ID CVE-2005-3180 Type cve Reporter cve@mitre.org Modified 2018-10-19T15:34:00
Description
The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.
{"osvdb": [{"lastseen": "2017-04-28T13:20:16", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 2.6.15 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://sourceforge.net/projects/orinoco\nVendor URL: http://www.kernel.org/\nVendor Specific News/Changelog Entry: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15\nVendor Specific News/Changelog Entry: http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.14-rc4\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/usn/usn-219-1)\n[Vendor Specific Advisory URL](http://www.trustix.org/errata/2006/0051/)\n[Vendor Specific Advisory URL](http://lists.suse.com/archive/suse-security-announce/2005-Dec/0002.html)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\n[Secunia Advisory ID:17280](https://secuniaresearch.flexerasoftware.com/advisories/17280/)\n[Secunia Advisory ID:17364](https://secuniaresearch.flexerasoftware.com/advisories/17364/)\n[Secunia Advisory ID:17826](https://secuniaresearch.flexerasoftware.com/advisories/17826/)\n[Secunia Advisory ID:17918](https://secuniaresearch.flexerasoftware.com/advisories/17918/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:17917](https://secuniaresearch.flexerasoftware.com/advisories/17917/)\n[Secunia Advisory ID:18562](https://secuniaresearch.flexerasoftware.com/advisories/18562/)\n[Secunia Advisory ID:17648](https://secuniaresearch.flexerasoftware.com/advisories/17648/)\n[Secunia Advisory ID:18684](https://secuniaresearch.flexerasoftware.com/advisories/18684/)\n[Secunia Advisory ID:21954](https://secuniaresearch.flexerasoftware.com/advisories/21954/)\n[Secunia Advisory ID:17114](https://secuniaresearch.flexerasoftware.com/advisories/17114/)\n[Related OSVDB ID: 22393](https://vulners.com/osvdb/OSVDB:22393)\n[Related OSVDB ID: 19923](https://vulners.com/osvdb/OSVDB:19923)\n[Related OSVDB ID: 19924](https://vulners.com/osvdb/OSVDB:19924)\n[Related OSVDB ID: 22389](https://vulners.com/osvdb/OSVDB:22389)\n[Related OSVDB ID: 22390](https://vulners.com/osvdb/OSVDB:22390)\n[Related OSVDB ID: 22392](https://vulners.com/osvdb/OSVDB:22392)\n[Related OSVDB ID: 22394](https://vulners.com/osvdb/OSVDB:22394)\nRedHat RHSA: RHSA-2005:808\nRedHat RHSA: RHSA-2006:0140\nRedHat RHSA: RHSA-2006:0190\nOther Advisory URL: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:219\nOther Advisory URL: http://o0o.nu/~meder/o0o_linux_orinoco_driver_info_leak.txt\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Dec/0004.html\nMail List Post: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9bc39bec87ee3e35897fe27441e979e7c208f624\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0298.html\n[CVE-2005-3180](https://vulners.com/cve/CVE-2005-3180)\n", "modified": "2005-10-12T02:48:45", "published": "2005-10-12T02:48:45", "href": "https://vulners.com/osvdb/OSVDB:19925", "id": "OSVDB:19925", "type": "osvdb", "title": "Linux Kernel Orinoco Driver Remote Memory Segment Disclosure", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "nessus": [{"lastseen": "2019-11-01T02:26:28", "bulletinFamily": "scanner", "description": "This update fixes the outstanding kernel security issues for FC3, and\nfixes a number of regressions in the previous update kernel.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2005-1007.NASL", "href": "https://www.tenable.com/plugins/nessus/20073", "published": "2005-10-24T00:00:00", "title": "Fedora Core 3 : kernel-2.6.12-1.1380_FC3 (2005-1007)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2005-1007.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20073);\n script_version (\"1.13\");\n script_cvs_date(\"Date: 2019/08/02 13:32:23\");\n\n script_cve_id(\"CVE-2005-2973\", \"CVE-2005-3179\", \"CVE-2005-3180\", \"CVE-2005-3181\");\n script_xref(name:\"FEDORA\", value:\"2005-1007\");\n\n script_name(english:\"Fedora Core 3 : kernel-2.6.12-1.1380_FC3 (2005-1007)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes the outstanding kernel security issues for FC3, and\nfixes a number of regressions in the previous update kernel.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2005-October/001501.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?62f00491\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/10/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 3.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC3\", reference:\"kernel-2.6.12-1.1380_FC3\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"kernel-debuginfo-2.6.12-1.1380_FC3\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"kernel-doc-2.6.12-1.1380_FC3\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"kernel-smp-2.6.12-1.1380_FC3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-doc / kernel-smp\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T03:20:12", "bulletinFamily": "scanner", "description": "Updated kernel packages that fix several security issues and a page\nattribute mapping bug are now available for Red Hat Enterprise Linux\n4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nAn issue was discovered that affects how page attributes are changed\nby the kernel. Video drivers, which sometimes map kernel pages with a\ndifferent caching policy than write-back, are now expected to function\ncorrectly. This change affects the x86, AMD64, and Intel EM64T\narchitectures.\n\nIn addition the following security bugs were fixed :\n\nThe set_mempolicy system call did not check for negative numbers in\nthe policy field. An unprivileged local user could use this flaw to\ncause a denial of service (system panic). (CVE-2005-3053)\n\nA flaw in ioremap handling on AMD 64 and Intel EM64T systems. An\nunprivileged local user could use this flaw to cause a denial of\nservice or minor information leak. (CVE-2005-3108)\n\nA race condition in the ebtables netfilter module. On a SMP system\nthat is operating under a heavy load this flaw may allow remote\nattackers to cause a denial of service (crash). (CVE-2005-3110)\n\nA memory leak was found in key handling. An unprivileged local user\ncould use this flaw to cause a denial of service. (CVE-2005-3119)\n\nA flaw in the Orinoco wireless driver. On systems running the\nvulnerable drive, a remote attacker could send carefully crafted\npackets which would divulge the contents of uninitialized kernel\nmemory. (CVE-2005-3180)\n\nA memory leak was found in the audit system. An unprivileged local\nuser could use this flaw to cause a denial of service. (CVE-2005-3181)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2005-808.NASL", "href": "https://www.tenable.com/plugins/nessus/20104", "published": "2005-10-28T00:00:00", "title": "RHEL 4 : kernel (RHSA-2005:808)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:808. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20104);\n script_version (\"1.25\");\n script_cvs_date(\"Date: 2019/10/25 13:36:11\");\n\n script_cve_id(\"CVE-2005-3053\", \"CVE-2005-3108\", \"CVE-2005-3110\", \"CVE-2005-3119\", \"CVE-2005-3180\", \"CVE-2005-3181\");\n script_xref(name:\"RHSA\", value:\"2005:808\");\n\n script_name(english:\"RHEL 4 : kernel (RHSA-2005:808)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues and a page\nattribute mapping bug are now available for Red Hat Enterprise Linux\n4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nAn issue was discovered that affects how page attributes are changed\nby the kernel. Video drivers, which sometimes map kernel pages with a\ndifferent caching policy than write-back, are now expected to function\ncorrectly. This change affects the x86, AMD64, and Intel EM64T\narchitectures.\n\nIn addition the following security bugs were fixed :\n\nThe set_mempolicy system call did not check for negative numbers in\nthe policy field. An unprivileged local user could use this flaw to\ncause a denial of service (system panic). (CVE-2005-3053)\n\nA flaw in ioremap handling on AMD 64 and Intel EM64T systems. An\nunprivileged local user could use this flaw to cause a denial of\nservice or minor information leak. (CVE-2005-3108)\n\nA race condition in the ebtables netfilter module. On a SMP system\nthat is operating under a heavy load this flaw may allow remote\nattackers to cause a denial of service (crash). (CVE-2005-3110)\n\nA memory leak was found in key handling. An unprivileged local user\ncould use this flaw to cause a denial of service. (CVE-2005-3119)\n\nA flaw in the Orinoco wireless driver. On systems running the\nvulnerable drive, a remote attacker could send carefully crafted\npackets which would divulge the contents of uninitialized kernel\nmemory. (CVE-2005-3180)\n\nA memory leak was found in the audit system. An unprivileged local\nuser could use this flaw to cause a denial of service. (CVE-2005-3181)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3053\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3119\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:808\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/09/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/10/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2005-3053\", \"CVE-2005-3108\", \"CVE-2005-3110\", \"CVE-2005-3119\", \"CVE-2005-3180\", \"CVE-2005-3181\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2005:808\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:808\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-2.6.9-22.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-devel-2.6.9-22.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-doc-2.6.9-22.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-2.6.9-22.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-devel-2.6.9-22.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-2.6.9-22.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-devel-2.6.9-22.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.0.1.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T02:15:03", "bulletinFamily": "scanner", "description": "Updated kernel packages that fix several security issues and a page\nattribute mapping bug are now available for Red Hat Enterprise Linux\n4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nAn issue was discovered that affects how page attributes are changed\nby the kernel. Video drivers, which sometimes map kernel pages with a\ndifferent caching policy than write-back, are now expected to function\ncorrectly. This change affects the x86, AMD64, and Intel EM64T\narchitectures.\n\nIn addition the following security bugs were fixed :\n\nThe set_mempolicy system call did not check for negative numbers in\nthe policy field. An unprivileged local user could use this flaw to\ncause a denial of service (system panic). (CVE-2005-3053)\n\nA flaw in ioremap handling on AMD 64 and Intel EM64T systems. An\nunprivileged local user could use this flaw to cause a denial of\nservice or minor information leak. (CVE-2005-3108)\n\nA race condition in the ebtables netfilter module. On a SMP system\nthat is operating under a heavy load this flaw may allow remote\nattackers to cause a denial of service (crash). (CVE-2005-3110)\n\nA memory leak was found in key handling. An unprivileged local user\ncould use this flaw to cause a denial of service. (CVE-2005-3119)\n\nA flaw in the Orinoco wireless driver. On systems running the\nvulnerable drive, a remote attacker could send carefully crafted\npackets which would divulge the contents of uninitialized kernel\nmemory. (CVE-2005-3180)\n\nA memory leak was found in the audit system. An unprivileged local\nuser could use this flaw to cause a denial of service. (CVE-2005-3181)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2005-808.NASL", "href": "https://www.tenable.com/plugins/nessus/21967", "published": "2006-07-05T00:00:00", "title": "CentOS 4 : kernel (CESA-2005:808)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:808 and \n# CentOS Errata and Security Advisory 2005:808 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21967);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/10/25 13:36:03\");\n\n script_cve_id(\"CVE-2005-3053\", \"CVE-2005-3108\", \"CVE-2005-3110\", \"CVE-2005-3119\", \"CVE-2005-3180\", \"CVE-2005-3181\");\n script_xref(name:\"RHSA\", value:\"2005:808\");\n\n script_name(english:\"CentOS 4 : kernel (CESA-2005:808)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues and a page\nattribute mapping bug are now available for Red Hat Enterprise Linux\n4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nAn issue was discovered that affects how page attributes are changed\nby the kernel. Video drivers, which sometimes map kernel pages with a\ndifferent caching policy than write-back, are now expected to function\ncorrectly. This change affects the x86, AMD64, and Intel EM64T\narchitectures.\n\nIn addition the following security bugs were fixed :\n\nThe set_mempolicy system call did not check for negative numbers in\nthe policy field. An unprivileged local user could use this flaw to\ncause a denial of service (system panic). (CVE-2005-3053)\n\nA flaw in ioremap handling on AMD 64 and Intel EM64T systems. An\nunprivileged local user could use this flaw to cause a denial of\nservice or minor information leak. (CVE-2005-3108)\n\nA race condition in the ebtables netfilter module. On a SMP system\nthat is operating under a heavy load this flaw may allow remote\nattackers to cause a denial of service (crash). (CVE-2005-3110)\n\nA memory leak was found in key handling. An unprivileged local user\ncould use this flaw to cause a denial of service. (CVE-2005-3119)\n\nA flaw in the Orinoco wireless driver. On systems running the\nvulnerable drive, a remote attacker could send carefully crafted\npackets which would divulge the contents of uninitialized kernel\nmemory. (CVE-2005-3180)\n\nA memory leak was found in the audit system. An unprivileged local\nuser could use this flaw to cause a denial of service. (CVE-2005-3181)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-October/012342.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fdbbd0e5\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-October/012343.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3f913df9\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-October/012344.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?281cedfe\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/09/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/10/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-devel-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-doc-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-22.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.0.1.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T03:20:12", "bulletinFamily": "scanner", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2006-0140.NASL", "href": "https://www.tenable.com/plugins/nessus/20751", "published": "2006-01-20T00:00:00", "title": "RHEL 3 : kernel (RHSA-2006:0140)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0140. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20751);\n script_version (\"1.26\");\n script_cvs_date(\"Date: 2019/10/25 13:36:11\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n script_bugtraq_id(14902);\n script_xref(name:\"RHSA\", value:\"2006:0140\");\n\n script_name(english:\"RHEL 3 : kernel (RHSA-2006:0140)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2002-2185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1057\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2708\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3275\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0140\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0140\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0140\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-doc-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-source-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-unsupported-2.4.21-37.0.1.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-11-01T03:20:12", "bulletinFamily": "scanner", "description": "Updated kernel packages that fix a number of security issues as well\nas other bugs are now available for Red Hat Enterprise Linux 2.1 (32\nbit architectures)\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a race condition that allowed local users to read the\n environment variables of another process (CVE-2004-1058,\n low)\n\n - a flaw in the open_exec function of execve that allowed\n a local user to read setuid ELF binaries that should\n otherwise be protected by standard permissions.\n (CVE-2004-1073, moderate). Red Hat originally reported\n this flaw as being fixed by RHSA-2004:504, but a patch\n for this issue was missing from that update.