nthe missing update, please visit the referenced security advisories.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\nDebian 3.1 (sarge)\nSource 2.4.27-10sarge1\nAlpha architecture 2.4.27-10sarge1\nARM architecture 2.4.27-2sarge1\nIntel IA-32 architecture 2.4.27-10sarge1\nIntel IA-64 architecture 2.4.27-10sarge1\nMotorola 680x0 architecture 2.4.27-3sarge1\nBig endian MIPS architecture 2.4.27-10.sarge1.040815-1\nLittle endian MIPS architecture 2.4.27-10.sarge1.040815-1\nPowerPC architecture 2.4.27-10sarge1\nIBM S/390 architecture 2.4.27-2sarge1\nSun Sparc architecture 2.4.27-9sarge1\n\nWe recommend that you upgrade your kernel package immediately and\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 921-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20921-1\";\n\nif(description)\n{\n script_id(56013);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-0756\", \"CVE-2005-0757\", \"CVE-2005-1762\", \"CVE-2005-1767\", \"CVE-2005-1768\", \"CVE-2005-2456\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2553\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3275\");\n script_bugtraq_id(14477);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Debian Security Advisory DSA 921-1 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.4.27\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.4.27\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.4.27\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-arm\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-2\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-generic\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-generic\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mips-tools\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bast\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-lart\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-netwinder\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscpc\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscstation\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-itanium\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-itanium-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-mckinley\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-mckinley-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-itanium\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-itanium-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-mckinley\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-mckinley-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-amiga\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-atari\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bvme6000\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mac\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme147\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme16x\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-q40\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-ip22\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-ip22\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-sb1-swarm-bn\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r3k-kn02\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-kn04\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-cobalt\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-lasat\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-xxs1500\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-apus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-nubus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-apus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-nubus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-powerpc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-apus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-nubus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-apus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-nubus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-powerpc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390-tape\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390x\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc32\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc32-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc64\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc64-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc32\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc32-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc64\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc64-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-24T12:50:16", "bulletinFamily": "scanner", "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 922-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=56014", "id": "OPENVAS:56014", "title": "Debian Security Advisory DSA 922-1 (kernel-source-2.4.27)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_922_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 922-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. For details on the vulnerabilities addressed by\nthe missing update, please visit the referenced security advisories.\n\nThis update also contains a number of corrections for issues that\nturned out to have no security implication afterwards.