ID REDHAT-RHSA-2006-0144.NASL Type nessus Reporter This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2006-03-16T00:00:00
Description
Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 3. This is the
seventh regular update.
This security advisory has been rated as having moderate security
impact by the Red Hat Security Response Team.
The Linux kernel handles the basic functions of the operating system.
This is the seventh regular kernel update to Red Hat Enterprise Linux
3.
New features introduced by this update include :
addition of the bnx2, dell_rbu, and megaraid_sas device
drivers - support for multi-core, multi-threaded Intel
Itanium processors - upgrade of the SATA subsystem to
include ATAPI and SMART support - optional tuning via
the new numa_memory_allocator, arp_announce, and
printk_ratelimit sysctls
There were many bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 3.
There were numerous driver updates and security fixes (elaborated
below). Other key areas affected by fixes in this update include the
networking subsystem, the VM subsystem, NPTL handling, autofs4, the
USB subsystem, CPU enumeration, and 32-bit-exec-mode handling on
64-bit architectures.
The following device drivers have been upgraded to new versions :
The following security bugs were fixed in this update :
a flaw in gzip/zlib handling internal to the kernel that
allowed a local user to cause a denial of service
(crash) (CVE-2005-2458,low)
a flaw in ext3 EA/ACL handling of attribute sharing that
allowed a local user to gain privileges (CVE-2005-2801,
moderate)
a minor info leak with the get_thread_area() syscall
that allowed a local user to view uninitialized kernel
stack data (CVE-2005-3276, low)
Note: The kernel-unsupported package contains various drivers and
modules that are unsupported and therefore might contain security
problems that have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2006:0144. The text
# itself is copyright (C) Red Hat, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(21089);
script_version("1.25");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2005-2458", "CVE-2005-2801", "CVE-2005-3276", "CVE-2005-4798");
script_xref(name:"RHSA", value:"2006:0144");
script_name(english:"RHEL 3 : kernel (RHSA-2006:0144)");
script_summary(english:"Checks the rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 3. This is the
seventh regular update.
This security advisory has been rated as having moderate security
impact by the Red Hat Security Response Team.
The Linux kernel handles the basic functions of the operating system.
This is the seventh regular kernel update to Red Hat Enterprise Linux
3.
New features introduced by this update include :
- addition of the bnx2, dell_rbu, and megaraid_sas device
drivers - support for multi-core, multi-threaded Intel
Itanium processors - upgrade of the SATA subsystem to
include ATAPI and SMART support - optional tuning via
the new numa_memory_allocator, arp_announce, and
printk_ratelimit sysctls
There were many bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 3.
There were numerous driver updates and security fixes (elaborated
below). Other key areas affected by fixes in this update include the
networking subsystem, the VM subsystem, NPTL handling, autofs4, the
USB subsystem, CPU enumeration, and 32-bit-exec-mode handling on
64-bit architectures.
The following device drivers have been upgraded to new versions :
aacraid -------- 1.1.5-2412 bnx2 ----------- 1.4.30 (new) dell_rbu
------- 2.1 (new) e1000 ---------- 6.1.16-k3 emulex --------- 7.3.3
fusion --------- 2.06.16.02 ipmi ----------- 35.11 megaraid2 ------
v2.10.10.1 megaraid_sas --- 00.00.02.00 (new) tg3 ------------ 3.43RH
The following security bugs were fixed in this update :
- a flaw in gzip/zlib handling internal to the kernel that
allowed a local user to cause a denial of service
(crash) (CVE-2005-2458,low)
- a flaw in ext3 EA/ACL handling of attribute sharing that
allowed a local user to gain privileges (CVE-2005-2801,
moderate)
- a minor info leak with the get_thread_area() syscall
that allowed a local user to view uninitialized kernel
stack data (CVE-2005-3276, low)
Note: The kernel-unsupported package contains various drivers and
modules that are unsupported and therefore might contain security
problems that have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum."
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2005-2458"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2005-2801"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2005-3276"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2005-4798"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2006:0144"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-doc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-smp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-source");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-unsupported");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:3");
script_set_attribute(attribute:"vuln_publication_date", value:"2005/08/23");
script_set_attribute(attribute:"patch_publication_date", value:"2006/03/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2006/03/16");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl", "linux_alt_patch_detect.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
include("ksplice.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 3.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
if (get_one_kb_item("Host/ksplice/kernel-cves"))
{
rm_kb_item(name:"Host/uptrack-uname-r");
cve_list = make_list("CVE-2005-2458", "CVE-2005-2801", "CVE-2005-3276", "CVE-2005-4798");
if (ksplice_cves_check(cve_list))
{
audit(AUDIT_PATCH_INSTALLED, "KSplice hotfix for RHSA-2006:0144");
}
else
{
__rpm_report = ksplice_reporting_text();
}
}
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2006:0144";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL3", reference:"kernel-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", cpu:"i386", reference:"kernel-BOOT-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", reference:"kernel-doc-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", cpu:"i686", reference:"kernel-hugemem-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", cpu:"i686", reference:"kernel-hugemem-unsupported-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", cpu:"i686", reference:"kernel-smp-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", cpu:"x86_64", reference:"kernel-smp-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", cpu:"i686", reference:"kernel-smp-unsupported-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", cpu:"x86_64", reference:"kernel-smp-unsupported-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", reference:"kernel-source-2.4.21-40.EL")) flag++;
if (rpm_check(release:"RHEL3", reference:"kernel-unsupported-2.4.21-40.EL")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc");
}
}
{"id": "REDHAT-RHSA-2006-0144.NASL", "bulletinFamily": "scanner", "title": "RHEL 3 : kernel (RHSA-2006:0144)", "description": "Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 3. This is the\nseventh regular update.\n\nThis security advisory has been rated as having moderate security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux\n3.\n\nNew features introduced by this update include :\n\n - addition of the bnx2, dell_rbu, and megaraid_sas device\n drivers - support for multi-core, multi-threaded Intel\n Itanium processors - upgrade of the SATA subsystem to\n include ATAPI and SMART support - optional tuning via\n the new numa_memory_allocator, arp_announce, and\n printk_ratelimit sysctls\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated\nbelow). Other key areas affected by fixes in this update include the\nnetworking subsystem, the VM subsystem, NPTL handling, autofs4, the\nUSB subsystem, CPU enumeration, and 32-bit-exec-mode handling on\n64-bit architectures.\n\nThe following device drivers have been upgraded to new versions :\n\naacraid -------- 1.1.5-2412 bnx2 ----------- 1.4.30 (new) dell_rbu\n------- 2.1 (new) e1000 ---------- 6.1.16-k3 emulex --------- 7.3.3\nfusion --------- 2.06.16.02 ipmi ----------- 35.11 megaraid2 ------\nv2.10.10.1 megaraid_sas --- 00.00.02.00 (new) tg3 ------------ 3.43RH\n\nThe following security bugs were fixed in this update :\n\n - a flaw in gzip/zlib handling internal to the kernel that\n allowed a local user to cause a denial of service\n (crash) (CVE-2005-2458,low)\n\n - a flaw in ext3 EA/ACL handling of attribute sharing that\n allowed a local user to gain privileges (CVE-2005-2801,\n moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\nNote: The kernel-unsupported package contains various drivers and\nmodules that are unsupported and therefore might contain security\nproblems that have not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "published": "2006-03-16T00:00:00", "modified": "2006-03-16T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://www.tenable.com/plugins/nessus/21089", "reporter": "This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://access.redhat.com/errata/RHSA-2006:0144", "https://access.redhat.com/security/cve/cve-2005-2458", "https://access.redhat.com/security/cve/cve-2005-2801", "https://access.redhat.com/security/cve/cve-2005-3276", "https://access.redhat.com/security/cve/cve-2005-4798"], "cvelist": ["CVE-2005-2801", "CVE-2005-4798", "CVE-2005-2458", "CVE-2005-3276"], "type": "nessus", "lastseen": "2021-01-17T13:05:34", "edition": 27, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-4798", "CVE-2005-3276", "CVE-2005-2458", "CVE-2005-2801"]}, {"type": "redhat", "idList": ["RHSA-2006:0144", "RHSA-2006:0101", "RHSA-2006:0191", "RHSA-2005:514", "RHSA-2006:0190"]}, {"type": "centos", "idList": ["CESA-2006:0101", "CESA-2005:514", "CESA-2006:0191-01", "CESA-2006:0144"]}, {"type": "nessus", "idList": ["REDHAT-RHSA-2006-0101.NASL", "DEBIAN_DSA-922.NASL", "CENTOS_RHSA-2006-0144.NASL", "SUSE_SA_2005_050.NASL", "UBUNTU_USN-169-1.NASL", "DEBIAN_DSA-1183.NASL", "CENTOS_RHSA-2006-0101.NASL", "UBUNTU_USN-178-1.NASL", "DEBIAN_DSA-921.NASL", "MANDRAKE_MDKSA-2005-219.NASL"]}, {"type": "osvdb", "idList": ["OSVDB:21281", "OSVDB:19026", "OSVDB:27781", "OSVDB:19314"]}, {"type": "seebug", "idList": ["SSV:4216", "SSV:4231"]}, {"type": "openvas", "idList": ["OPENVAS:57477", "OPENVAS:136141256231065553", "OPENVAS:57408", "OPENVAS:65553", "OPENVAS:56014", "OPENVAS:56013", "OPENVAS:57407"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1184-2:E2806", "DEBIAN:DSA-921-1:C6057", "DEBIAN:DSA-1183-1:885D0", "DEBIAN:DSA-922-1:C3994", "DEBIAN:DSA-1184-1:BA0C5"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:10475", "SECURITYVULNS:DOC:10474", "SECURITYVULNS:DOC:9632", "SECURITYVULNS:DOC:9541", "SECURITYVULNS:DOC:9691", "SECURITYVULNS:DOC:10473"]}, {"type": "ubuntu", "idList": ["USN-169-1", "USN-219-1", "USN-178-1"]}, {"type": "suse", "idList": ["SUSE-SA:2005:018", "SUSE-SA:2005:068", "SUSE-SA:2006:028", "SUSE-SA:2005:050"]}], "modified": "2021-01-17T13:05:34", "rev": 2}, "score": {"value": 6.1, "vector": "NONE", "modified": "2021-01-17T13:05:34", "rev": 2}, "vulnersScore": 6.1}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0144. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21089);\n script_version(\"1.25\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2005-2458\", \"CVE-2005-2801\", \"CVE-2005-3276\", \"CVE-2005-4798\");\n script_xref(name:\"RHSA\", value:\"2006:0144\");\n\n script_name(english:\"RHEL 3 : kernel (RHSA-2006:0144)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 3. This is the\nseventh regular update.\n\nThis security advisory has been rated as having moderate security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux\n3.\n\nNew features introduced by this update include :\n\n - addition of the bnx2, dell_rbu, and megaraid_sas device\n drivers - support for multi-core, multi-threaded Intel\n Itanium processors - upgrade of the SATA subsystem to\n include ATAPI and SMART support - optional tuning via\n the new numa_memory_allocator, arp_announce, and\n printk_ratelimit sysctls\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated\nbelow). Other key areas affected by fixes in this update include the\nnetworking subsystem, the VM subsystem, NPTL handling, autofs4, the\nUSB subsystem, CPU enumeration, and 32-bit-exec-mode handling on\n64-bit architectures.\n\nThe following device drivers have been upgraded to new versions :\n\naacraid -------- 1.1.5-2412 bnx2 ----------- 1.4.30 (new) dell_rbu\n------- 2.1 (new) e1000 ---------- 6.1.16-k3 emulex --------- 7.3.3\nfusion --------- 2.06.16.02 ipmi ----------- 35.11 megaraid2 ------\nv2.10.10.1 megaraid_sas --- 00.00.02.00 (new) tg3 ------------ 3.43RH\n\nThe following security bugs were fixed in this update :\n\n - a flaw in gzip/zlib handling internal to the kernel that\n allowed a local user to cause a denial of service\n (crash) (CVE-2005-2458,low)\n\n - a flaw in ext3 EA/ACL handling of attribute sharing that\n allowed a local user to gain privileges (CVE-2005-2801,\n moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\nNote: The kernel-unsupported package contains various drivers and\nmodules that are unsupported and therefore might contain security\nproblems that have not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3276\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-4798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0144\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/08/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/03/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/03/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2005-2458\", \"CVE-2005-2801\", \"CVE-2005-3276\", \"CVE-2005-4798\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0144\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0144\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-doc-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-unsupported-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-unsupported-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-source-2.4.21-40.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-unsupported-2.4.21-40.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "naslFamily": "Red Hat Local Security Checks", "pluginID": "21089", "cpe": ["cpe:/o:redhat:enterprise_linux:3", "p-cpe:/a:redhat:enterprise_linux:kernel-BOOT", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-source", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T11:34:58", "description": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.", "edition": 3, "cvss3": {}, "published": "2005-12-31T05:00:00", "title": "CVE-2005-4798", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-4798"], "modified": "2017-10-11T01:30:00", "cpe": ["cpe:/o:linux:linux_kernel:2.4.27", "cpe:/o:linux:linux_kernel:2.4.21", "cpe:/o:linux:linux_kernel:2.4.24_ow1", "cpe:/o:linux:linux_kernel:2.4.11", "cpe:/o:linux:linux_kernel:2.4.20", "cpe:/o:linux:linux_kernel:2.4.14", "cpe:/o:linux:linux_kernel:2.4.26", "cpe:/o:linux:linux_kernel:2.4.23_ow2", "cpe:/o:linux:linux_kernel:2.4.25", "cpe:/o:linux:linux_kernel:2.4.2", "cpe:/o:linux:linux_kernel:2.4.22", "cpe:/o:linux:linux_kernel:2.4.18", "cpe:/o:linux:linux_kernel:2.4.30", "cpe:/o:linux:linux_kernel:2.4.16", "cpe:/o:linux:linux_kernel:2.4.23", "cpe:/o:linux:linux_kernel:2.4.12", "cpe:/o:linux:linux_kernel:2.4.13", "cpe:/o:linux:linux_kernel:2.4.0", "cpe:/o:linux:linux_kernel:2.4.28", "cpe:/o:linux:linux_kernel:2.4.10", "cpe:/o:linux:linux_kernel:2.4.19", "cpe:/o:linux:linux_kernel:2.4.3", "cpe:/o:linux:linux_kernel:2.4.17", "cpe:/o:linux:linux_kernel:2.4.1", "cpe:/o:linux:linux_kernel:2.4.15", "cpe:/o:linux:linux_kernel:2.4.29", "cpe:/o:linux:linux_kernel:2.4.24"], "id": "CVE-2005-4798", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4798", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.11:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:56", "description": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.", "edition": 3, "cvss3": {}, "published": "2005-10-21T01:02:00", "title": "CVE-2005-3276", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-3276"], "modified": "2018-10-19T15:35:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.6.11.9", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.11.10", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.6.8.1", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.11.3", "cpe:/o:linux:linux_kernel:2.6.12.2"], "id": "CVE-2005-3276", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3276", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:55", "description": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".", "edition": 3, "cvss3": {}, "published": "2005-08-23T04:00:00", "title": "CVE-2005-2458", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-2458"], "modified": "2018-10-19T15:32:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.8.1.5", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.6.11_rc1_bk6", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.6.8.1", "cpe:/o:linux:linux_kernel:2.6_test9_cvs", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.11.3"], "id": "CVE-2005-2458", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2458", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:34:55", "description": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "edition": 3, "cvss3": {}, "published": "2005-09-06T17:03:00", "title": "CVE-2005-2801", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-2801"], "modified": "2018-10-19T15:33:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.0"], "id": "CVE-2005-2801", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2801", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"]}], "redhat": [{"lastseen": "2019-12-11T13:31:22", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2458", "CVE-2005-2801", "CVE-2005-3276", "CVE-2005-4798"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is the seventh regular kernel update to Red Hat Enterprise Linux 3.\r\n\r\nNew features introduced by this update include:\r\n\r\n - addition of the bnx2, dell_rbu, and megaraid_sas device drivers\r\n - support for multi-core, multi-threaded Intel Itanium processors\r\n - upgrade of the SATA subsystem to include ATAPI and SMART support\r\n - optional tuning via the new numa_memory_allocator, arp_announce,\r\n and printk_ratelimit sysctls\r\n\r\nThere were many bug fixes in various parts of the kernel. The ongoing\r\neffort to resolve these problems has resulted in a marked improvement in\r\nthe reliability and scalability of Red Hat Enterprise Linux 3.\r\n\r\nThere were numerous driver updates and security fixes (elaborated below).\r\nOther key areas affected by fixes in this update include the networking\r\nsubsystem, the VM subsystem, NPTL handling, autofs4, the USB subsystem,\r\nCPU enumeration, and 32-bit-exec-mode handling on 64-bit architectures.