\n\n - a flaw in the coda module that allowed a local user to\n cause a denial of service (crash) or possibly gain\n privileges (CVE-2005-0124, moderate)\n\n - a potential leak of kernel data from ext2 file system\n handling (CVE-2005-0400, low)\n\n - flaws in ISO-9660 file system handling that allowed the\n mounting of an invalid image on a CD-ROM to cause a\n denial of service (crash) or potentially execute\n arbitrary code (CVE-2005-0815, moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\nThe following bugs were also addressed :\n\n - Handle set_brk() errors in binfmt_elf/aout\n\n - Correct error handling in shmem_ioctl\n\n - Correct scsi error return\n\n - Fix netdump time keeping bug\n\n - Fix netdump link-down freeze\n\n - Fix FAT fs deadlock\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2006-0191.NASL", "href": "https://www.tenable.com/plugins/nessus/20855", "published": "2006-02-05T00:00:00", "title": "RHEL 2.1 : kernel (RHSA-2006:0191)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0191. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20855);\n script_version (\"1.23\");\n script_cvs_date(\"Date: 2019/10/25 13:36:11\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1058\", \"CVE-2004-1073\", \"CVE-2005-0124\", \"CVE-2005-0400\", \"CVE-2005-0815\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\");\n script_xref(name:\"RHSA\", value:\"2006:0191\");\n\n script_name(english:\"RHEL 2.1 : kernel (RHSA-2006:0191)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix a number of security issues as well\nas other bugs are now available for Red Hat Enterprise Linux 2.1 (32\nbit architectures)\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a race condition that allowed local users to read the\n environment variables of another process (CVE-2004-1058,\n low)\n\n - a flaw in the open_exec function of execve that allowed\n a local user to read setuid ELF binaries that should\n otherwise be protected by standard permissions.\n (CVE-2004-1073, moderate). Red Hat originally reported\n this flaw as being fixed by RHSA-2004:504, but a patch\n for this issue was missing from that update.\n\n - a flaw in the coda module that allowed a local user to\n cause a denial of service (crash) or possibly gain\n privileges (CVE-2005-0124, moderate)\n\n - a potential leak of kernel data from ext2 file system\n handling (CVE-2005-0400, low)\n\n - flaws in ISO-9660 file system handling that allowed the\n mounting of an invalid image on a CD-ROM to cause a\n denial of service (crash) or potentially execute\n arbitrary code (CVE-2005-0815, moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\nThe following bugs were also addressed :\n\n - Handle set_brk() errors in binfmt_elf/aout\n\n - Correct error handling in shmem_ioctl\n\n - Correct scsi error return\n\n - Fix netdump time keeping bug\n\n - Fix netdump link-down freeze\n\n - Fix FAT fs deadlock\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2002-2185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0815\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3275\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0191\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-enterprise\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-summit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:2.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/02/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^2\\.1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 2.1\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2002-2185\", \"CVE-2004-1058\", \"CVE-2004-1073\", \"CVE-2005-0124\", \"CVE-2005-0400\", \"CVE-2005-0815\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0191\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0191\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-debug-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"kernel-doc-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-enterprise-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"kernel-headers-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-smp-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"kernel-source-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-summit-2.4.9-e.68\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-debug / kernel-doc / etc\");\n }\n}\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-11-01T02:54:58", "bulletinFamily": "scanner", "description": "Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\nand corrected in this update :\n\nA stack-based buffer overflow in the sendmsg function call in versions\nprior to 2.6.13.1 allow local users to execute arbitrary code by\ncalling sendmsg and modifying the message contents in another thread\n(CVE-2005-2490).\n\nThe raw_sendmsg function in versions prior to 2.6.13.1 allow local\nusers to cause a DoS (change hardware state) or read from arbitrary\nmemory via crafted input (CVE-2005-2492).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly\nperform certain tests when the jiffies value is greater than LONG_MAX,\nwhich can cause ipt_recent netfilter rules to block too early\n(CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local\nusers to cause a DoS (oops from null dereference) via fput in a 32bit\nioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\nfunction on 64-bit systems (CVE-2005-3044).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\nvia a userspace process that issues a USB Request Block (URB) to a USB\ndevice and terminates before the URB is finished, which leads to a\nstale pointer reference (CVE-2005-3055).\n\ndrm.c in version 2.6.13 and earlier creates a debug file in sysfs with\nworld-readable and world-writable permissions, allowing local users to\nenable DRM debugging and obtain sensitive information (CVE-2005-3179).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear\nmemory from a previously used packet whose length is increased,\nallowing remote attackers to obtain sensitive information\n(CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use\nan incorrect function to free names_cache memory, preventing the\nmemory from being tracked by AUDITSYSCALL code and leading to a memory\nleak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use\ncertain IOCTLs on terminals of other users and gain privileges\n(CVE-2005-3257).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\nrunning on SMP systems, allows local users to cause a DoS (null\ndereference) by causing a connection timer to expire while the\nconnection table is being flushed before the appropriate lock is\nacquired (CVE-2005-3274).\n\nThe provided packages are patched to fix these vulnerabilities. All\nusers are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate", "modified": "2019-11-02T00:00:00", "id": "MANDRAKE_MDKSA-2005-235.NASL", "href": "https://www.tenable.com/plugins/nessus/20466", "published": "2006-01-15T00:00:00", "title": "Mandrake Linux Security Advisory : kernel (MDKSA-2005:235)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2005:235. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20466);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2019/08/02 13:32:48\");\n\n script_cve_id(\"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2873\", \"CVE-2005-3044\", \"CVE-2005-3055\", \"CVE-2005-3179\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3274\");\n script_xref(name:\"MDKSA\", value:\"2005:235\");\n\n script_name(english:\"Mandrake Linux Security Advisory : kernel (MDKSA-2005:235)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\nand corrected in this update :\n\nA stack-based buffer overflow in the sendmsg function call in versions\nprior to 2.6.13.1 allow local users to execute arbitrary code by\ncalling sendmsg and modifying the message contents in another thread\n(CVE-2005-2490).\n\nThe raw_sendmsg function in versions prior to 2.6.13.1 allow local\nusers to cause a DoS (change hardware state) or read from arbitrary\nmemory via crafted input (CVE-2005-2492).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly\nperform certain tests when the jiffies value is greater than LONG_MAX,\nwhich can cause ipt_recent netfilter rules to block too early\n(CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local\nusers to cause a DoS (oops from null dereference) via fput in a 32bit\nioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\nfunction on 64-bit systems (CVE-2005-3044).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\nvia a userspace process that issues a USB Request Block (URB) to a USB\ndevice and terminates before the URB is finished, which leads to a\nstale pointer reference (CVE-2005-3055).\n\ndrm.c in version 2.6.13 and earlier creates a debug file in sysfs with\nworld-readable and world-writable permissions, allowing local users to\nenable DRM debugging and obtain sensitive information (CVE-2005-3179).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear\nmemory from a previously used packet whose length is increased,\nallowing remote attackers to obtain sensitive information\n(CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use\nan incorrect function to free names_cache memory, preventing the\nmemory from being tracked by AUDITSYSCALL code and leading to a memory\nleak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use\ncertain IOCTLs on terminals of other users and gain privileges\n(CVE-2005-3257).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\nrunning on SMP systems, allows local users to cause a DoS (null\ndereference) by causing a connection timer to expire while the\nconnection table is being flushed before the appropriate lock is\nacquired (CVE-2005-3274).\n\nThe provided packages are patched to fix these vulnerabilities. All\nusers are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-i586-up-1GB-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-smp-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-stripped-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xbox-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xen0-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xenU-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2006\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-i586-up-1GB-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-i686-up-4GB-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-smp-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-source-2.6-2.6.12-14mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-source-stripped-2.6-2.6.12-14mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xbox-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xen0-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xenU-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T02:15:04", "bulletinFamily": "scanner", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2006-0140.NASL", "href": "https://www.tenable.com/plugins/nessus/21881", "published": "2006-07-03T00:00:00", "title": "CentOS 3 : kernel (CESA-2006:0140)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0140 and \n# CentOS Errata and Security Advisory 2006:0140 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21881);\n script_version(\"1.19\");\n script_cvs_date(\"Date: 2019/10/25 13:36:03\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n script_bugtraq_id(14902);\n script_xref(name:\"RHSA\", value:\"2006:0140\");\n\n script_name(english:\"CentOS 3 : kernel (CESA-2006:0140)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012589.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?693a0367\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012590.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1a7ff693\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012593.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?325c1a7f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-doc-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-source-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-unsupported-2.4.21-37.0.1.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-10-28T21:22:07", "bulletinFamily": "scanner", "description": "The remote host is missing the patch for the advisory SUSE-SA:2005:067 (kernel).\n\n\nThis kernel update for SUSE Linux 10.0 contains fixes for XEN, various\nsecurity fixes and bug fixes.\n\nThis update includes a more recent snapshot of the upcoming XEN 3.0.\nMany bugs have been fixed. Stability for x86_64 has been improved.\nStability has been improved for SMP, and now both i586 and x86_64\nkernels are built with SMP support.\n\nIt also contains several security fixes :\n\n- CVE-2005-3783: A check in ptrace(2) handling that finds out if\na process is attaching to itself was incorrect and could be used\nby a local attacker to crash the machine.\n\n- CVE-2005-3784: A check in reaping of terminating child processes did\nnot consider ptrace(2) attached processes and would leave a ptrace\nreference dangling. This could lead to a local user being able to\ncrash the machine.\n\n- CVE-2005-3271: A task leak problem when releasing POSIX timers was\nfixed. This could lead to local users causing a local denial of\nservice by exhausting system memory.\n\n- CVE-2005-3805: A locking problem in POSIX timer handling could\nbe used by a local attacker on a SMP system to deadlock the machine.\n\n- CVE-2005-3181: A problem in the Linux auditing code could lead\nto a memory leak which finally could exhaust system memory of\na machine.\n\n- CVE-2005-2973: An infinite loop in the IPv6 UDP loopback handling\ncan be easily triggered by a local user and lead to a denial\nof service.\n\n- CVE-2005-3806: A bug in IPv6 flow label handling code could be used\nby a local attacker to free non-allocated memory and in turn corrupt\nkernel memory and likely crash the machine.\n\n- CVE-2005-3807: A memory kernel leak in VFS lease handling can\nexhaust the machine memory and so cause a local denial of\nservice. This is seen in regular Samba use and could also be\ntriggered by local attackers.\n\n- CVE-2005-3055: Unplugging an user space controlled USB device with\nan URB pending in user space could crash the kernel. This can be\neasily triggered by local attacker.\n\n- CVE-2005-3180: Fixed incorrect padding in Orinoco wireless driver,\nwhich could expose kernel data to the air.\n\n- CVE-2005-3044: Missing sockfd_put() calls in routing_ioctl() leaked\nfile handles which in turn could exhaust system memory.\n\n- CVE-2005-3527: A race condition in do_coredump in signal.c allows\nlocal users to cause a denial of service (machine hang) by triggering\na core dump in one thread while another thread has a pending SIGSTOP.", "modified": "2005-12-08T00:00:00", "id": "SUSE_SA_2005_067.NASL", "href": "https://www.tenable.com/plugins/nessus/20282", "published": "2005-12-08T00:00:00", "title": "SUSE-SA:2005:067: kernel", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2005:067\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(20282);\n script_version (\"1.8\");\n \n name[\"english\"] = \"SUSE-SA:2005:067: kernel\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2005:067 (kernel).\n\n\nThis kernel update for SUSE Linux 10.0 contains fixes for XEN, various\nsecurity fixes and bug fixes.\n\nThis update includes a more recent snapshot of the upcoming XEN 3.0.\nMany bugs have been fixed. Stability for x86_64 has been improved.\nStability has been improved for SMP, and now both i586 and x86_64\nkernels are built with SMP support.\n\nIt also contains several security fixes :\n\n- CVE-2005-3783: A check in ptrace(2) handling that finds out if\na process is attaching to itself was incorrect and could be used\nby a local attacker to crash the machine.\n\n- CVE-2005-3784: A check in reaping of terminating child processes did\nnot consider ptrace(2) attached processes and would leave a ptrace\nreference dangling. This could lead to a local user being able to\ncrash the machine.\n\n- CVE-2005-3271: A task leak problem when releasing POSIX timers was\nfixed. This could lead to local users causing a local denial of\nservice by exhausting system memory.\n\n- CVE-2005-3805: A locking problem in POSIX timer handling could\nbe used by a local attacker on a SMP system to deadlock the machine.\n\n- CVE-2005-3181: A problem in the Linux auditing code could lead\nto a memory leak which finally could exhaust system memory of\na machine.\n\n- CVE-2005-2973: An infinite loop in the IPv6 UDP loopback handling\ncan be easily triggered by a local user and lead to a denial\nof service.\n\n- CVE-2005-3806: A bug in IPv6 flow label handling code could be used\nby a local attacker to free non-allocated memory and in turn corrupt\nkernel memory and likely crash the machine.