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\nDebian 3.1 (sarge)\nSource 2.6.8-16sarge1\nAlpha architecture 2.6.8-16sarge1\nAMD64 architecture 2.6.8-16sarge1\nHP Precision architecture 2.6.8-6sarge1\nIntel IA-32 architecture 2.6.8-16sarge1\nIntel IA-64 architecture 2.6.8-14sarge1\nMotorola 680x0 architecture 2.6.8-4sarge1\nPowerPC architecture 2.6.8-12sarge1\nIBM S/390 architecture 2.6.8-5sarge1\nSun Sparc architecture 2.6.8-15sarge1\n\nWe recommend that you upgrade your kernel package immediately and\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 922-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20922-1\";\n\nif(description)\n{\n script_id(56014);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-2302\", \"CVE-2005-0756\", \"CVE-2005-0757\", \"CVE-2005-1265\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1763\", \"CVE-2005-1765\", \"CVE-2005-1767\", \"CVE-2005-2456\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2548\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3105\", \"CVE-2005-3106\", \"CVE-2005-3107\", \"CVE-2005-3108\", \"CVE-2005-3109\", \"CVE-2005-3110\", \"CVE-2005-3271\", \"CVE-2005-3272\", \"CVE-2005-3273\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-3276\");\n script_bugtraq_id(14477,15527,15528,15533);\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 922-1 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.6.8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.6.8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.6.8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.6.8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.6.8-s390\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-amiga\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-atari\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-bvme6000\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-hp\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mac\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme147\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme16x\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-q40\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-sun3\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390-tape\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390x\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2018-10-16T22:14:51", "bulletinFamily": "unix", "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 921-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nDecember 14th, 2005 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2005-0756 CVE-2005-0757 CVE-2005-1762 CVE-2005-1767\n CVE-2005-1768 CVE-2005-2456 CVE-2005-2458 CVE-2005-2459\n CVE-2005-2553 CVE-2005-2801 CVE-2005-2872 CVE-2005-3275\nBugTraq ID : 14477\nDebian Bug : 311164 319629 321401 322237\n\nSeveral local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilieis and Exposures project\nidentifies the following problems:\n\nCVE-2005-0756\n\n Alexander Nyberg discovered that the ptrace() system call does not\n properly verify addresses on the amd64 architecture which can be\n exploited by a local attacker to crash the kernel.\n\nCVE-2005-0757\n\n A problem in the offset handling in the xattr file system code for\n ext3 has been discovered that may allow users on 64-bit systems\n that have access to an ext3 filesystem with extended attributes to\n cause the kernel to crash.\n\nCVE-2005-1762\n\n A vulnerability has been discovered in the ptrace() system call on\n the amd64 architecture that allowas a local attacker to cause the\n kernel to crash.\n\nCVE-2005-1767\n\n A vulnerability has been discovered in the stack segment fault\n handler that could allow a local attacker to cause stack exception\n that will leed the kernel to crash under certain circumstances.\n\nCVE-2005-1768\n\n Ilja van Sprundel discovered a race condition in the IA32 (x86)\n compatibility execve() systemcall for amd64 and IA64 that allows\n local attackers to cause the kernel to panic and possibly execute\n arbitrary code.\n\nCVE-2005-2456\n\n Balazs Scheidler discovered that a local attacker could call\n setsockopt() with an invalid xfrm_user policy message which would\n cause the kernel to write beyond the boundaries of an array and\n crash.\n\nCVE-2005-2458\n\n Vladimir Volovich discovered a bug in the zlib routines which are\n also present in the Linux kernel and allows remote attackers to\n krash the kernel\n\nCVE-2005-2459\n\n Another vulnerability has been discovered in the zlib routines\n which are also present in the Linux kernel and allows remote\n attackers to crash the kernel\n\nCVE-2005-2553\n\n A null pointer dereference in ptrace when tracing a 64-bit\n executable can cause the kernel to crash.\n\nCVE-2005-2801\n\n Andreas Gruenbacher discovered a bug in the ext2 and ext3 file\n systems. When data areas are to be shared among two inodes not\n all information were compared for equality, which could expose\n wrong ACLs for files.\n\nCVE-2005-2872\n\n Chad Walstrom discovered that the ipt_recent kernel module to stop\n SSH bruteforce attacks could cause the kernel to crash on 64-bit\n architectures.\n\nCVE-2005-3275\n\n An error in the NAT code allows remote attackers to cause a denial\n of service (memory corruption) by causing two packets for the same\n protocol to be NATed at the same time, which leads to memory\n corruption.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\nSource 2.4.27-10sarge1\nAlpha architecture 2.4.27-10sarge1\nARM architecture 2.4.27-2sarge1\nIntel IA-32 architecture 2.4.27-10sarge1\nIntel IA-64 architecture 2.4.27-10sarge1\nMotorola 680x0 architecture 2.4.27-3sarge1\nBig endian MIPS architecture 2.4.27-10.sarge1.040815-1\nLittle endian MIPS architecture 2.4.27-10.sarge1.040815-1\nPowerPC architecture 2.4.27-10sarge1\nIBM S/390 architecture 2.4.27-2sarge1\nSun Sparc architecture 2.4.27-9sarge1\n\nWe recommend that you upgrade your kernel package immediately and\nreboot the machine.