\r\n\r\nThe following device drivers have been upgraded to new versions:\r\n\r\n aacraid -------- 1.1.5-2412\r\n bnx2 ----------- 1.4.30 (new)\r\n dell_rbu ------- 2.1 (new)\r\n e1000 ---------- 6.1.16-k3\r\n emulex --------- 7.3.3\r\n fusion --------- 2.06.16.02\r\n ipmi ----------- 35.11\r\n megaraid2 ------ v2.10.10.1\r\n megaraid_sas --- 00.00.02.00 (new)\r\n tg3 ------------ 3.43RH\r\n\r\nThe following security bugs were fixed in this update:\r\n\r\n - a flaw in gzip/zlib handling internal to the kernel that allowed\r\n a local user to cause a denial of service (crash)\r\n (CVE-2005-2458,low)\r\n\r\n - a flaw in ext3 EA/ACL handling of attribute sharing that allowed\r\n a local user to gain privileges (CVE-2005-2801, moderate)\r\n\r\n - a minor info leak with the get_thread_area() syscall that allowed\r\n a local user to view uninitialized kernel stack data\r\n (CVE-2005-3276, low)\r\n\r\nNote: The kernel-unsupported package contains various drivers and modules\r\nthat are unsupported and therefore might contain security problems that\r\nhave not been addressed.\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\r\nkernels to the packages associated with their machine architectures\r\nand configurations as listed in this erratum.", "modified": "2017-07-29T20:28:54", "published": "2006-03-15T14:27:16", "id": "RHSA-2006:0144", "href": "https://access.redhat.com/errata/RHSA-2006:0144", "type": "redhat", "title": "(RHSA-2006:0144) Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-08-13T18:46:12", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1190", "CVE-2005-2458", "CVE-2005-2709", "CVE-2005-2800", "CVE-2005-3044", "CVE-2005-3106", "CVE-2005-3109", "CVE-2005-3276", "CVE-2005-3356", "CVE-2005-3358", "CVE-2005-3784", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-3857", "CVE-2005-3858", "CVE-2005-4605"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw which allowed a local user to write to firmware on read-only\r\nopened /dev/cdrom devices (CVE-2004-1190, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in the SCSI procfs interface that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-2800, moderate)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a race condition when threads share memory mapping that allowed local\r\nusers to cause a denial of service (deadlock) (CVE-2005-3106, important)\r\n\r\n- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that\r\nallowed local users to cause a denial of service (crash) (CVE-2005-3109,\r\nmoderate)\r\n\r\n- a minor info leak with the get_thread_area() syscall that allowed\r\na local user to view uninitialized kernel stack data (CVE-2005-3276, low) \r\n\r\n- a flaw in mq_open system call that allowed a local user to cause a denial\r\nof service (crash) (CVE-2005-3356, important)\r\n\r\n- a flaw in set_mempolicy that allowed a local user on some 64-bit\r\narchitectures to cause a denial of service (crash) (CVE-2005-3358, important)\r\n\r\n- a flaw in the auto-reap of child processes that allowed a local user to\r\ncause a denial of service (crash) (CVE-2005-3784, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate) \r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important) \r\n\r\n- a flaw in procfs handling that allowed a local user to read kernel memory\r\n(CVE-2005-4605, important)\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2017-09-08T12:09:45", "published": "2006-01-17T05:00:00", "id": "RHSA-2006:0101", "href": "https://access.redhat.com/errata/RHSA-2006:0101", "type": "redhat", "title": "(RHSA-2006:0101) kernel security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:52", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1058", "CVE-2004-1073", "CVE-2005-0124", "CVE-2005-0400", "CVE-2005-0815", "CVE-2005-2458", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3275", "CVE-2005-3806"], "description": "The Linux kernel handles the basic functions of the operating system. \r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a flaw in the coda module that allowed a local user to cause a denial of\r\nservice (crash) or possibly gain privileges (CVE-2005-0124, moderate)\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed: \r\n\r\n- Handle set_brk() errors in binfmt_elf/aout\r\n\r\n- Correct error handling in shmem_ioctl\r\n\r\n- Correct scsi error return\r\n\r\n- Fix netdump time keeping bug\r\n\r\n- Fix netdump link-down freeze\r\n\r\n- Fix FAT fs deadlock\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2018-03-14T19:25:57", "published": "2006-02-01T05:00:00", "id": "RHSA-2006:0191", "href": "https://access.redhat.com/errata/RHSA-2006:0191", "type": "redhat", "title": "(RHSA-2006:0191) kernel security update", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:46", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1058", "CVE-2004-1073", "CVE-2005-0400", "CVE-2005-0815", "CVE-2005-2458", "CVE-2005-2708", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3274", "CVE-2005-3275", "CVE-2005-3806"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2708, important) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a race condition affecting SMP systems that allowed a local user to cause\r\na denial of service (crash) (CVE-2005-3274, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed:\r\n\r\n- Handle set_brk() errors in binfmt_elf\r\n\r\n- Correct scsi error return\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2018-03-14T19:25:39", "published": "2006-02-01T05:00:00", "id": "RHSA-2006:0190", "href": "https://access.redhat.com/errata/RHSA-2006:0190", "type": "redhat", "title": "(RHSA-2006:0190) kernel security update", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-12-11T13:32:43", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0756", "CVE-2005-1265", "CVE-2005-1761", "CVE-2005-1762", "CVE-2005-1763", "CVE-2005-2098", "CVE-2005-2099", "CVE-2005-2100", "CVE-2005-2456", "CVE-2005-2490", "CVE-2005-2492", "CVE-2005-2555", "CVE-2005-2801", "CVE-2005-2872", "CVE-2005-3105", "CVE-2005-3274", "CVE-2005-3275", "CVE-2005-4886", "CVE-2006-5871"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is the second regular kernel update to Red Hat Enterprise Linux 4.\r\n\r\nNew features introduced in this update include:\r\n- Audit support\r\n- systemtap - kprobes, relayfs\r\n- Keyring support\r\n- iSCSI Initiator - iscsi_sfnet 4:0.1.11-1\r\n- Device mapper multipath support\r\n- Intel dual core support\r\n- esb2 chipset support\r\n- Increased exec-shield coverage\r\n- Dirty page tracking for HA systems\r\n- Diskdump -- allow partial diskdumps and directing to swap\r\n\r\nThere were several bug fixes in various parts of the kernel. The ongoing\r\neffort to resolve these problems has resulted in a marked improvement\r\nin the reliability and scalability of Red Hat Enterprise Linux 4. \r\n\r\nThe following security bugs were fixed in this update, detailed below with\r\ncorresponding CAN names available from the Common Vulnerabilities and\r\nExposures project (cve.mitre.org):\r\n\r\n- flaws in ptrace() syscall handling on 64-bit systems that allowed a local\r\nuser to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,\r\nCAN-2005-1762, CAN-2005-1763)\r\n\r\n- flaws in IPSEC network handling that allowed a local user to cause a\r\ndenial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)\r\n\r\n- a flaw in sendmsg() syscall handling on 64-bit systems that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CAN-2005-2490)\r\n\r\n- a flaw in sendmsg() syscall handling that allowed a local user to cause a\r\ndenial of service by altering hardware state (CAN-2005-2492)\r\n\r\n- a flaw that prevented the topdown allocator from allocating mmap areas\r\nall the way down to address zero (CAN-2005-1265)\r\n\r\n- flaws dealing with keyrings that could cause a local denial of service\r\n(CAN-2005-2098, CAN-2005-2099)\r\n\r\n- a flaw in the 4GB split patch that could allow a local denial of service\r\n(CAN-2005-2100)\r\n\r\n- a xattr sharing bug in the ext2 and ext3 file systems that could cause\r\ndefault ACLs to disappear (CAN-2005-2801)\r\n\r\n- a flaw in the ipt_recent module on 64-bit architectures which could allow\r\na remote denial of service (CAN-2005-2872)\r\n\r\nThe following device drivers have been upgraded to new versions:\r\n\r\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nmegaraid_mbox --- 2.20.4.5 to 2.20.4.6\r\nmegaraid_mm ----- 2.20.2.5 to 2.20.2.6 \r\nlpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17\r\ncciss ----------- 2.6.4 to 2.6.6\r\nipw2100 --------- 1.0.3 to 1.1.0\r\ntg3 ------------- 3.22-rh to 3.27-rh\r\ne100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI\r\ne1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI\r\n3c59x ----------- LK1.1.19\r\nmptbase --------- 3.01.16 to 3.02.18\r\nixgb ------------ 1.0.66 to 1.0.95-k2-NAPI\r\nlibata ---------- 1.10 to 1.11\r\nsata_via -------- 1.0 to 1.1\r\nsata_ahci ------- 1.00 to 1.01\r\nsata_qstor ------ 0.04\r\nsata_sil -------- 0.8 to 0.9\r\nsata_svw -------- 1.05 to 1.06\r\ns390: crypto ---- 1.31 to 1.57\r\ns390: zfcp ------ \r\ns390: CTC-MPC ---\r\ns390: dasd -------\r\ns390: cio -------\r\ns390: qeth ------\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\r\nkernels to the packages associated with their machine architectures\r\nand configurations as listed in this erratum.", "modified": "2017-09-08T11:54:13", "published": "2005-10-05T04:00:00", "id": "RHSA-2005:514", "href": "https://access.redhat.com/errata/RHSA-2005:514", "type": "redhat", "title": "(RHSA-2005:514) Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:25:00", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2801", "CVE-2005-4798", "CVE-2005-2458", "CVE-2005-3276"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0144\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is the seventh regular kernel update to Red Hat Enterprise Linux 3.