\n\n- CVE-2005-3807: A memory kernel leak in VFS lease handling can\nexhaust the machine memory and so cause a local denial of\nservice. This is seen in regular Samba use and could also be\ntriggered by local attackers.\n\n- CVE-2005-3055: Unplugging an user space controlled USB device with\nan URB pending in user space could crash the kernel. This can be\neasily triggered by local attacker.\n\n- CVE-2005-3180: Fixed incorrect padding in Orinoco wireless driver,\nwhich could expose kernel data to the air.\n\n- CVE-2005-3044: Missing sockfd_put() calls in routing_ioctl() leaked\nfile handles which in turn could exhaust system memory.\n\n- CVE-2005-3527: A race condition in do_coredump in signal.c allows\nlocal users to cause a denial of service (machine hang) by triggering\na core dump in one thread while another thread has a pending SIGSTOP.\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.suse.de/security/advisories/2005_67_kernel.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2005/12/08\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the kernel package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"Intel-536ep-4.69-14.2\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-nongpl-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-nongpl-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-nongpl-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-source-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-syms-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-nongpl-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-xen-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-xen-nongpl-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-kernel-2.6.13-15.7\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xen-3.0_7608-2.1\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xen-devel-3.0_7608-2.1\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xen-doc-html-3.0_7608-2.1\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xen-doc-pdf-3.0_7608-2.1\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xen-doc-ps-3.0_7608-2.1\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xen-tools-3.0_7608-2.1\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"xen-tools-ioemu-3.0_7608-2.1\", release:\"SUSE10.0\") )\n{\n security_hole(0);\n exit(0);\n}\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-11-03T12:30:50", "bulletinFamily": "scanner", "description": "Al Viro discovered a race condition in the /proc file handler of\nnetwork devices. A local attacker could exploit this by opening any\nfile in /proc/sys/net/ipv4/conf/<interface>/ and waiting until that\ninterface was shut down. Under certain circumstances this could lead\nto a kernel crash or even arbitrary code execution with full kernel\nprivileges. (CVE-2005-2709)\n\nTetsuo Handa discovered a local Denial of Service vulnerability in the\nudp_v6_get_port() function. On computers which use IPv6, a local\nattacker could exploit this to trigger an infinite loop in the kernel.\n(CVE-2005-2973)\n\nHarald Welte discovered a Denial of Service vulnerability in the USB\ndevio driver. A local attacker could exploit this by sending an ", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-219-1.NASL", "href": "https://www.tenable.com/plugins/nessus/65105", "published": "2013-03-09T00:00:00", "title": "Ubuntu 4.10 / 5.10 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities (USN-219-1)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-219-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65105);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/08/02 13:33:00\");\n\n script_cve_id(\"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3271\", \"CVE-2005-3272\", \"CVE-2005-3273\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-3276\");\n script_xref(name:\"USN\", value:\"219-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.10 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities (USN-219-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Al Viro discovered a race condition in the /proc file handler of\nnetwork devices. A local attacker could exploit this by opening any\nfile in /proc/sys/net/ipv4/conf/<interface>/ and waiting until that\ninterface was shut down. Under certain circumstances this could lead\nto a kernel crash or even arbitrary code execution with full kernel\nprivileges. (CVE-2005-2709)\n\nTetsuo Handa discovered a local Denial of Service vulnerability in the\nudp_v6_get_port() function. On computers which use IPv6, a local\nattacker could exploit this to trigger an infinite loop in the kernel.\n(CVE-2005-2973)\n\nHarald Welte discovered a Denial of Service vulnerability in the USB\ndevio driver. A local attacker could exploit this by sending an 'USB\nRequest Block' (URB) and terminating the sending process before the\narrival of the answer, which left an invalid pointer and caused a\nkernel crash. (CVE-2005-3055)\n\nPavel Roskin discovered an information leak in the Orinoco wireless\ncard driver. When increasing the buffer length for storing data, the\nbuffer was not padded with zeros, which exposed a random part of the\nsystem memory to the user. (CVE-2005-3180)\n\nA resource leak has been discovered in the handling of POSIX timers in\nthe exec() function. This could be exploited to a Denial of Service\nattack by a group of local users. This vulnerability only affects\nUbuntu 4.10. (CVE-2005-3271)\n\nStephen Hemming discovered a weakness in the network bridge driver.\nPackets which had already been dropped by the packet filter could\npoison the forwarding table, which could be exploited to make the\nbridge forward spoofed packages. This vulnerability only affects\nUbuntu 4.10 and 5.04. (CVE-2005-3272)\n\nDavid S. Miller discovered a buffer overflow in the rose_rt_ioctl()\nfunction. By calling the function with a large 'ngidis' argument, a\nlocal attacker could cause a kernel crash. This vulnerability only\naffects Ubuntu 4.10 and 5.04. (CVE-2005-3273)\n\nNeil Horman discovered a race condition in the connection timer\nhandling. This allowed a local attacker to set up an expiration\nhandler which modified the connection list while the list still being\ntraversed, which could result in a kernel crash. This vulnerability\nonly affects multiprocessor (SMP) systems. (CVE-2005-3274)\n\nPatrick McHardy noticed a logic error in the network address\ntranslation (NAT) connection tracker. A remote attacker could exploit\nthis by causing two packets for the same protocol to be NATed at the\nsame time, which resulted in a kernel crash. (CVE-2005-3275)\n\nPaolo Giarrusso discovered an information leak in the\nsys_get_thread_area(). The returned structure was not properly\ncleared, which exposed a small amount of kernel memory to userspace\nprograms. This could possibly expose confidential data.\n(CVE-2005-3276).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/11/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2013-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-doc-2.6.8.1\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-386\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-686\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-686-smp\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-generic\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-k8\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-k8-smp\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-xeon\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-386\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-686\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-686-smp\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-generic\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-k8\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-k8-smp\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-xeon\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-patch-debian-2.6.8.1\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-source-2.6.8.1\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-tree-2.6.8.1\", pkgver:\"2.6.8.1-16.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-doc-2.6.12\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-386\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-686\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-686-smp\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-generic\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-k8\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-k8-smp\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-xeon\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-386\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-686\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-686-smp\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-generic\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-k8\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-k8-smp\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-xeon\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-patch-ubuntu-2.6.12\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-source-2.6.12\", pkgver:\"2.6.12-10.24\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-tree-2.6.12\", pkgver:\"2.6.12-10.24\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.12 / linux-doc-2.6.8.1 / linux-headers-2.6 / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2017-10-29T13:44:45", "bulletinFamily": "scanner", "description": "Multiple vulnerabilities in the Linux 2.6 kernel have been discovered and corrected in this update:\n\nThe kernel on x86_64 platforms does not use a guard page for the 47-bit address page to protect against an AMD K8 bug which allows a local user to cause a DoS (CVE-2005-1764).\n\nThe KEYCTL_JOIN_SESSION_KEYRING operation in versions prior to 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a DoS (semaphore hang) via a new session keyring with an empty name string, a long name string, the key quota reached, or ENOMEM (CVE-2005-2098).\n\nKernels prior to 2.6.12.5 do not properly destroy a keyring that is not instantiated properly, allowing a local user or remote attacker to cause a DoS (oops) via a keyring with a payload that is not empty (CVE-2005-2099).\n\nAn array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c allows local users to cause a DoS (oops or deadlock) and possibly execute arbitrary code (CVE-2005-2456).\n\nThe zisofs driver in versions prior to 2.6.12.5 allows local users and remove attackers to cause a DoS (crash) via a crafted compressed ISO filesystem (CVE-2005-2457).\n\ninflate.c in the zlib routines in versions prior to 2.6.12.5 allow remove attackers to cause a DoS (crash) via a compressed file with 'improper tables' (CVE-2005-2458).\n\nThe huft_build function in inflate.c in the zlib routines in versions prior to 2.6.12.5 returns the wrong value, allowing remote attackers to cause a DoS (crash) via a certain compressed file that leads to a NULL pointer dereference (CVE-2005-2459).\n\nA stack-based buffer overflow in the sendmsg function call in versions prior to 2.6.13.1 allow local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread (CVE-2005-2490).\n\nThe raw_sendmsg function in versions prior to 2.6.13.1 allow local users to cause a DoS (change hardware state) or read from arbitrary memory via crafted input (CVE-2005-2492).\n\nA memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in 2.6.13 and earlier allows a local user to cause a DoS (memory consumption) via certain repeated reads from /proc/scsi/gs/devices file which is not properly handled when the next() interator returns NULL or an error (CVE-2005-2800).\n\nThe ipt_recent module in versions prior to 2.6.12 when running on 64bit processors allows remote attackers to cause a DoS (kernel panic) via certain attacks such as SSH brute force (CVE-2005-2872).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly perform certain tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early (CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local users to cause a DoS (oops from NULL dereference) via fput in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl function on 64-bit systems (CVE-2005-3044).\n\nThe sys_set_mempolicy function in mempolicy.c allows local users to cause a DoS via a negative first argument (CVE-2005-3053).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference (CVE-2005-3055).\n\ndrm.c in version 2.6.13 and earlier creates a debug file in sysfs with world-readable and world-writable permissions, allowing local users to enable DRM debugging and obtain sensitive information (CVE-2005-3179).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, allowing remote attackers to obtain sensitive information (CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an incorrect function to free names_cache memory, preventing the memory from being tracked by AUDITSYSCALL code and leading to a memory leak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use certain IOCTLs on terminals of other users and gain privileges (CVE-2005-3257).\n\nExec does not properly clear posix-timers in multi-threaded environments, which result in a resource leak and could allow a large number of multiple local users to cause a DoS by using more posix- timers than specified by the quota for a single user (CVE-2005-3271).\n\nThe rose_rt_ioctl function rose_route.c in versions prior to 2.6.12 does not properly verify the ndigis argument for a new route, allowing an attacker to trigger array out-of-bounds errors with a large number of digipeats (CVE-2005-3273).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13, when running on SMP systems, allows local users to cause a DoS (NULL dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired (CVE-2005-3274).\n\nThe NAT code in versions prior to 2.6.13 incorrectly declares a variable to be static, allowing remote attackers to cause a DoS (memory corruption) by causing two packets for the same protocol to be NATed at the same time (CVE-2005-3275).\n\nThe sys_get_thread_area function in process.c in versions prior to 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which may allow a user process to obtain sensitive information (CVE-2005-3276).\n\nThe provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at:\n\nhttp://www.mandriva.com/en/security/kernelupdate", "modified": "2014-08-22T00:00:00", "published": "2006-01-15T00:00:00", "id": "MANDRAKE_MDKSA-2005-220.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=20451", "type": "nessus", "title": "MDKSA-2005:220 : kernel", "sourceData": "# @DEPRECATED@\n#\n# This script has been deprecated as the associated update is not\n# for a supported release of Mandrake / Mandriva Linux.\n#\n# Disabled on 2012/09/06.\n#\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This script was automatically generated from\n# Mandrake Linux Security Advisory MDKSA-2005:220.\n#\n\nif (!defined_func(\"bn_random\")) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20451);\n script_version (\"$Revision: 1.11 $\"); \n script_cvs_date(\"$Date: 2014/08/22 19:56:33 $\");\n\n script_cve_id(\"CVE-2005-1764\", \"CVE-2005-2098\", \"CVE-2005-2099\", \"CVE-2005-2456\", \"CVE-2005-2457\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2800\", \"CVE-2005-2872\", \"CVE-2005-2873\", \"CVE-2005-3044\", \"CVE-2005-3053\", \"CVE-2005-3055\", \"CVE-2005-3179\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3271\", \"CVE-2005-3273\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-3276\");\n\n script_name(english:\"MDKSA-2005:220 : kernel\");\n script_summary(english:\"Checks for patch(es) in 'rpm -qa' output\");\n\n script_set_attribute(attribute:\"synopsis\", value: \n\"The remote Mandrake host is missing one or more security-related\npatches.\");\n script_set_attribute(attribute:\"description\", value:\n\"Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\nand corrected in this update:\n\nThe kernel on x86_64 platforms does not use a guard page for the\n47-bit address page to protect against an AMD K8 bug which allows a\nlocal user to cause a DoS (CVE-2005-1764).\n\nThe KEYCTL_JOIN_SESSION_KEYRING operation in versions prior to\n2.6.12.5 contains an error path that does not properly release the\nsession management semaphore, which allows local users or remote\nattackers to cause a DoS (semaphore hang) via a new session keyring\nwith an empty name string, a long name string, the key quota reached,\nor ENOMEM (CVE-2005-2098).\n\nKernels prior to 2.6.12.5 do not properly destroy a keyring that is\nnot instantiated properly, allowing a local user or remote attacker\nto cause a DoS (oops) via a keyring with a payload that is not empty\n(CVE-2005-2099).