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 900 cf29dbb52e2fd25da1d4ecb8dbe5e854\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz\n Size/MD5 checksum: 699494 3b26bc94e734e3e9c7de8851e9e308b7\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz\n Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 831 0278c9e5d78a3f0192808e89d2fa389b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz\n Size/MD5 checksum: 29945 c6c19bbf99fbff1d67d5216f28855755\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1.dsc\n Size/MD5 checksum: 577 0f7c9c24f228948824056914841278c5\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1.tar.gz\n Size/MD5 checksum: 828336 b38387d519bee09b40f6b706d54f60fc\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 839 99ec4f95021ee6e9fb9b98087109c0d7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge1.tar.gz\n Size/MD5 checksum: 32182 efdb3fde273dc5d0124d38f6d7dccbd6\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 1581 0ddc89456decf24ce5d10aa79824cd5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz\n Size/MD5 checksum: 97268 6aa8cd7f87e3bda01cdcd09bda96e596\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 1143 21e48f420a88976b9063e88cc7d8add5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz\n Size/MD5 checksum: 53267 e3c410bc8e3bdfdfe81dbc00575f62e0\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge1.dsc\n Size/MD5 checksum: 889 a5253abf41b798233d68c8004da5049a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge1.tar.gz\n Size/MD5 checksum: 9791 3a5c08d227dac66ad83c75cd68c74375\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge1.040815-1.dsc\n Size/MD5 checksum: 1062 d03d719f6a6cef2732ba218ae40a6770\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge1.040815-1.tar.gz\n Size/MD5 checksum: 307828 fa74234db1cbd88277fcdd490b10a887\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 1129 125083312667f1bdb7c62e217b41963a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.tar.gz\n Size/MD5 checksum: 1462360 ab3702cbcde8976d422e32d13173c942\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 825 ecfb13748a5231fb8e1580b7bcd99600\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge1.tar.gz\n Size/MD5 checksum: 8123 5e41863c13ad4b96fe90ed25abd3e33d\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc\n Size/MD5 checksum: 1074 a22bdef307d571cd0d9a055d0752111b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz\n Size/MD5 checksum: 22912 2bcc7519c5da2edfe0b450b02b1c1e85\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb\n Size/MD5 checksum: 3577464 3a2c82fcc546bee30fb522f28193f3e7\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb\n Size/MD5 checksum: 650880 2cfb0a84539c910e596abba17e7d8d48\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb\n Size/MD5 checksum: 31026166 857f97955b1c7d145990f28581731fb7\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb\n Size/MD5 checksum: 24418 c346db9cb71c6e39328d49318a2f2ed4\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1_all.deb\n Size/MD5 checksum: 832704 b9e1f325937d5f7596688d5dd848de55\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 5690 26d3f171f62b80b0b8e978652f8f485a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 4572104 d92c8a0b7398b6b41d52c7a55a3d88f1\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 270932 be9e18785e87f29f8632a9fc973b0bbb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 272886 dea691efa19f4b82691124fa62e8963f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 16516634 eb2e92ade4debc9bfdedb40134b3efd6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 16970506 2b58db598e31823c08f993da80ab10d0\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_alpha.deb\n Size/MD5 checksum: 18104 42337c47e36aab7279b3355987057447\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_amd64.deb\n Size/MD5 checksum: 14830 1bef3063d2042b93b8734bbf02b57e8f\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 464238 58d912323c90cc0c588d7882965a0171\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 4657690 35d64aacb4e4d9286360881edec6a359\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 1688134 5cc159ac4ba8cd9152513616ebeff876\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 1053572 2ed7da9dfede24ce6c3ac6f3300c9f30\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 7330858 93afcdcfda01d2d08b0bc86f32a3d623\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 3141064 fdd304023a6f6da48c69417b1e531469\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 3663614 e532db0019cc83e0b40e99cc5bd16179\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_arm.deb\n Size/MD5 checksum: 16498 98ff86517ac204296c7d2a8bd9d771cb\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 8224 ae479d6dbd6c171e94a25e5b59b4243f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 1823160 c058363ae7646c370f77d620c6bb6438\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297168 19b508f76e107d8cf988560b3fd04a8b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298340 073efbc2d728e4ee3b30e980d2d0f5e6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298200 94f48b9438f8e100590c8874b3c05e0c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 300156 1143aa70f66386bf4789431e80810b2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297050 44f3d785ad2c70829373321327e6e3e6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297978 7795ea75d534ded9d2a7ade27fc3cf21\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 299650 9676b8d779e9dd09f0583d950e2fd2d5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 11046010 e32bdedde43897d24792ce5199c8e428\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12024834 edfa4a6008fde7599fbd7e5081cc2bb9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12336042 d2c1f84d0c771fa8de10c87e0cb35e70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12679824 4ab0ad4ca8bf76e6614768cee8245c24\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 11708878 7842c8dfed5e6c2cbbed136807b5cf7f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12083292 b45dd7f50ef9f4726711c4af87368037\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12415392 b56e1c928e816d53f6cba41f0138e91d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 267586 95d23b87e054f0a8dc82edd6a7f51f60\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 