\r\n\r\nNew features introduced by this update include:\r\n\r\n - addition of the bnx2, dell_rbu, and megaraid_sas device drivers\r\n - support for multi-core, multi-threaded Intel Itanium processors\r\n - upgrade of the SATA subsystem to include ATAPI and SMART support\r\n - optional tuning via the new numa_memory_allocator, arp_announce,\r\n and printk_ratelimit sysctls\r\n\r\nThere were many bug fixes in various parts of the kernel. The ongoing\r\neffort to resolve these problems has resulted in a marked improvement in\r\nthe reliability and scalability of Red Hat Enterprise Linux 3.\r\n\r\nThere were numerous driver updates and security fixes (elaborated below).\r\nOther key areas affected by fixes in this update include the networking\r\nsubsystem, the VM subsystem, NPTL handling, autofs4, the USB subsystem,\r\nCPU enumeration, and 32-bit-exec-mode handling on 64-bit architectures.\r\n\r\nThe following device drivers have been upgraded to new versions:\r\n\r\n aacraid -------- 1.1.5-2412\r\n bnx2 ----------- 1.4.30 (new)\r\n dell_rbu ------- 2.1 (new)\r\n e1000 ---------- 6.1.16-k3\r\n emulex --------- 7.3.3\r\n fusion --------- 2.06.16.02\r\n ipmi ----------- 35.11\r\n megaraid2 ------ v2.10.10.1\r\n megaraid_sas --- 00.00.02.00 (new)\r\n tg3 ------------ 3.43RH\r\n\r\nThe following security bugs were fixed in this update:\r\n\r\n - a flaw in gzip/zlib handling internal to the kernel that allowed\r\n a local user to cause a denial of service (crash)\r\n (CVE-2005-2458,low)\r\n\r\n - a flaw in ext3 EA/ACL handling of attribute sharing that allowed\r\n a local user to gain privileges (CVE-2005-2801, moderate)\r\n\r\n - a minor info leak with the get_thread_area() syscall that allowed\r\n a local user to view uninitialized kernel stack data\r\n (CVE-2005-3276, low)\r\n\r\nNote: The kernel-unsupported package contains various drivers and modules\r\nthat are unsupported and therefore might contain security problems that\r\nhave not been addressed.\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\r\nkernels to the packages associated with their machine architectures\r\nand configurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-March/024784.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-March/024785.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-March/024793.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-March/024794.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-doc\nkernel-hugemem\nkernel-hugemem-unsupported\nkernel-smp\nkernel-smp-unsupported\nkernel-source\nkernel-unsupported\nkernel-utils\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0144.html", "edition": 6, "modified": "2006-03-18T20:08:32", "published": "2006-03-15T23:33:22", "href": "http://lists.centos.org/pipermail/centos-announce/2006-March/024784.html", "id": "CESA-2006:0144", "title": "kernel security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-12-20T18:25:06", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0101\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw which allowed a local user to write to firmware on read-only\r\nopened /dev/cdrom devices (CVE-2004-1190, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in the SCSI procfs interface that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-2800, moderate)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a race condition when threads share memory mapping that allowed local\r\nusers to cause a denial of service (deadlock) (CVE-2005-3106, important)\r\n\r\n- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that\r\nallowed local users to cause a denial of service (crash) (CVE-2005-3109,\r\nmoderate)\r\n\r\n- a minor info leak with the get_thread_area() syscall that allowed\r\na local user to view uninitialized kernel stack data (CVE-2005-3276, low) \r\n\r\n- a flaw in mq_open system call that allowed a local user to cause a denial\r\nof service (crash) (CVE-2005-3356, important)\r\n\r\n- a flaw in set_mempolicy that allowed a local user on some 64-bit\r\narchitectures to cause a denial of service (crash) (CVE-2005-3358, important)\r\n\r\n- a flaw in the auto-reap of child processes that allowed a local user to\r\ncause a denial of service (crash) (CVE-2005-3784, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate) \r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important) \r\n\r\n- a flaw in procfs handling that allowed a local user to read kernel memory\r\n(CVE-2005-4605, important)\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024618.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024619.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024620.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024621.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024622.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-smp\nkernel-smp-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0101.html", "edition": 4, "modified": "2006-01-18T18:30:45", "published": "2006-01-18T00:05:51", "href": "http://lists.centos.org/pipermail/centos-announce/2006-January/024618.html", "id": "CESA-2006:0101", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:28:01", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1058", "CVE-2005-0124", "CVE-2005-3275", "CVE-2005-3806", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-0815", "CVE-2005-0400", "CVE-2005-2458", "CVE-2002-2185", "CVE-2004-1073"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0191-01\n\n\nThe Linux kernel handles the basic functions of the operating system. \r\n\r\nThese new kernel packages contain fixes for the security issues described\r\nbelow:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate) \r\n\r\n- a race condition that allowed local users to read the environment\r\nvariables of another process (CVE-2004-1058, low)\r\n\r\n- a flaw in the open_exec function of execve that allowed a local user to\r\nread setuid ELF binaries that should otherwise be protected by standard\r\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\r\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\r\nmissing from that update.\r\n\r\n- a flaw in the coda module that allowed a local user to cause a denial of\r\nservice (crash) or possibly gain privileges (CVE-2005-0124, moderate)\r\n\r\n- a potential leak of kernel data from ext2 file system handling\r\n(CVE-2005-0400, low) \r\n\r\n- flaws in ISO-9660 file system handling that allowed the mounting of\r\nan invalid image on a CD-ROM to cause a denial of service (crash)\r\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate) \r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \r\n\r\n- a network buffer info leak using the orinoco driver that allowed a remote\r\nuser to possibly view uninitialized data (CVE-2005-3180, important) \r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\r\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important) \r\n\r\nThe following bugs were also addressed: \r\n\r\n- Handle set_brk() errors in binfmt_elf/aout\r\n\r\n- Correct error handling in shmem_ioctl\r\n\r\n- Correct scsi error return\r\n\r\n- Fix netdump time keeping bug\r\n\r\n- Fix netdump link-down freeze\r\n\r\n- Fix FAT fs deadlock\r\n\r\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-February/024658.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-debug\nkernel-doc\nkernel-enterprise\nkernel-headers\nkernel-smp\nkernel-source\nkernel-summit\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 5, "modified": "2006-02-02T22:07:50", "published": "2006-02-02T22:07:50", "href": "http://lists.centos.org/pipermail/centos-announce/2006-February/024658.html", "id": "CESA-2006:0191-01", "title": "kernel security update", "type": "centos", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2020-07-17T03:30:47", "bulletinFamily": "unix", "cvelist": ["CVE-2005-1763", "CVE-2005-2801", "CVE-2005-2100", "CVE-2005-2872", "CVE-2005-2099", "CVE-2005-2490", "CVE-2005-1762", "CVE-2005-2098", "CVE-2005-3275", "CVE-2005-3274", "CVE-2006-5871", "CVE-2005-1265", "CVE-2005-4886", "CVE-2005-1761", "CVE-2005-2492", "CVE-2005-2456", "CVE-2005-0756", "CVE-2005-3105", "CVE-2005-2555"], "description": "**CentOS Errata and Security Advisory** CESA-2005:514\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is the second regular kernel update to Red Hat Enterprise Linux 4.