\n\nAn array index overflow in the xfrm_sk_policy_insert function in\nxfrm_user.c allows local users to cause a DoS (oops or deadlock) and\npossibly execute arbitrary code (CVE-2005-2456).\n\nThe zisofs driver in versions prior to 2.6.12.5 allows local users\nand remove attackers to cause a DoS (crash) via a crafted compressed\nISO filesystem (CVE-2005-2457).\n\ninflate.c in the zlib routines in versions prior to 2.6.12.5 allow\nremove attackers to cause a DoS (crash) via a compressed file with\n'improper tables' (CVE-2005-2458).\n\nThe huft_build function in inflate.c in the zlib routines in versions\nprior to 2.6.12.5 returns the wrong value, allowing remote attackers\nto cause a DoS (crash) via a certain compressed file that leads to a\nNULL pointer dereference (CVE-2005-2459).\n\nA stack-based buffer overflow in the sendmsg function call in\nversions prior to 2.6.13.1 allow local users to execute arbitrary\ncode by calling sendmsg and modifying the message contents in another\nthread (CVE-2005-2490).\n\nThe raw_sendmsg function in versions prior to 2.6.13.1 allow local\nusers to cause a DoS (change hardware state) or read from arbitrary\nmemory via crafted input (CVE-2005-2492).\n\nA memory leak in the seq_file implementation in the SCSI procfs\ninterface (sg.c) in 2.6.13 and earlier allows a local user to cause a\nDoS (memory consumption) via certain repeated reads from\n/proc/scsi/gs/devices file which is not properly handled when the\nnext() interator returns NULL or an error (CVE-2005-2800).\n\nThe ipt_recent module in versions prior to 2.6.12 when running on\n64bit processors allows remote attackers to cause a DoS (kernel\npanic) via certain attacks such as SSH brute force (CVE-2005-2872).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly\nperform certain tests when the jiffies value is greater than\nLONG_MAX, which can cause ipt_recent netfilter rules to block too\nearly (CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local\nusers to cause a DoS (oops from NULL dereference) via fput in a 32bit\nioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\nfunction on 64-bit systems (CVE-2005-3044).\n\nThe sys_set_mempolicy function in mempolicy.c allows local users to\ncause a DoS via a negative first argument (CVE-2005-3053).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\nvia a userspace process that issues a USB Request Block (URB) to a\nUSB device and terminates before the URB is finished, which leads to\na stale pointer reference (CVE-2005-3055).\n\ndrm.c in version 2.6.13 and earlier creates a debug file in sysfs\nwith world-readable and world-writable permissions, allowing local\nusers to enable DRM debugging and obtain sensitive information\n(CVE-2005-3179).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear\nmemory from a previously used packet whose length is increased,\nallowing remote attackers to obtain sensitive information\n(CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use\nan incorrect function to free names_cache memory, preventing the\nmemory from being tracked by AUDITSYSCALL code and leading to a\nmemory leak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use\ncertain IOCTLs on terminals of other users and gain privileges\n(CVE-2005-3257).\n\nExec does not properly clear posix-timers in multi-threaded\nenvironments, which result in a resource leak and could allow a large\nnumber of multiple local users to cause a DoS by using more posix-\ntimers than specified by the quota for a single user (CVE-2005-3271).\n\nThe rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\ndoes not properly verify the ndigis argument for a new route,\nallowing an attacker to trigger array out-of-bounds errors with a\nlarge number of digipeats (CVE-2005-3273).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13,\nwhen running on SMP systems, allows local users to cause a DoS (NULL\ndereference) by causing a connection timer to expire while the\nconnection table is being flushed before the appropriate lock is\nacquired (CVE-2005-3274).\n\nThe NAT code in versions prior to 2.6.13 incorrectly declares a\nvariable to be static, allowing remote attackers to cause a DoS\n(memory corruption) by causing two packets for the same protocol to\nbe NATed at the same time (CVE-2005-3275).\n\nThe sys_get_thread_area function in process.c in versions prior to\n2.6.12.4 and 2.6.13 does not clear a data structure before copying it\nto userspace, which may allow a user process to obtain sensitive\ninformation (CVE-2005-3276).\n\nThe provided packages are patched to fix these vulnerabilities. All\nusers are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at:\n\nhttp://www.mandriva.com/en/security/kernelupdate\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package(s).\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(399);\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/11/30\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2006/01/15\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Mandriva Local Security Checks\");\n \n script_copyright(english:\"This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n# Deprecated.\nexit(0, \"The associated update is not currently for a supported release of Mandrake / Mandriva Linux.\");\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/Mandrake/release\")) exit(0, \"The host is not running Mandrake Linux.\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) exit(1, \"Could not get the list of packages.\");\n\nflag = 0;\n\nif (rpm_check(reference:\"kernel-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-i586-up-1GB-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-i686-up-4GB-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-smp-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-source-2.6-2.6.11-13mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-source-stripped-2.6-2.6.11-13mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-xbox-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse \n{\n if (rpm_exists(rpm:\"kernel-\", release:\"MDK10.2\"))\n {\n set_kb_item(name:\"CVE-2005-1764\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2098\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2099\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2456\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2457\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2458\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2459\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2490\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2492\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2800\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2872\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2873\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3044\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3053\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3055\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3179\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3180\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3181\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3257\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3271\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3273\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3274\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3275\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3276\", value:TRUE);\n }\n\n exit(0, \"The host is not affected.\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "centos": [{"lastseen": "2019-05-29T18:33:48", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2005:808\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nAn issue was discovered that affects how page attributes are changed by the\r\nkernel. Video drivers, which sometimes map kernel pages with a different\r\ncaching policy than write-back, are now expected to function correctly. \r\nThis change affects the x86, AMD64, and Intel EM64T architectures.\r\n\r\nIn addition the following security bugs were fixed:\r\n\r\nThe set_mempolicy system call did not check for negative numbers in the\r\npolicy field. An unprivileged local user could use this flaw to cause a\r\ndenial of service (system panic). (CVE-2005-3053)\r\n\r\nA flaw in ioremap handling on AMD 64 and Intel EM64T systems. An\r\nunprivileged local user could use this flaw to cause a denial of service or\r\nminor information leak. (CVE-2005-3108)\r\n\r\nA race condition in the ebtables netfilter module. On a SMP system that is\r\noperating under a heavy load this flaw may allow remote attackers to cause\r\na denial of service (crash). (CVE-2005-3110)\r\n\r\nA memory leak was found in key handling. An unprivileged local user could\r\nuse this flaw to cause a denial of service. (CVE-2005-3119)\r\n\r\nA flaw in the Orinoco wireless driver. On systems running the vulnerable\r\ndrive, a remote attacker could send carefully crafted packets which would\r\ndivulge the contents of uninitialized kernel memory. (CVE-2005-3180)\r\n\r\nA memory leak was found in the audit system. An unprivileged local user\r\ncould use this flaw to cause a denial of service. (CVE-2005-3181)\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-November/012389.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-November/012390.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/012342.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/012343.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/012344.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/012345.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/012346.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-smp\nkernel-smp-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-808.html", "modified": "2005-11-07T01:32:49", "published": "2005-10-27T22:33:15", "href": "http://lists.centos.org/pipermail/centos-announce/2005-October/012342.html", "id": "CESA-2005:808", "title": "kernel security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:35:46", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2006:0191-01\n\n\nThe Linux kernel handles the basic functions of the operating system. \r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a flaw in the coda module that allowed a local user to cause a denial of\r\nservice (crash) or possibly gain privileges (CVE-2005-0124, moderate)\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed: \r\n\r\n- Handle set_brk() errors in binfmt_elf/aout\r\n\r\n- Correct error handling in shmem_ioctl\r\n\r\n- Correct scsi error return\r\n\r\n- Fix netdump time keeping bug\r\n\r\n- Fix netdump link-down freeze\r\n\r\n- Fix FAT fs deadlock\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-February/012620.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-debug\nkernel-doc\nkernel-enterprise\nkernel-headers\nkernel-smp\nkernel-source\nkernel-summit\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "modified": "2006-02-02T22:07:50", "published": "2006-02-02T22:07:50", "href": "http://lists.centos.org/pipermail/centos-announce/2006-February/012620.html", "id": "CESA-2006:0191-01", "title": "kernel security update", "type": "centos", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:21", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2006:0140\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw in remap_page_range() with O_DIRECT writes that allowed a local\r\nuser to cause a denial of service (crash) (CVE-2004-1057, important)\r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-2708, important)\r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges \r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a network buffer info leak using the orinoco driver that allowed\r\na remote user to possibly view uninitialized data (CVE-2005-3180, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3275, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate)\r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important)\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their kernels\r\nto the packages associated with their machine architecture and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/012589.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/012590.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/012593.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/012601.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-doc\nkernel-hugemem\nkernel-hugemem-unsupported\nkernel-smp\nkernel-smp-unsupported\nkernel-source\nkernel-unsupported\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0140.html", "modified": "2006-01-20T17:25:48", "published": "2006-01-19T22:25:06", "href": "http://lists.centos.org/pipermail/centos-announce/2006-January/012589.html", "id": "CESA-2006:0140", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:47:01", "bulletinFamily": "unix", "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nAn issue was discovered that affects how page attributes are changed by the\r\nkernel. Video drivers, which sometimes map kernel pages with a different\r\ncaching policy than write-back, are now expected to function correctly. \r\nThis change affects the x86, AMD64, and Intel EM64T architectures.\r\n\r\nIn addition the following security bugs were fixed:\r\n\r\nThe set_mempolicy system call did not check for negative numbers in the\r\npolicy field. An unprivileged local user could use this flaw to cause a\r\ndenial of service (system panic). (CVE-2005-3053)\r\n\r\nA flaw in ioremap handling on AMD 64 and Intel EM64T systems. An\r\nunprivileged local user could use this flaw to cause a denial of service or\r\nminor information leak. (CVE-2005-3108)\r\n\r\nA race condition in the ebtables netfilter module. On a SMP system that is\r\noperating under a heavy load this flaw may allow remote attackers to cause\r\na denial of service (crash). (CVE-2005-3110)\r\n\r\nA memory leak was found in key handling. An unprivileged local user could\r\nuse this flaw to cause a denial of service. (CVE-2005-3119)\r\n\r\nA flaw in the Orinoco wireless driver. On systems running the vulnerable\r\ndrive, a remote attacker could send carefully crafted packets which would\r\ndivulge the contents of uninitialized kernel memory. (CVE-2005-3180)\r\n\r\nA memory leak was found in the audit system. An unprivileged local user\r\ncould use this flaw to cause a denial of service. (CVE-2005-3181)\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2017-09-08T12:14:29", "published": "2005-10-27T04:00:00", "id": "RHSA-2005:808", "href": "https://access.redhat.com/errata/RHSA-2005:808", "type": "redhat", "title": "(RHSA-2005:808) kernel security update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-08-13T18:46:29", "bulletinFamily": "unix", "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw in remap_page_range() with O_DIRECT writes that allowed a local\r\nuser to cause a denial of service (crash) (CVE-2004-1057, important)\r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-2708, important)\r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges \r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a network buffer info leak using the orinoco driver that allowed\r\na remote user to possibly view uninitialized data (CVE-2005-3180, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3275, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate)\r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important)\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their kernels\r\nto the packages associated with their machine architecture and\r\nconfigurations as listed in this erratum.", "modified": "2017-07-29T20:32:35", "published": "2006-01-19T05:00:00", "id": "RHSA-2006:0140", "href": "https://access.redhat.com/errata/RHSA-2006:0140", "type": "redhat", "title": "(RHSA-2006:0140) kernel security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:52", "bulletinFamily": "unix", "description": "The Linux kernel handles the basic functions of the operating system. \r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a flaw in the coda module that allowed a local user to cause a denial of\r\nservice (crash) or possibly gain privileges (CVE-2005-0124, moderate)\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed: \r\n\r\n- Handle set_brk() errors in binfmt_elf/aout\r\n\r\n- Correct error handling in shmem_ioctl\r\n\r\n- Correct scsi error return\r\n\r\n- Fix netdump time keeping bug\r\n\r\n- Fix netdump link-down freeze\r\n\r\n- Fix FAT fs deadlock\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2018-03-14T19:25:57", "published": "2006-02-01T05:00:00", "id": "RHSA-2006:0191", "href": "https://access.redhat.com/errata/RHSA-2006:0191", "type": "redhat", "title": "(RHSA-2006:0191) kernel security update", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:46", "bulletinFamily": "unix", "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2708, important) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a race condition affecting SMP systems that allowed a local user to cause\r\na denial of service (crash) (CVE-2005-3274, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed:\r\n\r\n- Handle set_brk() errors in binfmt_elf\r\n\r\n- Correct scsi error return\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2018-03-14T19:25:39", "published": "2006-02-01T05:00:00", "id": "RHSA-2006:0190", "href": "https://access.redhat.com/errata/RHSA-2006:0190", "type": "redhat", "title": "(RHSA-2006:0190) kernel security update", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:28:40", "bulletinFamily": "unix", "description": "This kernel update for SUSE Linux 10.0 contains fixes for XEN, various security fixes and bug fixes.