292452 d090775026be223c949e0f86f5b1f646\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298278 f8cc95014790c87b62bf81b2b2d2d674\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 303840 f1362454b42361047297b1ef7f90769c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 286252 d67de5ec744bad676981089e5623561c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 292100 0ce7cff58a32eb924199a652062a7e9f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 296978 fdb699b60e0d3ae5fa4df76e0203c603\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_i386.deb\n Size/MD5 checksum: 14278 b17654c8d53b3813df9eaef78810efd4\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 5190 00c8fff6af32adf62f8c91794745931b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4678756 01467522c3106fab54cf6983a9c6487d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 239184 cd07eff9264141e6ddbd015f5f76e99e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 240504 03b131531af57cd2f46cf8ff8ba93f45\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 239212 457102e92a389246447410ce172bbd2f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 240498 66cc452b54b87366d7755da6693aa76c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4916 8432a3f7650e77fc8ab88f9bf6efdc2a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4934 83fd412732f3cbc3d8b9c642f968bc61\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4944 91ec4c1ca5123a5552cb1b74bea98b29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4962 26f8609ffe3a5711730283a5ac19e206\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16665798 0dfd99eeb9d1c8933ec71f0cdc80a71e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 17023766 09ae0a0c0b133abe047cd50b8e09f02e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16623970 2b70e151d5c13c89d7646dc01d28a277\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16970478 affcf0503482e489ae8384b3d7279fce\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_ia64.deb\n Size/MD5 checksum: 19858 ba4cea60b31ac6926bc2e12c89c98232\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_hppa.deb\n Size/MD5 checksum: 16894 ef6c734bc7a3be187324d77d6432affd\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2628642 9d7d78cb18b165526d3b9c69274cc186\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2535972 5367f4e405cd97ae879d13149813beca\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2384766 853a2da6b5f179ff9d4bedf82e1a041f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2468516 788d44179a2aa91c9868c15fb371c11d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2313758 4b7cb73958e218b3f63de0c0e9347e26\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2386394 e0a43e4b96b3ddfb782dd842bf063f89\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2252242 a5f233f48b188fc7889a83c676d64b9e\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_m68k.deb\n Size/MD5 checksum: 14000 c9efe0c462af304a1ae5a9d3f3ccd2c2\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 4679334 8c640c4a3323fe874fbf7736afbf592f\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 3846338 af689f1f43f75f242ee3b1ee1d8d5c98\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 3847118 3ee1d8be5f4e2e4c9e4d9e09cb9f31ac\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 7171242 1ddb30791997030df21a1ca98f4874af\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 18054 9174691199f426e382a8876fbb74d0ac\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 4684404 1d8dd72aa68218631bb8c53331bc30f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 3030092 dfddac8fdc4fee01d91dcb6a4eb28eea\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 2988820 3f1df983a7cf1691052fe9af1d84b7b1\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 4099956 49da290cf77d5a9a83dd2c365d347900\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 2135184 49d13799447a86acc1462c9d58c0e8e9\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 7035572 b4040a68e042f355c42af12cdc30a587\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 4665112 ce758787e61df3a2f1d4b43dccc68a00\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 18080 fbb7d48b4b95f67ce8777afa25168ddb\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_powerpc.deb\n Size/MD5 checksum: 16540 fde92bdf463104a5fd110846fbd10d6f\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 137990 10c69171982c0953614db790071fe897\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 137824 714f0b2cd873ea876d68d183fab7e59e\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 151838 ab7d3a6c324a2b64eb674148cead1393\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 152182 41e9c9254f399c29b0c198b6d94ca7ac\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 151902 0539b0f041ffbe37a75b71a5554ffd66\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 4681796 c5e92c06e7a9887639da199bc1b94f80\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 4691992 0f2e90800a27bf34f48ea5dc062cbb59\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 4799772 7a4ec03f1373d998539fe68d209589e3\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 2494658 54d0408ab521a0a5e0874c80ebdba402\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 1813568 f6a3da841cffbed57b7bf11119abaf0d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 13474368 134af15cd55b4b3848fdbdeff7ef214d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 12746708 631ef07000bc6f99e43011a63a65c43f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 13779958 5c40bd31a118b3bafda658e258379423\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 65396 a2d652c8bf5b5005597abda9918f02fc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 8710 4f867433a832c50e2920c4a3c21e4cb2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 8636 