\r\n\r\nNew features introduced in this update include:\r\n- Audit support\r\n- systemtap - kprobes, relayfs\r\n- Keyring support\r\n- iSCSI Initiator - iscsi_sfnet 4:0.1.11-1\r\n- Device mapper multipath support\r\n- Intel dual core support\r\n- esb2 chipset support\r\n- Increased exec-shield coverage\r\n- Dirty page tracking for HA systems\r\n- Diskdump -- allow partial diskdumps and directing to swap\r\n\r\nThere were several bug fixes in various parts of the kernel. The ongoing\r\neffort to resolve these problems has resulted in a marked improvement\r\nin the reliability and scalability of Red Hat Enterprise Linux 4. \r\n\r\nThe following security bugs were fixed in this update, detailed below with\r\ncorresponding CAN names available from the Common Vulnerabilities and\r\nExposures project (cve.mitre.org):\r\n\r\n- flaws in ptrace() syscall handling on 64-bit systems that allowed a local\r\nuser to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,\r\nCAN-2005-1762, CAN-2005-1763)\r\n\r\n- flaws in IPSEC network handling that allowed a local user to cause a\r\ndenial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)\r\n\r\n- a flaw in sendmsg() syscall handling on 64-bit systems that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CAN-2005-2490)\r\n\r\n- a flaw in sendmsg() syscall handling that allowed a local user to cause a\r\ndenial of service by altering hardware state (CAN-2005-2492)\r\n\r\n- a flaw that prevented the topdown allocator from allocating mmap areas\r\nall the way down to address zero (CAN-2005-1265)\r\n\r\n- flaws dealing with keyrings that could cause a local denial of service\r\n(CAN-2005-2098, CAN-2005-2099)\r\n\r\n- a flaw in the 4GB split patch that could allow a local denial of service\r\n(CAN-2005-2100)\r\n\r\n- a xattr sharing bug in the ext2 and ext3 file systems that could cause\r\ndefault ACLs to disappear (CAN-2005-2801)\r\n\r\n- a flaw in the ipt_recent module on 64-bit architectures which could allow\r\na remote denial of service (CAN-2005-2872)\r\n\r\nThe following device drivers have been upgraded to new versions:\r\n\r\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nmegaraid_mbox --- 2.20.4.5 to 2.20.4.6\r\nmegaraid_mm ----- 2.20.2.5 to 2.20.2.6 \r\nlpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17\r\ncciss ----------- 2.6.4 to 2.6.6\r\nipw2100 --------- 1.0.3 to 1.1.0\r\ntg3 ------------- 3.22-rh to 3.27-rh\r\ne100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI\r\ne1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI\r\n3c59x ----------- LK1.1.19\r\nmptbase --------- 3.01.16 to 3.02.18\r\nixgb ------------ 1.0.66 to 1.0.95-k2-NAPI\r\nlibata ---------- 1.10 to 1.11\r\nsata_via -------- 1.0 to 1.1\r\nsata_ahci ------- 1.00 to 1.01\r\nsata_qstor ------ 0.04\r\nsata_sil -------- 0.8 to 0.9\r\nsata_svw -------- 1.05 to 1.06\r\ns390: crypto ---- 1.31 to 1.57\r\ns390: zfcp ------ \r\ns390: CTC-MPC ---\r\ns390: dasd -------\r\ns390: cio -------\r\ns390: qeth ------\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\r\nkernels to the packages associated with their machine architectures\r\nand configurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/024282.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/024285.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-514.html", "edition": 8, "modified": "2005-10-06T00:20:53", "published": "2005-10-05T16:21:56", "href": "http://lists.centos.org/pipermail/centos-announce/2005-October/024282.html", "id": "CESA-2005:514", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2021-01-06T09:24:54", "description": "Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 3. This is the\nseventh regular update.\n\nThis security advisory has been rated as having moderate security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux\n3.\n\nNew features introduced by this update include :\n\n - addition of the bnx2, dell_rbu, and megaraid_sas device\n drivers - support for multi-core, multi-threaded Intel\n Itanium processors - upgrade of the SATA subsystem to\n include ATAPI and SMART support - optional tuning via\n the new numa_memory_allocator, arp_announce, and\n printk_ratelimit sysctls\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated\nbelow). Other key areas affected by fixes in this update include the\nnetworking subsystem, the VM subsystem, NPTL handling, autofs4, the\nUSB subsystem, CPU enumeration, and 32-bit-exec-mode handling on\n64-bit architectures.\n\nThe following device drivers have been upgraded to new versions :\n\naacraid -------- 1.1.5-2412 bnx2 ----------- 1.4.30 (new) dell_rbu\n------- 2.1 (new) e1000 ---------- 6.1.16-k3 emulex --------- 7.3.3\nfusion --------- 2.06.16.02 ipmi ----------- 35.11 megaraid2 ------\nv2.10.10.1 megaraid_sas --- 00.00.02.00 (new) tg3 ------------ 3.43RH\n\nThe following security bugs were fixed in this update :\n\n - a flaw in gzip/zlib handling internal to the kernel that\n allowed a local user to cause a denial of service\n (crash) (CVE-2005-2458,low)\n\n - a flaw in ext3 EA/ACL handling of attribute sharing that\n allowed a local user to gain privileges (CVE-2005-2801,\n moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\nNote: The kernel-unsupported package contains various drivers and\nmodules that are unsupported and therefore might contain security\nproblems that have not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "edition": 26, "published": "2006-07-03T00:00:00", "title": "CentOS 3 : kernel (CESA-2006:0144)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2801", "CVE-2005-4798", "CVE-2005-2458", "CVE-2005-3276"], "modified": "2006-07-03T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-hugemem-unsupported", "p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-BOOT", "p-cpe:/a:centos:centos:kernel-smp-unsupported", "p-cpe:/a:centos:centos:kernel-source", "p-cpe:/a:centos:centos:kernel-unsupported", "cpe:/o:centos:centos:3"], "id": "CENTOS_RHSA-2006-0144.NASL", "href": "https://www.tenable.com/plugins/nessus/21882", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0144 and \n# CentOS Errata and Security Advisory 2006:0144 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21882);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2005-2458\", \"CVE-2005-2801\", \"CVE-2005-3276\", \"CVE-2005-4798\");\n script_xref(name:\"RHSA\", value:\"2006:0144\");\n\n script_name(english:\"CentOS 3 : kernel (CESA-2006:0144)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 3. This is the\nseventh regular update.\n\nThis security advisory has been rated as having moderate security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux\n3.\n\nNew features introduced by this update include :\n\n - addition of the bnx2, dell_rbu, and megaraid_sas device\n drivers - support for multi-core, multi-threaded Intel\n Itanium processors - upgrade of the SATA subsystem to\n include ATAPI and SMART support - optional tuning via\n the new numa_memory_allocator, arp_announce, and\n printk_ratelimit sysctls\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated\nbelow). Other key areas affected by fixes in this update include the\nnetworking subsystem, the VM subsystem, NPTL handling, autofs4, the\nUSB subsystem, CPU enumeration, and 32-bit-exec-mode handling on\n64-bit architectures.\n\nThe following device drivers have been upgraded to new versions :\n\naacraid -------- 1.1.5-2412 bnx2 ----------- 1.4.30 (new) dell_rbu\n------- 2.1 (new) e1000 ---------- 6.1.16-k3 emulex --------- 7.3.3\nfusion --------- 2.06.16.02 ipmi ----------- 35.11 megaraid2 ------\nv2.10.10.1 megaraid_sas --- 00.00.02.00 (new) tg3 ------------ 3.43RH\n\nThe following security bugs were fixed in this update :\n\n - a flaw in gzip/zlib handling internal to the kernel that\n allowed a local user to cause a denial of service\n (crash) (CVE-2005-2458,low)\n\n - a flaw in ext3 EA/ACL handling of attribute sharing that\n allowed a local user to gain privileges (CVE-2005-2801,\n moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\nNote: The kernel-unsupported package contains various drivers and\nmodules that are unsupported and therefore might contain security\nproblems that have not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-March/012746.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?777fd184\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-March/012747.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c2d2c5c7\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-March/012755.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?36c561f2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/08/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/03/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-doc-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-unsupported-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-unsupported-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-source-2.4.21-40.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-unsupported-2.4.21-40.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T10:03:42", "description": "Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2005-0756\n Alexander Nyberg discovered that the ptrace() system\n call does not properly verify addresses on the amd64\n architecture which can be exploited by a local attacker\n to crash the kernel.\n\n - CVE-2005-0757\n A problem in the offset handling in the xattr file\n system code for ext3 has been discovered that may allow\n users on 64-bit systems that have access to an ext3\n filesystem with extended attributes to cause the kernel\n to crash.\n\n - CVE-2005-1762\n A vulnerability has been discovered in the ptrace()\n system call on the amd64 architecture that allows a\n local attacker to cause the kernel to crash.\n\n - CVE-2005-1767\n A vulnerability has been discovered in the stack segment\n fault handler that could allow a local attacker to cause\n a stack exception that will lead the kernel to crash\n under certain circumstances.\n\n - CVE-2005-1768\n Ilja van Sprundel discovered a race condition in the\n IA32 (x86) compatibility execve() systemcall for amd64\n and IA64 that allows local attackers to cause the kernel\n to panic and possibly execute arbitrary code.\n\n - CVE-2005-2456\n Balazs Scheidler discovered that a local attacker could\n call setsockopt() with an invalid xfrm_user policy\n message which would cause the kernel to write beyond the\n boundaries of an array and crash.