\n#### Solution\nNone, please install the fixed packages.", "modified": "2005-12-06T11:35:56", "published": "2005-12-06T11:35:56", "id": "SUSE-SA:2005:067", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-12/msg00009.html", "type": "suse", "title": "denial of service in kernel", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:50:28", "bulletinFamily": "unix", "description": "The Linux kernel was updated to fix several security problems and several bugs, listed below:\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2005-12-14T15:10:59", "published": "2005-12-14T15:10:59", "id": "SUSE-SA:2005:068", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-12/msg00011.html", "type": "suse", "title": "denial of service in kernel", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-26T08:55:59", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-debug\n kernel-syms\n um-host-kernel\n kernel-source\n um-host-install-initrd\n kernel-um\n kernel-bigsmp\n kernel-smp\n kernel-default\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015723 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=65407", "id": "OPENVAS:65407", "title": "SLES9: Security update for Linux kernel", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5015723.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-debug\n kernel-syms\n um-host-kernel\n kernel-source\n um-host-install-initrd\n kernel-um\n kernel-bigsmp\n kernel-smp\n kernel-default\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015723 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65407);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-2973\", \"CVE-2005-3806\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3044\", \"CVE-2005-3275\", \"CVE-2005-2490\", \"CVE-2005-3110\", \"CVE-2005-1041\", \"CVE-2005-2800\", \"CVE-2005-2872\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:C/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.5~7.202.5\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:39:34", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-debug\n kernel-syms\n um-host-kernel\n kernel-source\n um-host-install-initrd\n kernel-um\n kernel-bigsmp\n kernel-smp\n kernel-default\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015723 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065407", "id": "OPENVAS:136141256231065407", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5015723.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-debug\n kernel-syms\n um-host-kernel\n kernel-source\n um-host-install-initrd\n kernel-um\n kernel-bigsmp\n kernel-smp\n kernel-default\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015723 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65407\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-2973\", \"CVE-2005-3806\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3044\", \"CVE-2005-3275\", \"CVE-2005-2490\", \"CVE-2005-3110\", \"CVE-2005-1041\", \"CVE-2005-2800\", \"CVE-2005-2872\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:C/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.5~7.202.5\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:22", "bulletinFamily": "scanner", "description": "The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1017-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=56469", "id": "OPENVAS:56469", "title": "Debian Security Advisory DSA 1017-1 (kernel-source-2.6.8)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1017_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1017-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. For details on the issues addressed by the missing update, please visit\nthe referenced security advisories.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\nDebian 3.1 (sarge)\nSource 2.6.8-16sarge2\nAlpha architecture 2.6.8-16sarge2\nAMD64 architecture 2.6.8-16sarge2\nHP Precision architecture 2.6.8-6sarge2\nIntel IA-32 architecture 2.6.8-16sarge2\nIntel IA-64 architecture 2.6.8-14sarge2\nMotorola 680x0 architecture 2.6.8-4sarge2\nPowerPC architecture 2.6.8-12sarge2\nIBM S/390 architecture 2.6.8-5sarge2\nSun Sparc architecture 2.6.8-15sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\nDebian 3.1 (sarge)\nkernel-latest-2.6-alpha 101sarge1\nkernel-latest-2.6-amd64 103sarge1\nkernel-latest-2.6-hppa 2.6.8-1sarge1\nkernel-latest-2.6-sparc 101sarge1\nkernel-latest-2.6-i386 101sarge1\nkernel-latest-powerpc 102sarge1\nfai-kernels 1.9.1sarge1\nhostap-modules-i386 0.3.7-1sarge1\nmol-modules-2.6.8 0.9.70+2.6.8+12sarge1\nndiswrapper-modules-i386 1.1-2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1017-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201017-1\";\n\nif(description)\n{\n script_id(56469);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-1017\", \"CVE-2005-0124\", \"CVE-2005-0449\", \"CVE-2005-2457\", \"CVE-2005-2490\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3053\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3847\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\", \"CVE-2005-4618\", \"CVE-2006-0095\", \"CVE-2006-0096\", \"CVE-2006-0482\", \"CVE-2006-1066\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1017-1 (kernel-source-2.6.8)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-generic\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-k8\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-k8-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-em64t-p4\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-em64t-p4-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-generic\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-k8\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-k8-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-em64t-p4\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-em64t-p4-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-k8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-k8-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-em64t-p4\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-em64t-p4-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-k8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-k8-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-em64t-p4\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-em64t-p4-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"fai-kernels\", ver:\"1.9.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-386\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-686\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-686-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-k7\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-k7-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-386\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-686\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-686-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-k7\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-k7-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-386\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-586tsc\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-686\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-686-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k6\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k7\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k7-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-386\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-686\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-686-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-k7\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-k7-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-386\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-686\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-686-smp\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-k7\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-k7-smp\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-32\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-32-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-64\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-64-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-32\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-32-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-64\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-64-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-32\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-32-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-64\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-64-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-32\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-32-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-64\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-64-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-amiga\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-atari\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-bvme6000\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-hp\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mac\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme147\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme16x\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-q40\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-sun3\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power3\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power3-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power4-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power3\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power3-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power4-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power3\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power3-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power4\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power4-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-powerpc\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-powerpc-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power3\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power3-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power4\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power4-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-powerpc\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-powerpc-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mol-modules-2.6.8-3-powerpc\", ver:\"0.9.70+2.6.8+12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mol-modules-2.6.8-3-powerpc-smp\", ver:\"0.9.70+2.6.8+12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390-tape\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390x\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390-tape\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390x\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc32\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc64\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc64-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc32\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc64\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc64-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc32\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc64\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc64-smp\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc32\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc64\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc64-smp\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.6.8-s390\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2019-05-29T17:22:15", "bulletinFamily": "unix", "description": "", "modified": "2005-11-22T00:00:00", "published": "2005-11-22T00:00:00", "id": "USN-219-1", "href": "https://usn.ubuntu.com/219-1/", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:15", "bulletinFamily": "software", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:235\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : December 21, 2005\r\n Affected: 2006.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n A stack-based buffer overflow in the sendmsg function call in versions\r\n prior to 2.6.13.1 allow local users to execute arbitrary code by\r\n calling sendmsg and modifying the message contents in another thread\r\n (CVE-2005-2490).\r\n \r\n The raw_sendmsg function in versions prior to 2.6.13.1 allow local\r\n users to cause a DoS (change hardware state) or read from arbitrary\r\n memory via crafted input (CVE-2005-2492).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 does not properly\r\n perform certain tests when the jiffies value is greater than LONG_MAX,\r\n which can cause ipt_recent netfilter rules to block too early\r\n (CVE-2005-2873).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n drm.c in version 2.6.13 and earlier creates a debug file in sysfs with\r\n world-readable and world-writable permissions, allowing local users to\r\n enable DRM debugging and obtain sensitive information (CVE-2005-3179).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3179\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 2006.0:\r\n a010bd5617177d007f3907e5cb1a7eaf 2006.0/RPMS/kernel-2.6.12.14mdk-1-1mdk.i586.rpm\r\n ae019c85ae823dd0045759e68e5a415f 2006.0/RPMS/kernel-i586-up-1GB-2.6.12.14mdk-1-1mdk.i586.rpm\r\n 519cffb096c4371fcdba4ea15c7af8ac 2006.0/RPMS/kernel-i686-up-4GB-2.6.12.14mdk-1-1mdk.i586.rpm\r\n 2093641b27dd2917afd50f8daa68100b 2006.0/RPMS/kernel-smp-2.6.12.14mdk-1-1mdk.i586.rpm\r\n d8532d9bc53c3abd28f530ed536ac1b1 2006.0/RPMS/kernel-source-2.6-2.6.12-14mdk.i586.rpm\r\n 8fbab680135fccd60c7da9533af72d33 2006.0/RPMS/kernel-source-stripped-2.6-2.6.12-14mdk.i586.rpm\r\n 475fc01a6bcd294890ca55b814bd0151 2006.0/RPMS/kernel-xbox-2.6.12.14mdk-1-1mdk.i586.rpm\r\n cdde86f8ae57d9b08f732268e534ef85 2006.0/RPMS/kernel-xen0-2.6.12.14mdk-1-1mdk.i586.rpm\r\n 834ddd648671714a008303f5d8be5561 2006.0/RPMS/kernel-xenU-2.6.12.14mdk-1-1mdk.i586.rpm\r\n 6bb497c8205003ffc8538e81cdc2e0f9 2006.0/SRPMS/kernel-2.6.12.14mdk-1-1mdk.src.rpm\r\n\r\n Mandriva Linux 2006.0/X86_64:\r\n 9fce74d95a1678c5c5217d6b113e08be x86_64/2006.0/RPMS/kernel-2.6.12.14mdk-1-1mdk.x86_64.rpm\r\n 5997517d826bf551567f2f7586f2f2ea x86_64/2006.0/RPMS/kernel-smp-2.6.12.14mdk-1-1mdk.x86_64.rpm\r\n 0f57a42ee8ef90cf2f60c8f3cc011f26 x86_64/2006.0/RPMS/kernel-source-2.6-2.6.12-14mdk.x86_64.rpm\r\n 26a234853ea00c0e6f29526e023c26e4 x86_64/2006.0/RPMS/kernel-source-stripped-2.6-2.6.12-14mdk.x86_64.rpm\r\n 6bb497c8205003ffc8538e81cdc2e0f9 x86_64/2006.0/SRPMS/kernel-2.6.12.14mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDqbDLmqjQ0CJFipgRArpbAKDD9dJXm9FTggU6khmIxM31QsbkigCdEd6Y\r\nrYVPJj5H9ob4JzlvsWDsQgw=\r\n=W8YT\r\n-----END PGP SIGNATURE-----\r\n_______________________________________________\r\nFull-Disclosure - We believe in it.\r\nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\r\nHosted and sponsored by Secunia - http://secunia.com/", "modified": "2005-12-22T00:00:00", "published": "2005-12-22T00:00:00", "id": "SECURITYVULNS:DOC:10801", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10801", "title": "[Full-disclosure] MDKSA-2005:235 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:218\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : November 30, 2005\r\n Affected: Corporate 3.0, Multi Network Firewall 2.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n An integer overflow in vc_resize (CAN-2004-1333).\r\n \r\n A race condition in the sysfs_read_file and sysfs_write_file functions\r\n in 2.6.10 and earlier allows local users to read kernel memory and\r\n cause a DoS (crash) via large offsets in sysfs files (CAN-2004-2302).\r\n \r\n An integer signedness error in scsi_ioctl.c (CVE-2005-0180).