3c83da402850e2e86197a655e26377a2\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_s390.deb\n Size/MD5 checksum: 16892 6323a7ca3a316a8eaa412c2a2d9e0e7c\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-2_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 4578000 97fce93cc2ebc4da7c0a7bab1c157aef\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 2774574 86262b4b2bb4c6db5471c97dcc1747b4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390-tape_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 991868 a712b00ecf74c79fadeeb0f50b298618\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390x_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 2966354 5ebdd9b9fa80cdbdf0049683eaad24ee\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_sparc.deb\n Size/MD5 checksum: 15812 85f732679a460ea8bed9a7017dbfc0b8\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 8328 1e092e0877937ac5dbf46e347992c7d3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 2023482 b50d08e5c4c12fff4473e77babeda1ab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 162670 2c495f6b6e414dc24f2c676ecd84dda4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 164478 f59e33098dec7e1ff68b162aab6d56a6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 201214 fa92988ddfba0e9f03ace13f365dfc77\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 202452 d56ab1dd8ddb9d4b10de13c37c4c4af5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 3597102 1c5334adb92bbaf0ce96e82abcf6d77e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 3784076 3d1b5e5c3e147bf760c6077fa36eb783\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 6377902 7bd0e77ec9494b0ed352917b829fa5a0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 6543220 a73b077777c3a22ca9538666d3ff8aee\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "modified": "2005-12-14T00:00:00", "published": "2005-12-14T00:00:00", "id": "DEBIAN:DSA-921-1:C6057", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00322.html", "title": "[SECURITY] [DSA 921-1] New Linux 2.4.27 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-10-16T22:13:01", "bulletinFamily": "unix", "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 922-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nDecember 14th, 2005 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2004-2302 CVE-2005-0756 CVE-2005-0757 CVE-2005-1265\n CVE-2005-1761 CVE-2005-1762 CVE-2005-1763 CVE-2005-1765\n\t\t CVE-2005-1767 CVE-2005-2456 CVE-2005-2458 CVE-2005-2459\n\t\t CVE-2005-2548 CVE-2005-2801 CVE-2005-2872 CVE-2005-3105\n\t\t CVE-2005-3106 CVE-2005-3107 CVE-2005-3108 CVE-2005-3109\n\t\t CVE-2005-3110 CVE-2005-3271 CVE-2005-3272 CVE-2005-3273\n\t\t CVE-2005-3274 CVE-2005-3275 CVE-2005-3276\nBugTraq IDs : 14477 15527 15528 15533\nDebian Bugs : 309308 311164 321401 322237 322339\n\nSeveral local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilieis and Exposures project\nidentifies the following problems:\n\nCVE-2004-2302\n\n A race condition in the sysfs filesystem allows local users to\n read kernel memory and cause a denial of service (crash).\n\n\nCVE-2005-0756\n\n Alexander Nyberg discovered that the ptrace() system call does not\n properly verify addresses on the amd64 architecture which can be\n exploited by a local attacker to crash the kernel.\n\nCVE-2005-0757\n\n A problem in the offset handling in the xattr file system code for\n ext3 has been discovered that may allow users on 64-bit systems\n that have access to an ext3 filesystem with extended attributes to\n cause the kernel to crash.\n\nCVE-2005-1265\n\n Chris Wright discovered that the mmap() function could create\n illegal memory maps that could be exploited by a local user to\n crash the kernel or potentially execute arbitrary code.\n\nCVE-2005-1761\n\n A vulnerability on the IA-64 architecture can lead local attackers\n to overwrite kernel memory and crash the kernel.\n\nCVE-2005-1762\n\n A vulnerability has been discovered in the ptrace() system call on\n the amd64 architecture that allowas a local attacker to cause the\n kernel to crash.\n\nCVE-2005-1763\n\n A buffer overflow in the ptrace system call for 64-bit\n architectures allows local users to write bytes into arbitrary\n kernel memory.\n\nCVE-2005-1765\n\n Zou Nan Hai has discovered that a local user could cause the\n kernel to hang on the amd64 architecture after invoking syscall()\n with specially crafted arguments.\n\nCVE-2005-1767\n\n A vulnerability has been discovered in the stack segment fault\n handler that could allow a local attacker to cause stack exception\n that will leed the kernel to crash under certain circumstances.\n\nCVE-2005-2456\n\n Balazs Scheidler discovered that a local attacker could call\n setsockopt() with an invalid xfrm_user policy message which would\n cause the kernel to write beyond the boundaries of an array and\n crash.\n\nCVE-2005-2458\n\n Vladimir Volovich discovered a bug in the zlib routines which are\n also present in the Linux kernel and allows remote attackers to\n krash the kernel\n\nCVE-2005-2459\n\n Another vulnerability has been discovered in the zlib routines\n which are also present in the Linux kernel and allows remote\n attackers to crash the kernel\n\nCVE-2005-2548\n\n Peter Sandstrom noticed that snmpwalk from a remote host could\n cause a denial of service (kernel oops from null dereference) via\n certain UDP packets that lead to a function call with the wrong\n argument.\n\nCVE-2005-2801\n\n Andreas Gruenbacher discovered a bug in the ext2 and ext3 file\n systems. When data areas are to be shared among two inodes not\n all information were compared for equality, which could expose\n wrong ACLs for files.\n\nCVE-2005-2872\n\n Chad Walstrom discovered that the ipt_recent kernel module on\n 64-bit processors such as AMD64 ows remote attackers to cause a\n denial of service (kernel panic) via certain attacks such as SSH\n brute force.