\n\n - CVE-2005-2458\n Vladimir Volovich discovered a bug in the zlib routines\n which are also present in the Linux kernel and allows\n remote attackers to crash the kernel.\n\n - CVE-2005-2459\n Another vulnerability has been discovered in the zlib\n routines which are also present in the Linux kernel and\n allows remote attackers to crash the kernel.\n\n - CVE-2005-2553\n A NULL pointer dereference in ptrace when tracing a\n 64-bit executable can cause the kernel to crash.\n\n - CVE-2005-2801\n Andreas Gruenbacher discovered a bug in the ext2 and\n ext3 file systems. When data areas are to be shared\n among two inodes not all information were compared for\n equality, which could expose wrong ACLs for files.\n\n - CVE-2005-2872\n Chad Walstrom discovered that the ipt_recent kernel\n module to stop SSH bruteforce attacks could cause the\n kernel to crash on 64-bit architectures.\n\n - CVE-2005-3275\n An error in the NAT code allows remote attackers to\n cause a denial of service (memory corruption) by causing\n two packets for the same protocol to be NATed at the\n same time, which leads to memory corruption.", "edition": 25, "published": "2006-10-14T00:00:00", "title": "Debian DSA-921-1 : kernel-source-2.4.27 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2801", "CVE-2005-2872", "CVE-2005-1762", "CVE-2005-0757", "CVE-2005-3275", "CVE-2005-1768", "CVE-2005-2553", "CVE-2005-1767", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-0756", "CVE-2005-2458"], "modified": "2006-10-14T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:kernel-source-2.4.27", "cpe:/o:debian:debian_linux:3.1"], "id": "DEBIAN_DSA-921.NASL", "href": "https://www.tenable.com/plugins/nessus/22787", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-921. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22787);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2005-0756\", \"CVE-2005-0757\", \"CVE-2005-1762\", \"CVE-2005-1767\", \"CVE-2005-1768\", \"CVE-2005-2456\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2553\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3275\");\n script_bugtraq_id(14477);\n script_xref(name:\"DSA\", value:\"921\");\n\n script_name(english:\"Debian DSA-921-1 : kernel-source-2.4.27 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2005-0756\n Alexander Nyberg discovered that the ptrace() system\n call does not properly verify addresses on the amd64\n architecture which can be exploited by a local attacker\n to crash the kernel.\n\n - CVE-2005-0757\n A problem in the offset handling in the xattr file\n system code for ext3 has been discovered that may allow\n users on 64-bit systems that have access to an ext3\n filesystem with extended attributes to cause the kernel\n to crash.\n\n - CVE-2005-1762\n A vulnerability has been discovered in the ptrace()\n system call on the amd64 architecture that allows a\n local attacker to cause the kernel to crash.\n\n - CVE-2005-1767\n A vulnerability has been discovered in the stack segment\n fault handler that could allow a local attacker to cause\n a stack exception that will lead the kernel to crash\n under certain circumstances.\n\n - CVE-2005-1768\n Ilja van Sprundel discovered a race condition in the\n IA32 (x86) compatibility execve() systemcall for amd64\n and IA64 that allows local attackers to cause the kernel\n to panic and possibly execute arbitrary code.\n\n - CVE-2005-2456\n Balazs Scheidler discovered that a local attacker could\n call setsockopt() with an invalid xfrm_user policy\n message which would cause the kernel to write beyond the\n boundaries of an array and crash.\n\n - CVE-2005-2458\n Vladimir Volovich discovered a bug in the zlib routines\n which are also present in the Linux kernel and allows\n remote attackers to crash the kernel.\n\n - CVE-2005-2459\n Another vulnerability has been discovered in the zlib\n routines which are also present in the Linux kernel and\n allows remote attackers to crash the kernel.\n\n - CVE-2005-2553\n A NULL pointer dereference in ptrace when tracing a\n 64-bit executable can cause the kernel to crash.\n\n - CVE-2005-2801\n Andreas Gruenbacher discovered a bug in the ext2 and\n ext3 file systems. When data areas are to be shared\n among two inodes not all information were compared for\n equality, which could expose wrong ACLs for files.\n\n - CVE-2005-2872\n Chad Walstrom discovered that the ipt_recent kernel\n module to stop SSH bruteforce attacks could cause the\n kernel to crash on 64-bit architectures.\n\n - CVE-2005-3275\n An error in the NAT code allows remote attackers to\n cause a denial of service (memory corruption) by causing\n two packets for the same protocol to be NATed at the\n same time, which leads to memory corruption.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=311164\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-921\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package immediately and reboot the machine.\n\nThe following matrix explains which kernel version for which\narchitecture fix the problems mentioned above :\n\n Debian 3.1 (sarge) \n Source 2.4.27-10sarge1 \n Alpha architecture 2.4.27-10sarge1 \n ARM architecture 2.4.27-2sarge1 \n Intel IA-32 architecture 2.4.27-10sarge1 \n Intel IA-64 architecture 2.4.27-10sarge1 \n Motorola 680x0 architecture 2.4.27-3sarge1 \n Big endian MIPS architecture 2.4.27-10.sarge1.040815-1 \n Little endian MIPS architecture 2.4.27-10.sarge1.040815-1 \n PowerPC architecture 2.4.27-10sarge1 \n IBM S/390 architecture 2.4.27-2sarge1 \n Sun Sparc architecture 2.4.27-9sarge1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.4.27\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/01/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-2\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-apus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-nubus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.4.27\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-generic\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-itanium\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-itanium-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-mckinley\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-mckinley-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc32\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc32-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc64\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc64-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-apus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-nubus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-powerpc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-generic\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-itanium\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-itanium-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-mckinley\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-mckinley-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390-tape\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390x\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc32\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc32-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc64\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc64-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-amiga\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-apus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-atari\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bast\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bvme6000\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-lart\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mac\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme147\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme16x\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-netwinder\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-nubus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-q40\", reference:\"2.4.27-3sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r3k-kn02\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-ip22\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-kn04\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-cobalt\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-ip22\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-lasat\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscpc\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscstation\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-sb1-swarm-bn\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-xxs1500\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-apus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-arm\", reference:\"2.4.27-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-nubus\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-powerpc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.4.27\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.4.27\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.4.27\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mips-tools\", reference:\"2.4.27-10.sarge1.040815-1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-06T09:44:42", "description": "Several security related problems have been discovered in the Linux\nkernel which may lead to a denial of service or even the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2005-4798\n A buffer overflow in NFS readlink handling allows a\n malicious remote server to cause a denial of service.