\r\n \r\n Netfilter allows a local user to cause a DoS (memory consumption) via\r\n certain packet fragments that are reassembled twice, which causes a\r\n data structure to be allocated twice (CVE-2005-0210).\r\n \r\n The netfilter/iptables module in versions prior to 2.6.8.1 allow remote\r\n attackers to cause a DoS (crash) or bypass firewall rules via crafted\r\n packets, which are not properly handled by skb_checksum_help function\r\n (CVE-2005-0449).\r\n \r\n The zisofs driver in versions prior to 2.6.12.5 allows local users and\r\n remove attackers to cause a DoS (crash) via a crafted compressed ISO\r\n filesystem (CVE-2005-2457).\r\n \r\n The kernel does not properly restrict socket policy access to users\r\n with the CAP_NET_ADMIN capability, which could allow local users to\r\n conduct unauthorized activities via ipv4/ip_sockglue.c and\r\n ipv6/ipv6_sockglue.c (CVE-2005-2555).\r\n \r\n A memory leak in the seq_file implementation in the SCSI procfs\r\n interface (sg.c) in 2.6.13 and earlier allows a local user to cause a\r\n DoS (memory consumption) via certain repeated reads from\r\n /proc/scsi/gs/devices file which is not properly handled when the\r\n next() interator returns NULL or an error (CVE-2005-2800).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n Exec does not properly clear posix-timers in multi-threaded\r\n environments, which result in a resource leak and could allow a large\r\n number of multiple local users to cause a DoS by using more posix-\r\n timers than specified by the quota for a single user (CVE-2005-3271).\r\n \r\n The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\r\n does not properly verify the ndigis argument for a new route, allowing\r\n an attacker to trigger array out-of-bounds errors with a large number\r\n of digipeats (CVE-2005-3273).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The NAT code in versions prior to 2.6.13 incorrectly declares a\r\n variable to be static, allowing remote attackers to cause a DoS (memory\r\n corruption) by causing two packets for the same protocol to be NATed at\r\n the same time (CVE-2005-3275).\r\n \r\n The sys_get_thread_area function in process.c in versions prior to\r\n 2.6.12.4 and 2.6.13 does not clear a data structure before copying it\r\n to userspace, which may allow a user process to obtain sensitive\r\n information (CVE-2005-3276).\r\n \r\n The following non-security fixes are also applied:\r\n \r\n Support for the arp_ignore and arp_announce sysctls were added to the\r\n Corporate 3 kernels (bugzilla #16346).\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0449\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3271\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276\r\n http://qa.mandriva.com/show_bug.cgi?id=16346\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Corporate 3.0:\r\n 7e38bcdc8a3900485d17d08e13963700 corporate/3.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.i586.rpm\r\n be4dc943991be67f9f612ac5ca2f6c10 corporate/3.0/RPMS/kernel-enterprise-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 9acc6e90b1a8620be6af552baa8524ab corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 1a171d91312764089f2f0c84a6e9131a corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n e6f42b56669ca4ac5515d728051c4f88 corporate/3.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 5f3e473fae7614433328756156f2b953 corporate/3.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.i586.rpm\r\n c98b0f07cb49a918201d2daa1ac23e7c corporate/3.0/RPMS/kernel-source-2.6.3-29mdk.i586.rpm\r\n e816bcde98728e85a86c565259364f8a corporate/3.0/RPMS/kernel-source-stripped-2.6.3-29mdk.i586.rpm\r\n b2497e007272f38b30e98b4231a77a76 corporate/3.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n\r\n Corporate 3.0/X86_64:\r\n 5261e06d1085ff9c61bf29789f10669f x86_64/corporate/3.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n 3cb631841cf4e9d29e1f667d940d9ab4 x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n 61024ad1c23dbde624c3cd43c8805f26 x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n ba1514dcafcc748796bd9b23cd1905e4 x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-29mdk.x86_64.rpm\r\n 48a9eb1de36653665e6d7de333d25cb0 x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-29mdk.x86_64.rpm\r\n b2497e007272f38b30e98b4231a77a76 x86_64/corporate/3.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n\r\n Multi Network Firewall 2.0:\r\n 7e38bcdc8a3900485d17d08e13963700 mnf/2.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 9acc6e90b1a8620be6af552baa8524ab mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 1a171d91312764089f2f0c84a6e9131a mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n e6f42b56669ca4ac5515d728051c4f88 mnf/2.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 5f3e473fae7614433328756156f2b953 mnf/2.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.i586.rpm\r\n b2497e007272f38b30e98b4231a77a76 mnf/2.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDjfSCmqjQ0CJFipgRAivNAKCf9uIkAEZu5hRDk/tDe6Y89813zQCdEqFD\r\nAr/Lnzyy9a037hb4fBSiHsc=\r\n=Ohmy\r\n-----END PGP SIGNATURE-----", "modified": "2005-12-01T00:00:00", "published": "2005-12-01T00:00:00", "id": "SECURITYVULNS:DOC:10474", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10474", "title": "MDKSA-2005:218 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:220\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : November 30, 2005\r\n Affected: 10.2\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n The kernel on x86_64 platforms does not use a guard page for the 47-bit\r\n address page to protect against an AMD K8 bug which allows a local user\r\n to cause a DoS (CVE-2005-1764).\r\n \r\n The KEYCTL_JOIN_SESSION_KEYRING operation in versions prior to 2.6.12.5\r\n contains an error path that does not properly release the session\r\n management semaphore, which allows local users or remote attackers to\r\n cause a DoS (semaphore hang) via a new session keyring with an empty\r\n name string, a long name string, the key quota reached, or ENOMEM\r\n (CVE-2005-2098).\r\n \r\n Kernels prior to 2.6.12.5 do not properly destroy a keyring that is not\r\n instantiated properly, allowing a local user or remote attacker to\r\n cause a DoS (oops) via a keyring with a payload that is not empty\r\n (CVE-2005-2099).\r\n \r\n An array index overflow in the xfrm_sk_policy_insert function in\r\n xfrm_user.c allows local users to cause a DoS (oops or deadlock) and\r\n possibly execute arbitrary code (CVE-2005-2456).\r\n \r\n The zisofs driver in versions prior to 2.6.12.5 allows local users and\r\n remove attackers to cause a DoS (crash) via a crafted compressed ISO\r\n filesystem (CVE-2005-2457).\r\n \r\n inflate.c in the zlib routines in versions prior to 2.6.12.5 allow\r\n remove attackers to cause a DoS (crash) via a compressed file with\r\n "improper tables" (CVE-2005-2458).\r\n \r\n The huft_build function in inflate.c in the zlib routines in versions\r\n prior to 2.6.12.5 returns the wrong value, allowing remote attackers to\r\n cause a DoS (crash) via a certain compressed file that leads to a null\r\n pointer dereference (CVE-2005-2459).\r\n \r\n A stack-based buffer overflow in the sendmsg function call in versions\r\n prior to 2.6.13.1 allow local users to execute arbitrary code by\r\n calling sendmsg and modifying the message contents in another thread\r\n (CVE-2005-2490).\r\n \r\n The raw_sendmsg function in versions prior to 2.6.13.1 allow local\r\n users to cause a DoS (change hardware state) or read from arbitrary\r\n memory via crafted input (CVE-2005-2492).\r\n \r\n A memory leak in the seq_file implementation in the SCSI procfs\r\n interface (sg.c) in 2.6.13 and earlier allows a local user to cause a\r\n DoS (memory consumption) via certain repeated reads from\r\n /proc/scsi/gs/devices file which is not properly handled when the\r\n next() interator returns NULL or an error (CVE-2005-2800).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 when running on 64bit\r\n processors allows remote attackers to cause a DoS (kernel panic) via\r\n certain attacks such as SSH brute force (CVE-2005-2872).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 does not properly\r\n perform certain tests when the jiffies value is greater than LONG_MAX,\r\n which can cause ipt_recent netfilter rules to block too early\r\n (CVE-2005-2873).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n The sys_set_mempolicy function in mempolicy.c allows local users to\r\n cause a DoS via a negative first argument (CVE-2005-3053).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n drm.c in version 2.6.13 and earlier creates a debug file in sysfs with\r\n world-readable and world-writable permissions, allowing local users to\r\n enable DRM debugging and obtain sensitive information (CVE-2005-3179).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n Exec does not properly clear posix-timers in multi-threaded\r\n environments, which result in a resource leak and could allow a large\r\n number of multiple local users to cause a DoS by using more posix-\r\n timers than specified by the quota for a single user (CVE-2005-3271).\r\n \r\n The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\r\n does not properly verify the ndigis argument for a new route, allowing\r\n an attacker to trigger array out-of-bounds errors with a large number\r\n of digipeats (CVE-2005-3273).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The NAT code in versions prior to 2.6.13 incorrectly declares a\r\n variable to be static, allowing remote attackers to cause a DoS (memory\r\n corruption) by causing two packets for the same protocol to be NATed at\r\n the same time (CVE-2005-3275).\r\n \r\n The sys_get_thread_area function in process.c in versions prior to\r\n 2.6.12.4 and 2.6.13 does not clear a data structure before copying it\r\n to userspace, which may allow a user process to obtain sensitive\r\n information (CVE-2005-3276).\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1764\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2098\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2099\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3053\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3179\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 10.2:\r\n 2c46bb090164d04e6c45a0abef9d5756 10.2/RPMS/kernel-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 1f527287a66e776825c6a665a9b62ccf 10.2/RPMS/kernel-i586-up-1GB-2.6.11.13mdk-1-1mdk.i586.rpm\r\n df151a56daf78664f6ac4dcf99ffbf4a 10.2/RPMS/kernel-i686-up-4GB-2.6.11.13mdk-1-1mdk.i586.rpm\r\n b531e97efe37e4cc41fba8fea177317b 10.2/RPMS/kernel-smp-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 243fc4fbd27117ecf95a8c9d856a22cb 10.2/RPMS/kernel-source-2.6-2.6.11-13mdk.i586.rpm\r\n 841f4b9e8f333ae07af81fbb295e7b89 10.2/RPMS/kernel-source-stripped-2.6-2.6.11-13mdk.i586.rpm\r\n dafc4f7aa34f21434ce2d1ec76b8b80f 10.2/RPMS/kernel-xbox-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 7369eb7eaf212a81d56f3d3df895f909 10.2/SRPMS/kernel-2.6.11.13mdk-1-1mdk.src.rpm\r\n\r\n Mandriva Linux 10.2/X86_64:\r\n d82156477b51547a270c7cda5a8ac5a1 x86_64/10.2/RPMS/kernel-2.6.11.13mdk-1-1mdk.x86_64.rpm\r\n f7e6d8f44813da237726c757cf4a4958 x86_64/10.2/RPMS/kernel-smp-2.6.11.13mdk-1-1mdk.x86_64.rpm\r\n b0b6f0422937ce40d421cf607dd5c57b x86_64/10.2/RPMS/kernel-source-2.6-2.6.11-13mdk.x86_64.rpm\r\n 42f78955e8bc151d36ae5bb3e1493c25 x86_64/10.2/RPMS/kernel-source-stripped-2.6-2.6.11-13mdk.x86_64.rpm\r\n 7369eb7eaf212a81d56f3d3df895f909 x86_64/10.2/SRPMS/kernel-2.6.11.13mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDjfmdmqjQ0CJFipgRAq87AKCc30fj1YTM9/J6R1uwqUZ5bUGx5QCgiUMa\r\n9yaj33KlDIs4ThWlTKKwFJ0=\r\n=Etvq\r\n-----END PGP SIGNATURE-----", "modified": "2005-12-01T00:00:00", "published": "2005-12-01T00:00:00", "id": "SECURITYVULNS:DOC:10475", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10475", "title": "MDKSA-2005:220 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:219\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : November 30, 2005\r\n Affected: 10.1\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n An integer overflow in vc_resize (CAN-2004-1333).\r\n \r\n A race condition in the sysfs_read_file and sysfs_write_file functions\r\n in 2.6.10 and earlier allows local users to read kernel memory and\r\n cause a DoS (crash) via large offsets in sysfs files (CAN-2004-2302).\r\n \r\n An integer signedness error in scsi_ioctl.c (CVE-2005-0180).\r\n \r\n Netfilter allows a local user to cause a DoS (memory consumption) via\r\n certain packet fragments that are reassembled twice, which causes a\r\n data structure to be allocated twice (CVE-2005-0210).\r\n \r\n A DoS in pkt_ioctl in pktcdvc.c (CVE-2005-1589).\r\n \r\n An array index overflow in the xfrm_sk_policy_insert function in\r\n xfrm_user.c allows local users to cause a DoS (oops or deadlock) and\r\n possibly execute arbitrary code (CVE-2005-2456).\r\n \r\n The zisofs driver in versions prior to 2.6.12.5 allows local users and\r\n remove attackers to cause a DoS (crash) via a crafted compressed ISO\r\n filesystem (CVE-2005-2457).\r\n \r\n inflate.c in the zlib routines in versions prior to 2.6.12.5 allow\r\n remove attackers to cause a DoS (crash) via a compressed file with\r\n "improper tables" (CVE-2005-2458).\r\n \r\n The huft_build function in inflate.c in the zlib routines in versions\r\n prior to 2.6.12.5 returns the wrong value, allowing remote attackers to\r\n cause a DoS (crash) via a certain compressed file that leads to a null\r\n pointer dereference (CVE-2005-2459).\r\n \r\n A stack-based buffer overflow in the sendmsg function call in versions\r\n prior to 2.6.13.1 allow local users to execute arbitrary code by\r\n calling sendmsg and modifying the message contents in another thread\r\n (CVE-2005-2490).\r\n \r\n vlan_dev.c in version 2.6.8 allows remote attackers to cause a DoS\r\n (oops from null dereference) via certain UDP packets that lead to\r\n a function call with the wrong argument (CVE-2005-2548).\r\n \r\n The kernel does not properly restrict socket policy access to users\r\n with the CAP_NET_ADMIN capability, which could allow local users to\r\n conduct unauthorized activities via ipv4/ip_sockglue.c and\r\n ipv6/ipv6_sockglue.c (CVE-2005-2555).\r\n \r\n A memory leak in the seq_file implementation in the SCSI procfs\r\n interface (sg.c) in 2.6.13 and earlier allows a local user to cause a\r\n DoS (memory consumption) via certain repeated reads from\r\n /proc/scsi/gs/devices file which is not properly handled when the\r\n next() interator returns NULL or an error (CVE-2005-2800).\r\n \r\n xattr.c in the ext2 and ext3 file system code does not properly compare\r\n the name_index fields when sharing xattr blocks which could prevent\r\n ACLs from being applied (CVE-2005-2801).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 when running on 64bit\r\n processors allows remote attackers to cause a DoS (kernel panic) via\r\n certain attacks such as SSH brute force (CVE-2005-2872).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 does not properly\r\n perform certain tests when the jiffies value is greater than LONG_MAX,\r\n which can cause ipt_recent netfilter rules to block too early\r\n (CVE-2005-2873).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n The sys_set_mempolicy function in mempolicy.c allows local users to\r\n cause a DoS via a negative first argument (CVE-2005-3053).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n Exec does not properly clear posix-timers in multi-threaded\r\n environments, which result in a resource leak and could allow a large\r\n number of multiple local users to cause a DoS by using more posix-\r\n timers than specified by the quota for a single user (CVE-2005-3271).\r\n \r\n The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\r\n does not properly verify the ndigis argument for a new route, allowing\r\n an attacker to trigger array out-of-bounds errors with a large number\r\n of digipeats (CVE-2005-3273).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The NAT code in versions prior to 2.6.13 incorrectly declares a\r\n variable to be static, allowing remote attackers to cause a DoS (memory\r\n corruption) by causing two packets for the same protocol to be NATed at\r\n the same time (CVE-2005-3275).\r\n \r\n The sys_get_thread_area function in process.c in versions prior to\r\n 2.6.12.4 and 2.6.13 does not clear a data structure before copying it\r\n to userspace, which may allow a user process to obtain sensitive\r\n information (CVE-2005-3276).\r\n \r\n The following non-security fixes are also applied:\r\n \r\n Driver updates were made to the aic97xx and sata_sil modules.