\n\nCVE-2005-3105\n\n The mprotect code on Itanium IA-64 Montecito processors does not\n properly maintain cache coherency as required by the architecture,\n which allows local users to cause a denial of service and possibly\n corrupt data by modifying PTE protections.\n\nCVE-2005-3106\n\n A race condition in the thread management may allow local users to\n cause a denial of service (deadlock) when threads are sharing\n memory and waiting for a thread that has just performed an exec.\n\nCVE-2005-3107\n\n When one thread is tracing another thread that shares the same\n memory map a local user could cause a denial of service (deadlock)\n by forcing a core dump when the traced thread is in the\n TASK_TRACED state.\n\nCVE-2005-3108\n\n A bug in the ioremap() system call has been discovered on the\n amd65 architecture that could allow local users to cause a\n denial of service or an information leak when performing a lookup\n of a non-existant memory page.\n\nCVE-2005-3109\n\n The HFS and HFS+ (hfsplus) modules allow local attackers to cause\n a denial of service (oops) by using hfsplus to mount a filesystem\n that is not hfsplus.\n\nCVE-2005-3110\n\n A race ondition in the ebtables netfilter module on an SMB system\n running under high load may allow remote attackers to cause a\n denial of service (crash).\n\nCVE-2005-3271\n\n Roland McGrath discovered exec() does not properly clear\n posix-timers in multi-threaded environments, which results in a\n resource leak and could allow a large number of multiple local\n users to cause a denial of service by using more posix-timers than\n specified by the quota for a single user.\n\nCVE-2005-3272\n\n The kernel allows remote attackers to poison the bridge forwarding\n table using frames that have already been dropped by filtering,\n which can cause the bridge to forward spoofed packets.\n\nCVE-2005-3273\n\n The ioctl for the packet radio ROSE protocol does not properly\n verify the arguments when setting a new router, which allows\n attackers to trigger out-of-bounds errors.\n\nCVE-2005-3274\n\n A race condition in on SMP systems allows local users to cause a\n denial of service (null dereference) by causing a connection timer\n to expire while the connection table is being flushed before the\n appropriate lock is acquired.\n\nCVE-2005-3275\n\n An error in the NAT code allows remote attackers to cause a denial\n of service (memory corruption) by causing two packets for the same\n protocol to be NATed at the same time, which leads to memory\n corruption.\n\nCVE-2005-3276\n\n A missing memory cleanup in the thread handling routines before\n copying data into userspace allows a user process to obtain\n sensitive information.\n\nThis update also contains a number of corrections for issues that\nturned out to have no security implication afterwards.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\nSource 2.6.8-16sarge1\nAlpha architecture 2.6.8-16sarge1\nAMD64 architecture 2.6.8-16sarge1\nHP Precision architecture 2.6.8-6sarge1\nIntel IA-32 architecture 2.6.8-16sarge1\nIntel IA-64 architecture 2.6.8-14sarge1\nMotorola 680x0 architecture 2.6.8-4sarge1\nPowerPC architecture 2.6.8-12sarge1\nIBM S/390 architecture 2.6.8-5sarge1\nSun Sparc architecture 2.6.8-15sarge1\n\nWe recommend that you upgrade your kernel package immediately and\nreboot the machine.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc\n Size/MD5 checksum: 1001 84ee501faac6cc5966fea3326bc5f6f0\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz\n Size/MD5 checksum: 961237 cd72f4d2eb2309a2d77d2ec7a3471c7c\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz\n Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc\n Size/MD5 checksum: 812 9b010ed11a18ae7a63ca1c0d9ce6b520\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz\n Size/MD5 checksum: 37158 c1e462dc0aceed47aeba4788de1ef813\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc\n Size/MD5 checksum: 1097 19abba41030b997320056d4006afaec3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz\n Size/MD5 checksum: 73962 73afecb44cda1a833afae9ade8592ae6\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge1.dsc\n Size/MD5 checksum: 1008 f8913a5c70c8e6db41ba33582aa1eedd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge1.tar.gz\n Size/MD5 checksum: 65779 f6d20923c5a468b8c396f396d3f54468\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc\n Size/MD5 checksum: 1047 8f17db00dbe1e0cfe9959e0ede3abad7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz\n Size/MD5 checksum: 88795 b5551e3a6f67218c2a37514b8662e4b7\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc\n Size/MD5 checksum: 1191 1450b82c0ebd64a2f89e5b39b6fba66f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz\n Size/MD5 checksum: 62501 04ce7a79112bf21d7732b362bf2f2a8c\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge1.dsc\n Size/MD5 checksum: 874 cc02a1965a5236b0b56418924aeca2b2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge1.tar.gz\n Size/MD5 checksum: 14227 fc0f38314b443bc4375a230622c69bed\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc\n Size/MD5 checksum: 1026 628e05a33d5383d644c40c44b5a262a8\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz\n Size/MD5 checksum: 24891 c099d3dc524bff486e3ac3aaed728baf\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc\n Size/MD5 checksum: 833 0ca25fa6cf5060acbd7f86ee78b10fcb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz\n Size/MD5 checksum: 11363 cc5f02d8a1cc1c93edfd229bdcc9cb53\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge1.dsc\n Size/MD5 checksum: 1036 28ddac5872f5c07438473aa97b0babb0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge1.tar.gz\n Size/MD5 checksum: 22734 5a9d2e75078588a6f94918aebc25e89b\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb\n Size/MD5 checksum: 6179472 