\n\n - CVE-2006-2935\n Diego Calleja Garcia discovered a buffer overflow in the\n DVD handling code that could be exploited by a specially\n crafted DVD USB storage device to execute arbitrary\n code.\n\n - CVE-2006-1528\n A bug in the SCSI driver allows a local user to cause a\n denial of service.\n\n - CVE-2006-2444\n Patrick McHardy discovered a bug in the SNMP NAT helper\n that allows remote attackers to cause a denial of\n service.\n\n - CVE-2006-2446\n A race condition in the socket buffer handling allows\n remote attackers to cause a denial of service.\n\n - CVE-2006-3745\n Wei Wang discovered a bug in the SCTP implementation\n that allows local users to cause a denial of service and\n possibly gain root privileges.\n\n - CVE-2006-4535\n David Miller reported a problem with the fix for\n CVE-2006-3745 that allows local users to crash the\n system via an SCTP socket with a certain SO_LINGER\n value.\n\nThe following matrix explains which kernel version for which\narchitecture fixes the problem mentioned above :\n\n stable (sarge) \n Source 2.4.27-10sarge4 \n Alpha architecture 2.4.27-10sarge4 \n ARM architecture 2.4.27-2sarge4 \n Intel IA-32 architecture 2.4.27-10sarge4 \n Intel IA-64 architecture 2.4.27-10sarge4 \n Motorola 680x0 architecture 2.4.27-3sarge4 \n MIPS architectures 2.4.27-10.sarge4.040815-1 \n PowerPC architecture 2.4.27-10sarge4 \n IBM S/390 2.4.27-2sarge4 \n Sun Sparc architecture 2.4.27-9sarge4 \n FAI 1.9.1sarge4 \n mindi-kernel 2.4.27-2sarge3 \n kernel-image-speakup-i386 2.4.27-1.1sarge3 \n systemimager 3.2.3-6sarge3", "edition": 26, "published": "2006-10-14T00:00:00", "title": "Debian DSA-1183-1 : kernel-source-2.4.27 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3745", "CVE-2005-4798", "CVE-2006-2444", "CVE-2006-2446", "CVE-2006-2935", "CVE-2006-4535", "CVE-2006-1528"], "modified": "2006-10-14T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:kernel-source-2.4.27", "cpe:/o:debian:debian_linux:3.1"], "id": "DEBIAN_DSA-1183.NASL", "href": "https://www.tenable.com/plugins/nessus/22725", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1183. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22725);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2005-4798\", \"CVE-2006-1528\", \"CVE-2006-2444\", \"CVE-2006-2446\", \"CVE-2006-2935\", \"CVE-2006-3745\", \"CVE-2006-4535\");\n script_bugtraq_id(18081, 18101, 18847, 19666, 20087);\n script_xref(name:\"CERT\", value:\"681569\");\n script_xref(name:\"DSA\", value:\"1183\");\n\n script_name(english:\"Debian DSA-1183-1 : kernel-source-2.4.27 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several security related problems have been discovered in the Linux\nkernel which may lead to a denial of service or even the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2005-4798\n A buffer overflow in NFS readlink handling allows a\n malicious remote server to cause a denial of service.\n\n - CVE-2006-2935\n Diego Calleja Garcia discovered a buffer overflow in the\n DVD handling code that could be exploited by a specially\n crafted DVD USB storage device to execute arbitrary\n code.\n\n - CVE-2006-1528\n A bug in the SCSI driver allows a local user to cause a\n denial of service.\n\n - CVE-2006-2444\n Patrick McHardy discovered a bug in the SNMP NAT helper\n that allows remote attackers to cause a denial of\n service.\n\n - CVE-2006-2446\n A race condition in the socket buffer handling allows\n remote attackers to cause a denial of service.\n\n - CVE-2006-3745\n Wei Wang discovered a bug in the SCTP implementation\n that allows local users to cause a denial of service and\n possibly gain root privileges.\n\n - CVE-2006-4535\n David Miller reported a problem with the fix for\n CVE-2006-3745 that allows local users to crash the\n system via an SCTP socket with a certain SO_LINGER\n value.\n\nThe following matrix explains which kernel version for which\narchitecture fixes the problem mentioned above :\n\n stable (sarge) \n Source 2.4.27-10sarge4 \n Alpha architecture 2.4.27-10sarge4 \n ARM architecture 2.4.27-2sarge4 \n Intel IA-32 architecture 2.4.27-10sarge4 \n Intel IA-64 architecture 2.4.27-10sarge4 \n Motorola 680x0 architecture 2.4.27-3sarge4 \n MIPS architectures 2.4.27-10.sarge4.040815-1 \n PowerPC architecture 2.4.27-10sarge4 \n IBM S/390 2.4.27-2sarge4 \n Sun Sparc architecture 2.4.27-9sarge4 \n FAI 1.9.1sarge4 \n mindi-kernel 2.4.27-2sarge3 \n kernel-image-speakup-i386 2.4.27-1.1sarge3 \n systemimager 3.2.3-6sarge3\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-4798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-2935\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-1528\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-2444\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-2446\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-3745\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-4535\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-3745\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2006/dsa-1183\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package and reboot the machine. If you have built a\ncustom kernel from the kernel source package, you will need to rebuild\nto take advantage of these fixes.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.4.27\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"fai-kernels\", reference:\"1.9.1sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-2\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-3\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-apus\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-nubus\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.4.27\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.4.27-speakup\", reference:\"2.4.27-1.1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-generic\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-itanium\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-itanium-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-mckinley\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-mckinley-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc32\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc32-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc64\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-2-sparc64-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-386\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-686\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-generic\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-itanium\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-itanium-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k6\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k7\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-mckinley\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-mckinley-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc32\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc32-smp\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc64\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc64-smp\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-apus\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-nubus\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-powerpc\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-speakup\", reference:\"2.4.27-1.1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-generic\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-itanium\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-itanium-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-mckinley\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-mckinley-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390-tape\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-s390x\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc32\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc32-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc64\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-2-sparc64-smp\", reference:\"2.4.27-9sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-386\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-686\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-generic\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-itanium\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-itanium-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k6\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k7\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-mckinley\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-mckinley-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390-tape\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390x\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc32\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc32-smp\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc64\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc64-smp\", reference:\"2.4.27-9sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-amiga\", reference:\"2.4.27-3sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-apus\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-atari\", reference:\"2.4.27-3sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bast\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bvme6000\", reference:\"2.4.27-3sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-lart\