\r\n \r\n Support was added for ATI ipx400 chipsets, for IDE and sound.\r\n \r\n A build problem with icecream on the x86_64 platform was fixed.\r\n \r\n The pin1 APIC timer on RS480-based motherboards was disabled.\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1589\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2548\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2801\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3053\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3271\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 10.1:\r\n cc60a0c2a5c0425db63a625526475898 10.1/RPMS/kernel-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n 9c85d79e18e3dec0bd80605ab4ed7bc6 10.1/RPMS/kernel-enterprise-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n 619c620342e4786903ad174827a78982 10.1/RPMS/kernel-i586-up-1GB-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n bdfc653a5ca1e456d3c15c2f8f35d98d 10.1/RPMS/kernel-i686-up-64GB-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n a9241f9cd330bc79360f0dda4fa1eec5 10.1/RPMS/kernel-secure-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n 29bbd09a962d59cd92e60ab644439b6f 10.1/RPMS/kernel-smp-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n cae06806ff7412caa156fcea3d86c78f 10.1/RPMS/kernel-source-2.6-2.6.8.1-26mdk.i586.rpm\r\n 34122459890fa39f27a81cec4c3e56e6 10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-26mdk.i586.rpm\r\n 104478404575b1903f8ca961a0e68a21 10.1/SRPMS/kernel-2.6.8.1.26mdk-1-1mdk.src.rpm\r\n\r\n Mandriva Linux 10.1/X86_64:\r\n d8d56fcbe9daa46d35e80aa61ba6a6ce x86_64/10.1/RPMS/kernel-2.6.8.1.26mdk-1-1mdk.x86_64.rpm\r\n f784c422b1f5874e6456d8fc3eeb2449 x86_64/10.1/RPMS/kernel-secure-2.6.8.1.26mdk-1-1mdk.x86_64.rpm\r\n 1566275e89bb4087535f9de77157a5b6 x86_64/10.1/RPMS/kernel-smp-2.6.8.1.26mdk-1-1mdk.x86_64.rpm\r\n d30568e225088db18fe1bc72fc108ea9 x86_64/10.1/RPMS/kernel-source-2.6-2.6.8.1-26mdk.x86_64.rpm\r\n e1b2c9cf2feb58611eb7d48d8216bb45 x86_64/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-26mdk.x86_64.rpm\r\n 104478404575b1903f8ca961a0e68a21 x86_64/10.1/SRPMS/kernel-2.6.8.1.26mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDjffWmqjQ0CJFipgRAqT9AKCj6LQEho3qcisjiq7+8ongRHGzJACg5Cuy\r\nMD+4kCb7IPC636s6mwpEITY=\r\n=TuUh\r\n-----END PGP SIGNATURE-----", "modified": "2005-12-01T00:00:00", "published": "2005-12-01T00:00:00", "id": "SECURITYVULNS:DOC:10473", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10473", "title": "MDKSA-2005:219 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2019-05-30T02:21:58", "bulletinFamily": "unix", "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1017-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier, Simon Horman\nMarch 23th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.6.8\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE ID : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482 CVE-2006-1066\nDebian Bug : 295949 334113 330287 332587 332596 330343 330353 327416\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2004-1017\n\n Multiple overflows exist in the io_edgeport driver which might be usable\n as a denial of service attack vector.\n\nCVE-2005-0124\n\n Bryan Fulton reported a bounds checking bug in the coda_pioctl function\n which may allow local users to execute arbitrary code or trigger a denial\n of service attack.\n\nCVE-2005-0449\n \n An error in the skb_checksum_help() function from the netfilter framework\n has been discovered that allows the bypass of packet filter rules or\n a denial of service attack.\n\nCVE-2005-2457\n\n Tim Yamin discovered that insufficient input validation in the zisofs driver\n for compressed ISO file systems allows a denial of service attack through\n maliciously crafted ISO images.\n\nCVE-2005-2490\n\n A buffer overflow in the sendmsg() function allows local users to execute\n arbitrary code.\n\nCVE-2005-2555\n\n Herbert Xu discovered that the setsockopt() function was not restricted to\n users/processes with the CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of service attack. \n\nCVE-2005-2709\n\n Al Viro discovered a race condition in the /proc handling of network devices.\n A (local) attacker could exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code in kernel mode.\n\nCVE-2005-2800\n\n Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices\n leak memory, which allows a denial of service attack.\n\nCVE-2005-2973\n \n Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code\n can be forced into an endless loop, which allows a denial of service attack.\n\nCVE-2005-3044\n\n Vasiliy Averin discovered that the reference counters from sockfd_put() and \n fput() can be forced into overlapping, which allows a denial of service attack\n through a null pointer dereference.\n\nCVE-2005-3053\n\n Eric Dumazet discovered that the set_mempolicy() system call accepts a negative\n value for it's first argument, which triggers a BUG() assert. This allows a\n denial of service attack.\n\nCVE-2005-3055\n\n Harald Welte discovered that if a process issues a USB Request Block (URB)\n to a device and terminates before the URB completes, a stale pointer\n would be dereferenced. This could be used to trigger a denial of service\n attack.\n\nCVE-2005-3180\n\n Pavel Roskin discovered that the driver for Orinoco wireless cards clears\n it's buffers insufficiently. This could leak sensitive information into\n user space.\n\nCVE-2005-3181\n\n Robert Derr discovered that the audit subsystem uses an incorrect function to\n free memory, which allows a denial of service attack.\n\nCVE-2005-3257\n\n Rudolf Polzer discovered that the kernel improperly restricts access to the\n KDSKBSENT ioctl, which can possibly lead to privilege escalation.\n\nCVE-2005-3356\n\n Doug Chapman discovered that the mq_open syscall can be tricked into\n decrementing an internal counter twice, which allows a denial of service attack\n through a kernel panic.\n\nCVE-2005-3358\n\n Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy()\n system call leads to a kernel panic, which allows a denial of service attack.\n\nCVE-2005-3783\n\n The ptrace code using CLONE_THREAD didn't use the thread group ID to\n determine whether the caller is attaching to itself, which allows a denial\n of service attack.\n\nCVE-2005-3784\n\n The auto-reaping of childe processes functionality included ptraced-attached\n processes, which allows denial of service through dangling references.\n\nCVE-2005-3806\n\n Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,\n which could lead to memory corruption and denial of service.\n\nCVE-2005-3847\n\n It was discovered that a threaded real-time process, which is currently dumping\n core can be forced into a dead-lock situation by sending it a SIGKILL signal,\n which allows a denial of service attack. \n\nCVE-2005-3848\n\n Ollie Wild discovered a memory leak in the icmp_push_reply() function, which\n allows denial of service through memory consumption.\n\nCVE-2005-3857\n\n Chris Wright discovered that excessive allocation of broken file lock leases\n in the VFS layer can exhaust memory and fill up the system logging, which allows\n denial of service.\n\nCVE-2005-3858\n\n Patrick McHardy discovered a memory leak in the ip6_input_finish() function from\n the IPv6 code, which allows denial of service.\n\nCVE-2005-4605\n\n Karl Janmar discovered that a signedness error in the procfs code can be exploited\n to read kernel memory, which may disclose sensitive information.\n\nCVE-2005-4618\n\n Yi Ying discovered that sysctl does not properly enforce the size of a buffer, which\n allows a denial of service attack.\n\nCVE-2006-0095\n\n Stefan Rompf discovered that dm_crypt does not clear an internal struct before freeing\n it, which might disclose sensitive information.\n\nCVE-2006-0096\n\n It was discovered that the SDLA driver's capability checks were too lax\n for firmware upgrades.\n\nCVE-2006-0482\n\n Ludovic Courtes discovered that get_compat_timespec() performs insufficient input\n sanitizing, which allows a local denial of service attack.\n\nCVE-2006-1066\n\n It was discovered that ptrace() on the ia64 architecture allows a local denial of\n service attack, when preemption is enabled.\n\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\n Source 2.6.8-16sarge2\n Alpha architecture 2.6.8-16sarge2\n AMD64 architecture 2.6.8-16sarge2\n HP Precision architecture 2.6.8-6sarge2\n Intel IA-32 architecture 2.6.8-16sarge2\n Intel IA-64 architecture 2.6.8-14sarge2\n Motorola 680x0 architecture 2.6.8-4sarge2\n PowerPC architecture 2.6.8-12sarge2\n IBM S/390 architecture 2.6.8-5sarge2\n Sun Sparc architecture 2.6.8-15sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 3.1 (sarge)\n kernel-latest-2.6-alpha 101sarge1\n kernel-latest-2.6-amd64 103sarge1\n kernel-latest-2.6-hppa 2.6.8-1sarge1\n kernel-latest-2.6-sparc 101sarge1\n kernel-latest-2.6-i386 101sarge1\n kernel-latest-powerpc 102sarge1\n fai-kernels 1.9.1sarge1\n hostap-modules-i386 0.3.7-1sarge1\n mol-modules-2.6.8 0.9.70+2.6.8+12sarge1\n ndiswrapper-modules-i386 1.1-2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\nThis update introduces a change in the kernel's binary interface, the affected\nkernel packages inside Debian have been rebuilt, if you're running local addons\nyou'll need to rebuild these as well.\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.dsc\n Size/MD5 checksum: 874 a35d48f0d5b6c679b5130fb3aaa647cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.tar.gz\n Size/MD5 checksum: 14256 7c44e2e875b7995f5bb14effb5684b7d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1004 f98203872db1017d6053ababb496116d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.diff.gz\n Size/MD5 checksum: 1015096 0bb501098f732e6750e3413f4e9d148f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz\n Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.dsc\n Size/MD5 checksum: 896 caa3c2d1f06666c61ba31917a3c26b1f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.tar.gz\n Size/MD5 checksum: 2396 d71945b6f493574ce0d360de316f1873\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.dsc\n Size/MD5 checksum: 685 54417bc7eddc5722e0f5ce734e67edb9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.tar.gz\n Size/MD5 checksum: 1954 1cdaccf68580892b42cd88b5c5b03b9b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.dsc\n Size/MD5 checksum: 786 e99a3432c467f4f76e9b6e852333a9c5\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.tar.gz\n Size/MD5 checksum: 2123 d90ea9aa1ccb9ad3041d5d3b20894330\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.dsc\n Size/MD5 checksum: 813 e860fc8f679fdedb3817d09e25c77b66\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.tar.gz\n Size/MD5 checksum: 2055 3fb20a5238ac6dc6a84ba67a887d752e\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.dsc\n Size/MD5 checksum: 621 c8d489fa28bd6b65bd3bda1a460d8a08\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.tar.gz\n Size/MD5 checksum: 24387 25e9d10a881601e9329291faf5110b55\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.dsc\n Size/MD5 checksum: 993 6cd9024b61b9a6cf4862e204d330b9a3\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.tar.gz\n Size/MD5 checksum: 2661 d7bf35beb4924d8dab10b08380e9e289\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.dsc\n Size/MD5 checksum: 862 9d55e1790bcc518f315b44a52ed331bc\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.tar.gz\n Size/MD5 checksum: 2286 1e9932ed547a85a43b82c10ac9b11800\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1047 8fa892195f50896a45f4a2c64f66ce11\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 89240 5987c1e4d49bb7b3159f3a42b22d1e4f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.dsc\n Size/MD5 checksum: 1008 9c8bbaf47e657e4ac707c6f35cee0f2e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.tar.gz\n Size/MD5 checksum: 65886 0f42b0e9fc22cd2d5eb615d8f4f6922d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1103 df823aaf30d2d39f51762abf0fdab8e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 74018 415ea9bd8c15a343646a762c7ecbeb2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 812 3689bf78b872510caeaeaefe3a76b477\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 37429 69216b4fe13afb383e5559e4100439ff\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.dsc\n Size/MD5 checksum: 1071 f1d5f3c6a58c3b2efbecb6f481bc6e13\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.tar.gz\n Size/MD5 checksum: 25410 78cd732eb81df1bae3f513eb68aa95c0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.dsc\n Size/MD5 checksum: 1191 8a58beb88416f8235e0ccf91b94bda5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.tar.gz\n Size/MD5 checksum: 62533 d3a0fd97437e9eb69f07b5297246610b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.dsc\n Size/MD5 checksum: 833 aa306a38d5cf9f45e601633d239f868e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.tar.gz\n Size/MD5 checksum: 11437 2c70d8408f9656fba114ee59f22cb44b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.dsc\n Size/MD5 checksum: 1036 b2db64932de00311794a14eaded25ec3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.tar.gz\n Size/MD5 checksum: 22798 9d94f73ab654770fc251125e1332b2be\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.dsc\n Size/MD5 checksum: 703 f5c46506673becb263a62307591041b9\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.tar.gz\n Size/MD5 checksum: 4326 f6191f77c2f41e397e47b727b30d1f64\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.dsc\n Size/MD5 checksum: 1092 926d84df8f84a7c9cc68add4fee27427\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.tar.gz\n Size/MD5 checksum: 2273 896ab1f6cbb18b1afd092845b8e12523\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.dsc\n Size/MD5 checksum: 894 97a270d1e39bfd032314dc3171831846\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.tar.gz\n Size/MD5 checksum: 1782 1c5a70ee63b83630319152768b924a98\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 0f1542a109fbe036fb8af44e20397299\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 d75c152fdab411ad8184ba6331015dcd\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 69be478f2fa35a994c02a4f3b450a60e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1990 3ca05863dcaa11c43c0c7d4c29e4ddfd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 2758214 0ecffff87c9a03f6f19147c61a5fc48b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 230730 3b29ce53073ac08216153a5d6e4b629e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 225634 316c8d48a8a59da90707fb03e2149bc0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 20218454 9d8030373efb6dc3e2dfded09cf5c0d5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 20068918 710fee78a9ffbde5694b71af50e0060c\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb\n Size/MD5 checksum: 2104 ef0b887f5fbe7a50eb29b9f758f4dbe7\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb\n Size/MD5 checksum: 2112 99fc45919e4e99c75b9c9caa96892684\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2110 56ce795b6f72a01261f554d7f80e17f7\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb\n Size/MD5 checksum: 2126 687cd2d07a2216bd06b3e7167c34429a\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2122 80b347bd1c3b75ba8e6019eb4515131d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_amd64.deb\n Size/MD5 checksum: 2158 593b2f6857005238309652f1ed07b025\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_amd64.deb\n Size/MD5 checksum: 2166 c195509461a3829a88149ecb25dbcd3a\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2172 d87ecb48ff4c9706e28bee9b5e523f0d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_amd64.deb\n Size/MD5 checksum: 2218 28145de5465f3149b0fb7182c07e2dbb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2248 a709d2651b5bc6f16a46e482513ffd7c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 2720186 0db767733816d0a1d4a5e9840348532b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 224506 7b32141a97738499376939faf694b031\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 223506 3461e58701032b00a0340f931af02325\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 219164 e3841dd8bc0d6a326a2b186a2febe880\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 221058 aa43b631e5516324f5e357a50bf03919\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 217500 181e3fa415a02835b62dc538562650bb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 12560178 13c61c6f63e666a2da9d35e9b4b829b3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13251702 4a87624ae820a7fef519660321ccd002\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13213610 6f574e36cbe1c9adbac496968998d389\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13061358 