b7388d2256a4396d2da938a687b3ab9b\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb\n Size/MD5 checksum: 1007230 309f32838373e76c9b61be0e6c191252\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb\n Size/MD5 checksum: 34934446 65dca34768d7aa10074845d9b2f20431\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb\n Size/MD5 checksum: 32120 5b04fd03ede3ae235a03624dc53e2026\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb\n Size/MD5 checksum: 9182 04e70fd86504e721ad91a2b3352231d2\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 4972 9373407fba3ac5dd750058711dbaba35\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5040 0e0546f2897a3a4e70efe7a564fb6aff\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5002 ec64c94170f496062172d743aee4442a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5068 bf99db45889934b45ce4834b9c770b16\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 4972 db66d54714fc6042db69d30918c51b02\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5040 7712bc3701d2548903dd5b9337ab3b91\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 4994 6621e8ce1be6e3f4a8b41991d834b144\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5064 d0f9af9891bd728a119763fddc6d3394\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3304098 c9e4aeaa7b178b3396e8784dab38cc00\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3097378 d1f63a282acbc6b3f6891617b9350fae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3010318 9b541a162fc8d966abf43c2a9fdce4d8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 2983934 73a518deadceae9ea5ee730fbaae8c61\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3171548 0c9ffc6fe6914da804987a43cd74e9f7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 2975620 b1bc12e308b7abf81ae7878680f17617\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3044876 d578ffdb0e11b61cb6446d599b160560\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3102300 9936cab2275643f32728c4f6d4dc77ad\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 2988830 fa46326fc2398c39d044bda9120dbea0\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 5083010 42c4dd8c6c67ce7940f0d24bb745385c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 2973758 c8d12dd2fbddca3ab1b7bd905de4a90c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 1140118 328edfc2944127e2f1d6dca1842ce51d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 3179326 487c36323990a6ae1119f4c30f16cdd9\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "modified": "2005-12-14T00:00:00", "published": "2005-12-14T00:00:00", "id": "DEBIAN:DSA-922-1:C3994", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00323.html", "title": "[SECURITY] [DSA 922-1] New Linux 2.6.8 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2018-12-11T17:45:43", "bulletinFamily": "unix", "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is the sixth regular kernel update to Red Hat Enterprise Linux 3.\r\n\r\nNew features introduced by this update include:\r\n\r\n - diskdump support on HP Smart Array devices\r\n - netconsole/netdump support over bonded interfaces\r\n - new chipset and device support via PCI table updates\r\n - support for new \"oom-kill\" and \"kscand_work_percent\" sysctls\r\n - support for dual core processors and ACPI Power Management timers on\r\n AMD64 and Intel EM64T systems\r\n\r\nThere were many bug fixes in various parts of the kernel. The ongoing\r\neffort to resolve these problems has resulted in a marked improvement in\r\nthe reliability and scalability of Red Hat Enterprise Linux 3.\r\n\r\nThere were numerous driver updates and security fixes (elaborated below).\r\nOther key areas affected by fixes in this update include kswapd, inode\r\nhandling, the SATA subsystem, diskdump handling, ptrace() syscall support,\r\nand signal handling.\r\n\r\nThe following device drivers have been upgraded to new versions:\r\n\r\n 3w-9xxx ---- 2.24.03.008RH\r\n cciss ------ 2.4.58.RH1\r\n e100 ------- 3.4.8-k2\r\n e1000 ------ 6.0.54-k2\r\n emulex ----- 7.3.2\r\n fusion ----- 2.06.16i.01\r\n iscsi ------ 3.6.2.1\r\n ipmi ------- 35.4\r\n lpfcdfc ---- 1.2.1\r\n qlogic ----- 7.05.00-RH1\r\n tg3 -------- 3.27RH\r\n\r\nThe following security bugs were fixed in this update:\r\n\r\n - a flaw in syscall argument checking on Itanium systems that allowed\r\n a local user to cause a denial of service (crash) (CAN-2005-0136)\r\n\r\n - a flaw in stack expansion that allowed a local user of mlockall()\r\n to cause a denial of service (memory exhaustion) (CAN-2005-0179)\r\n\r\n - a small memory leak in network packet defragmenting that allowed a\r\n remote user to cause a denial of service (memory exhaustion) on\r\n systems using netfilter (CAN-2005-0210)\r\n\r\n - flaws in ptrace() syscall handling on AMD64 and Intel EM64T systems\r\n that allowed a local user to cause a denial of service (crash)\r\n (CAN-2005-0756, CAN-2005-1762, CAN-2005-2553)\r\n\r\n - flaws in ISO-9660 file system handling that allowed the mounting of\r\n an invalid image on a CD-ROM to cause a denial of service (crash)\r\n or potentially execute arbitrary code (CAN-2005-0815)\r\n\r\n - a flaw in ptrace() syscall handling on Itanium systems that allowed\r\n a local user to cause a denial of service (crash) (CAN-2005-1761)\r\n\r\n - a flaw in the alternate stack switching on AMD64 and Intel EM64T\r\n systems that allowed a local user to cause a denial of service\r\n (crash) (CAN-2005-1767)\r\n\r\n - race conditions in the ia32-compat support for exec() syscalls on\r\n AMD64, Intel EM64T, and Itanium systems that could allow a local\r\n user to cause a denial of service (crash) (CAN-2005-1768)\r\n\r\n - flaws in IPSEC network handling that allowed a local user to cause\r\n a denial of service or potentially gain privileges (CAN-2005-2456,\r\n CAN-2005-2555)\r\n\r\n - a flaw in sendmsg() syscall handling on 64-bit systems that allowed\r\n a local user to cause a denial of service or potentially gain\r\n privileges (CAN-2005-2490)\r\n\r\n - flaws in unsupported modules that allowed denial-of-service attacks\r\n (crashes) or local privilege escalations on systems using the drm,\r\n coda, or moxa modules (CAN-2004-1056, CAN-2005-0124, CAN-2005-0504)\r\n\r\n - potential leaks of kernel data from jfs and ext2 file system handling\r\n (CAN-2004-0181, CAN-2005-0400)\r\n\r\nNote: The kernel-unsupported package contains various drivers and modules\r\nthat are unsupported and therefore might contain security problems that\r\nhave not been addressed.\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\r\nkernels to the packages associated with their machine architectures\r\nand configurations as listed in this erratum.", "modified": "2017-07-29T20:27:13", "published": "2005-09-28T04:00:00", "id": "RHSA-2005:663", "href": "https://access.redhat.com/errata/RHSA-2005:663", "type": "redhat", "title": "(RHSA-2005:663) Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}], "centos": [{"lastseen": "2017-10-12T14:45:05", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2005:663\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is the sixth regular kernel update to Red Hat Enterprise Linux 3.\r\n\r\nNew features introduced by this update include:\r\n\r\n - diskdump support on HP Smart Array devices\r\n - netconsole/netdump support over bonded interfaces\r\n - new chipset and device support via PCI table updates\r\n - support for new \"oom-kill\" and \"kscand_work_percent\" sysctls\r\n - support for dual core processors and ACPI Power Management timers on\r\n AMD64 and Intel EM64T systems\r\n\r\nThere were many bug fixes in various parts of the kernel. The ongoing\r\neffort to resolve these problems has resulted in a marked improvement in\r\nthe reliability and scalability of Red Hat Enterprise Linux 3.\r\n\r\nThere were numerous driver updates and security fixes (elaborated below).\r\nOther key areas affected by fixes in this update include kswapd, inode\r\nhandling, the SATA subsystem, diskdump handling, ptrace() syscall support,\r\nand signal handling.\r\n\r\nThe following device drivers have been upgraded to new versions:\r\n\r\n 3w-9xxx ---- 2.24.03.008RH\r\n cciss ------ 2.4.58.RH1\r\n e100 ------- 3.4.8-k2\r\n e1000 ------ 6.0.54-k2\r\n emulex ----- 7.3.2\r\n fusion ----- 2.06.16i.01\r\n iscsi ------ 3.6.2.1\r\n ipmi ------- 35.4\r\n lpfcdfc ---- 1.2.1\r\n qlogic ----- 7.05.00-RH1\r\n tg3 -------- 3.27RH\r\n\r\nThe following security bugs were fixed in this update:\r\n\r\n - a flaw in syscall argument checking on Itanium systems that allowed\r\n a local user to cause a denial of service (crash) (CAN-2005-0136)\r\n\r\n - a flaw in stack expansion that allowed a local user of mlockall()\r\n to cause a denial of service (memory exhaustion) (CAN-2005-0179)\r\n\r\n - a small memory leak in network packet defragmenting that allowed a\r\n remote user to cause a denial of service (memory exhaustion) on\r\n systems using netfilter (CAN-2005-0210)\r\n\r\n - flaws in ptrace() syscall handling on AMD64 and Intel EM64T systems\r\n that allowed a local user to cause a denial of service (crash)\r\n (CAN-2005-0756, CAN-2005-1762, CAN-2005-2553)\r\n\r\n - flaws in ISO-9660 file system handling that allowed the mounting of\r\n an invalid image on a CD-ROM to cause a denial of service (crash)\r\n or potentially execute arbitrary code (CAN-2005-0815)\r\n\r\n - a flaw in ptrace() syscall handling on Itanium systems that allowed\r\n a local user to cause a denial of service (crash) (CAN-2005-1761)\r\n\r\n - a flaw in the alternate stack switching on AMD64 and Intel EM64T\r\n systems that allowed a local user to cause a denial of service\r\n (crash) (CAN-2005-1767)\r\n\r\n - race conditions in the ia32-compat support for exec() syscalls on\r\n AMD64, Intel EM64T, and Itanium systems that could allow a local\r\n user to cause a denial of service (crash) (CAN-2005-1768)\r\n\r\n - flaws in IPSEC network handling that allowed a local user to cause\r\n a denial of service or potentially gain privileges (CAN-2005-2456,\r\n CAN-2005-2555)\r\n\r\n - a flaw in sendmsg() syscall handling on 64-bit systems that allowed\r\n a local user to cause a denial of service or potentially gain\r\n privileges (CAN-2005-2490)\r\n\r\n - flaws in unsupported modules that allowed denial-of-service attacks\r\n (crashes) or local privilege escalations on systems using the drm,\r\n coda, or moxa modules (CAN-2004-1056, CAN-2005-0124, CAN-2005-0504)\r\n\r\n - potential leaks of kernel data from jfs and ext2 file system handling\r\n (CAN-2004-0181, CAN-2005-0400)\r\n\r\nNote: The kernel-unsupported package contains various drivers and modules\r\nthat are unsupported and therefore might contain security problems that\r\nhave not been addressed.\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\r\nkernels to the packages associated with their machine architectures\r\nand configurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-September/012214.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-September/012233.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-September/012234.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-September/012235.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-doc\nkernel-hugemem\nkernel-hugemem-unsupported\nkernel-smp\nkernel-smp-unsupported\nkernel-source\nkernel-unsupported\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-663.html", "modified": "2005-09-29T08:20:50", "published": "2005-09-28T16:08:41", "href": "http://lists.centos.org/pipermail/centos-announce/2005-September/012214.html", "id": "CESA-2005:663", "title": "kernel security update", "type": "centos", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}]}