d9bdb5fdcd2ca14594b4c4eeb0ec4e95\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13044562 61005d327a9ea9efed46625e79710689\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_i386.deb\n Size/MD5 checksum: 2106 fcb23b2830bed29439b86f0174bc36b0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_i386.deb\n Size/MD5 checksum: 2126 4261e8ea28972c4b1a0328491c142e9d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2114 3a59ea468ed72766258d4c6d4ca721d9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_i386.deb\n Size/MD5 checksum: 2134 bfbd467ce5c19e5e1909beb867da57c6\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2130 8c3cb8de73fecb230bf869dce2e92e9b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_i386.deb\n Size/MD5 checksum: 2160 3fdac05d7afc2d522191b8672310e3bb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_i386.deb\n Size/MD5 checksum: 2168 78248b7c5024afdd3e8bcf8f3b85fdd0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2180 33dbe8a50cd2deb102b2c26c3451cb0d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_i386.deb\n Size/MD5 checksum: 2228 8f87a7c45040d6192c7dd7521719bb84\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2250 0220661e0e1c24c0248a54ed13f93e96\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-386_101sarge1_i386.deb\n Size/MD5 checksum: 2150 f710e37e9e5af100ef65b167020739ca\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686_101sarge1_i386.deb\n Size/MD5 checksum: 2184 0dcabd1f69fe86bb1d431f193d032a5d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2248 88dbce576e5ec5b484085f0e7f204b1c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2160 459222cd722e8c592fef62a5e64d2e29\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2228 a528e1e7db01a3280a2bab86383f8f9e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge1_i386.deb\n Size/MD5 checksum: 2152 64f8938c4ccf9a567ace8906474a3a05\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686_101sarge1_i386.deb\n Size/MD5 checksum: 2182 3fc7225f53712469830cb60404598287\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2252 97cc65172e9583cf0299c68e53b2dbc3\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2164 cbd1dd8a0dc39c35598c131e0473ce46\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2232 5a55c3acad554351348c2c4bbe9347b9\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1_i386.deb\n Size/MD5 checksum: 11986970 3f1f1b972c9aea7e324d3f16252c1a14\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 2777384 1bb1a12e5057dff0213af9d62e204e1a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 256932 4ffede1559073c0fac6256ebf6bf0fa2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 254820 e24193f1e1a4e0f19e4f6dea078b94a3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 251726 9afbac1038d98e6377a02ff6aebb3441\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 254918 e32f308990db81bff7295a4724dfa23a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 251742 c4ad3e4f52e907067a44f25214b6b34f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 14064090 7801ebccc8aaa6cbdf94b8f97c017f17\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15534482 11587d9502f913721dde8c98fef3b676\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15343922 cc4689243c7fc2134bb4b6e89e44668a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15260668 839c21112982d20f38b3f4ebc6337cb9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15120180 3c0e8d9f3df47a5588618bdd0c0529f9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 2720230 12790a80072f9691a6aebfae99d2884a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 224370 288b4255fa05983bedd12c2787159713\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 223320 b0895780411c7883d4e662f59a614c09\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 219366 d2c62fcc31fe84998ff3ec7192adcaa9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 221098 14e8145058f41276743990373a602dc8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 217728 ff9ec1441b3c486f2bf699aa34cd19cf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 12559818 d106cb6e039594f39c69757139e3b81d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13251680 6885825a1d87f69e2b9a8733bcd3149a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13213584 78a23e516db62160e02d7531fdf56ceb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13211806 626ac3ecedbc13b34fa972842eddc87e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13188560 cd0f63a5cb74c21d601ffaf22230015d\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 140430 3f2b9eba956c9d736df02ee8f8048960\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 152842 d79caea6f9eb14dc29f060f4c402623c\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 155756 92824520277f5805f4315f59bdae29ba\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 159776 bfa56474c228de3f2225b01d555628cd\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 148882 bd479694e49548e272b99d651525211c\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 154512 2f4ca0b5a6d15d372810a4adf28db0a2\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 158304 4baf71cc92212d7ac2cacb5913ce15bd\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-386_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 147580 741b00a1dd08f0a3ec11807b5b5e0d21\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 164966 3608c1954937b7c2a562c5e7cec9c82a\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 168700 f4292765662e2f76d9a2e18af8052122\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 163394 cde18e20701333deb222482a6bacd7ab\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 167226 488d6c27c43fe4e6b39d3c2d8ee54be9\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-386_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 59506 783e00471ba34c7961a962bd92800dc6\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 68052 d71c7488bbe557ff73cecfb40866454c\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686-smp_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 68288 572be41d7cd81949fe08696bcf44bd50\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 66456 fc41d56657d638be30dbe7030ed30744\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7-smp_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 66896 ab693dc48e540eb2b7c902e5bb3f5bb0\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5014 b5eb10541045f43a896cff6863fabc99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5080 bef129992a5a0e02811924d9e2c20928\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5036 6013655c76a27afb60a5596344063fac\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5102 07d70aca348f010c1768a8f36f35d969\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 3097204 e62aa5944fb5f84f77a822b10dfaaec3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198498 7ce7e79e3a4a819907957fcf099a5c70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198092 75130dae14a72f13a096ea69c4af4f64\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198210 013fd74c791f3529c082844d464e52bb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 197804 68e2bbb8cf37ce358688fe8bc59d23d2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5010 f7d0ba9bd59a484ed8faa294f678b9cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5074 c2c04705ec9f041555b60157dde8dfa9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5034 5c00d1be7ba6cc5adb92a249a955fd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5102 b54e60d375f6e7ca263662d812175a5d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 21473296 d5ba65d7f15dcb9e8978af52cd78af19\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 22127598 56977e01aedd74201e249aa2dfb9d867\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 21391968 45b8ed70f88d2b5a32acb7664084972f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 22153416 86f73fcd2c8c7b38cd6f3bd62c19bd43\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1980 76a590df604e48b09ac92e97722e9b2b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1994 e52a21fa353ec696fab8a7540e23cee0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2068 b5572d57a20cced0a4a021bc3aeca59e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2000 332fb79b811586f1fdd543ec1a58fc0f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2066 ee4df56b5af375e3a77114b58cb7c355\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1990 974297ab2e66bc6e45265027a9cab1cc\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2062 b9cfcd2358379c5712991999117ed580\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1992 205b6094359187c7398018e138ed19a0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2052 afb79e0c218abf65b5bd8e5d754cdb38\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 2800462 f91eaebb158c9749c1d31dc383b6e0f8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 209530 b50da9513e91589182390342683fdb8e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 208622 ae7c1f319e17331a213d7b4ce7d16989\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 208182 c0462524e02dd0c6a27541a27e459c29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 207748 b02991119d8ccca8b9e4c31737ab695d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 16023554 815f08d56c68ac50dcdb521e14390b7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 16927964 7b4d90cbd15ddf98609cf72d3e512660\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 17476404 963d93e651086f54efb1375234957921\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 18305586 db6058c84e2f63cfe2611674114f354d\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3305946 8ef4160b024945d31d8744b14e32f25a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3101536 3382c3e69f2fe998f0e671e8e270807d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3011458 838d87ada5760307e762f1f3ec2c91f0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2986606 dcc8faa142a07efc35cfbcef3744406b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3173820 c83822fd5935e4ceb7816dcede3c7b9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2977534 b3449977e75ade201f49e27a44f79c1b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3046552 3694c7d1338e55cac77168122f5c4b38\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3105060 86f7a2f92ae27dd3f8b57e9aebf1b118\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2991336 3a28774631beb37997d937e55a6e9454\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers_102sarge1_powerpc.deb\n Size/MD5 checksum: 2380 fe4724ab347b4ac3332beba5e5ccfed4\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2396 6a2e8db727f0022e81255a442c5ebdc9\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.6_102sarge1_powerpc.deb\n Size/MD5 checksum: 2396 5eb96b2b98c92b52e6f932ab475b0fec\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2466 1d2424589e684946a5d6c7913db61976\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2514 2be237bec7e6d2878e75fc47a0222b9d\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3_102sarge1_powerpc.deb\n Size/MD5 checksum: 2414 dbd3d270955b623ad805839960aa96ae\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2442 e1b15674c71cec89a5a2e4d70461baac\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2438 a3b87f2ef01a823a715ff69ee2ec8406\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2476 06957c6d5d9d86c9e5551275974fc18d\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2466 60dc23b47e8c98fa7426197c1770fdb2\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2516 e08eb266e65cb83bf5dfd85c230bb48e\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3_102sarge1_powerpc.deb\n Size/MD5 checksum: 2400 d0a3883e658b675bef039514d5d317b9\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2422 e98c826345fc55bf1b4f261f0403001c\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2430 6838fb393d4ea7233a0db354ca8e0d6f\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2468 516df5d7055341135ca824e2c7ba4c59\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2440 84b8e93ae95a9a332835e459ae258c31\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2492 7bf7d3f281580247978af66b6bc71a9f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405208 bc0049d16d62333a59496f8448c0ae5b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405122 857956fab5ea958d1f0e29d9b8082074\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405120 f1d48b84ce88a36f9a250228f77b24bf\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405040 5aa69dd9407911e00cbd9bb1896f27b8\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405410 9f24a2e7ea0609f7ca18dc78496a400e\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405182 1c4270a6157a596aae2fb49c41a008ee\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 5145112 c45a74745d3359da81add15933eb847a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13537930 b88fc7f255a362ff1af0f127c105fe21\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13895234 1c6a336420e8af2d40962f6016104cab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13526632 ad1bc642f915effd59fd6c2c646ed848\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13883038 8afe1d42e0e03a81a55b108acd3a972d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13558318 71034f429cb959413adcc9f7df642d30\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13811714 79d63ee21fbcc4d343f73a391c2de350\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc_0.9.70+2.6.8+12sarge1_powerpc.deb\n Size/MD5 checksum: 38380 361eb34e717c3996b1b1118cac92da32\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc-smp_0.9.70+2.6.8+12sarge1_powerpc.deb\n Size/MD5 checksum: 39310 1c19f5fcbd866c83d6386ed643d08afa\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 5083010 42c4dd8c6c67ce7940f0d24bb745385c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 5084018 855029ce8570fc938826289ba375098b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 2973758 c8d12dd2fbddca3ab1b7bd905de4a90c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 1140118 328edfc2944127e2f1d6dca1842ce51d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 3179326 487c36323990a6ae1119f4c30f16cdd9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 2976012 d807ca6328f0f789b5f8dfff07d29db0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 1140596 32f51209baa4d72d8ccf6d5ed57f4638\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 3182684 fb892f14401c5cb0bc11a1f16a40a6fa\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc32_101sarge1_sparc.deb\n Size/MD5 checksum: 2094 ee7137ee7a7aaa37d5b0e34983d22ca5\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64_101sarge1_sparc.deb\n Size/MD5 checksum: 2098 1f028cdda7b37f42a9c93712a2af9cac\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb\n Size/MD5 checksum: 2106 c7539f2b30142c5e549e03e54a40ba35\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc32_101sarge1_sparc.deb\n Size/MD5 checksum: 2070 3ea5f8502192782ebfba70500eeb7eab\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64_101sarge1_sparc.deb\n Size/MD5 checksum: 2072 d3966357806c24f79e9d4e858dedd635\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64-smp_101sarge1_sparc.deb\n Size/MD5 checksum: 2090 b2872959f522478d84039d84eebf4e4e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 3516 e01d50a416f25627da8d7cf5282b0b4e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 2889160 058d5bbc4b91691fa87204302c7b1a8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 108198 d802239f368827f5cd139f3b8d5b9458\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 142976 6e0c64f83cc5cb9342c0f65b61a62a30\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 143640 f6ba9cf8f830e9e9f2c6297d35a2bc57\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 4547790 9cc8acb2d0a3e490dc3ae2ef8fc0f139\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 7431432 af5c99841ee5dcaa8fed642a89653f52\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 7625246 2e40c6079591a28656a280f4e8d5f344\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 6181586 52e464ad87d3d29f61211c3a20232459\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 1043588 4451df70d7b6df9b00ad788712959db3\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 34936164 826e6dc98eed9696f9070afd83a72559\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 33842 28717b85541e3aa8aa872f61798d23fc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge2_all.deb\n Size/MD5 checksum: 9244 3ba83cf4618348710094dbccbec1b0bb\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "modified": "2006-03-23T00:00:00", "published": "2006-03-23T00:00:00", "id": "DEBIAN:DSA-1017-1:CD473", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00098.html", "title": "[SECURITY] [DSA 1017-1] New Linux kernel 2.6.8 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}