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mac\", reference:\"2.4.27-3sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme147\", reference:\"2.4.27-3sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme16x\", reference:\"2.4.27-3sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-netwinder\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-nubus\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-q40\", reference:\"2.4.27-3sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r3k-kn02\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-ip22\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-kn04\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-cobalt\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-ip22\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-lasat\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscpc\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscstation\", reference:\"2.4.27-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-sb1-swarm-bn\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-speakup\", reference:\"2.4.27-1.1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-xxs1500\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-apus\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-nubus\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-powerpc\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-s390\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.4.27\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-386\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-586tsc\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-686\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-686-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k6\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k7\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-2-k7-smp\", reference:\"2.4.27-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-386\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-686\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k6\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k7\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.4.27\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.4.27\", reference:\"2.4.27-10sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mindi-kernel\", reference:\"2.4.27-2sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mips-tools\", reference:\"2.4.27-10.sarge4.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-boot-i386-standard\", reference:\"3.2.3-6sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-boot-ia64-standard\", reference:\"3.2.3-6sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-client\", reference:\"3.2.3-6sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-common\", reference:\"3.2.3-6sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-doc\", reference:\"3.2.3-6sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-server\", reference:\"3.2.3-6sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-server-flamethrowerd\", reference:\"3.2.3-6sarge3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:24:54", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "edition": 27, "published": "2006-07-05T00:00:00", "title": "CentOS 4 : kernel (CESA-2006:0101)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "modified": "2006-07-05T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-smp-devel", "p-cpe:/a:centos:centos:kernel-hugemem-devel"], "id": "CENTOS_RHSA-2006-0101.NASL", "href": "https://www.tenable.com/plugins/nessus/21977", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0101 and \n# CentOS Errata and Security Advisory 2006:0101 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21977);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n script_xref(name:\"RHSA\", value:\"2006:0101\");\n\n script_name(english:\"CentOS 4 : kernel (CESA-2006:0101)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012580.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4839b252\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012581.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d8112949\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012582.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ec839998\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:05:33", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "edition": 28, "published": "2006-01-17T00:00:00", "title": "RHEL 4 : kernel (RHSA-2006:0101)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "modified": "2006-01-17T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2006-0101.NASL", "href": "https://www.tenable.com/plugins/nessus/20732", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0101. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20732);\n script_version(\"1.28\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n script_xref(name:\"RHSA\", value:\"2006:0101\");\n\n script_name(english:\"RHEL 4 : kernel (RHSA-2006:0101)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2002-2185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1190\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3106\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3109\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3276\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-4605\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0101\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0101\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0101\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T10:03:42", "description": "Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2004-2302\n A race condition in the sysfs filesystem allows local\n users to read kernel memory and cause a denial of\n service (crash).\n\n - CVE-2005-0756\n Alexander Nyberg discovered that the ptrace() system\n call does not properly verify addresses on the amd64\n architecture which can be exploited by a local attacker\n to crash the kernel.\n\n - CVE-2005-0757\n A problem in the offset handling in the xattr file\n system code for ext3 has been discovered that may allow\n users on 64-bit systems that have access to an ext3\n filesystem with extended attributes to cause the kernel\n to crash.\n\n - CVE-2005-1265\n Chris Wright discovered that the mmap() function could\n create illegal memory maps that could be exploited by a\n local user to crash the kernel or potentially execute\n arbitrary code.\n\n - CVE-2005-1761\n A vulnerability on the IA-64 architecture can lead local\n attackers to overwrite kernel memory and crash the\n kernel.\n\n - CVE-2005-1762\n A vulnerability has been discovered in the ptrace()\n system call on the amd64 architecture that allows a\n local attacker to cause the kernel to crash.\n\n - CVE-2005-1763\n A buffer overflow in the ptrace system call for 64-bit\n architectures allows local users to write bytes into\n arbitrary kernel memory.\n\n - CVE-2005-1765\n Zou Nan Hai has discovered that a local user could cause\n the kernel to hang on the amd64 architecture after\n invoking syscall() with specially crafted arguments.\n\n - CVE-2005-1767\n A vulnerability has been discovered in the stack segment\n fault handler that could allow a local attacker to cause\n a stack exception that will lead the kernel to crash\n under certain circumstances.\n\n - CVE-2005-2456\n Balazs Scheidler discovered that a local attacker could\n call setsockopt() with an invalid xfrm_user policy\n message which would cause the kernel to write beyond the\n boundaries of an array and crash.\n\n - CVE-2005-2458\n Vladimir Volovich discovered a bug in the zlib routines\n which are also present in the Linux kernel and allows\n remote attackers to crash the kernel.\n\n - CVE-2005-2459\n Another vulnerability has been discovered in the zlib\n routines which are also present in the Linux kernel and\n allows remote attackers to crash the kernel.\n\n - CVE-2005-2548\n Peter Sandstrom noticed that snmpwalk from a remote host\n could cause a denial of service (kernel oops from null\n dereference) via certain UDP packets that lead to a\n function call with the wrong argument.\n\n - CVE-2005-2801\n Andreas Gruenbacher discovered a bug in the ext2 and\n ext3 file systems. When data areas are to be shared\n among two inodes not all information were compared for\n equality, which could expose wrong ACLs for files.\n\n - CVE-2005-2872\n Chad Walstrom discovered that the ipt_recent kernel\n module on 64-bit processors such as AMD64 allows remote\n attackers to cause a denial of service (kernel panic)\n via certain attacks such as SSH brute force.\n\n - CVE-2005-3105\n The mprotect code on Itanium IA-64 Montecito processors\n does not properly maintain cache coherency as required\n by the architecture, which allows local users to cause a\n denial of service and possibly corrupt data by modifying\n PTE protections.\n\n - CVE-2005-3106\n A race condition in the thread management may allow\n local users to cause a denial of service (deadlock) when\n threads are sharing memory and waiting for a thread that\n has just performed an exec.\n\n - CVE-2005-3107\n When one thread is tracing another thread that shares\n the same memory map a local user could cause a denial of\n service (deadlock) by forcing a core dump when the\n traced thread is in the TASK_TRACED state.\n\n - CVE-2005-3108\n A bug in the ioremap() system call has been discovered\n on the amd64 architecture that could allow local users\n to cause a denial of service or an information leak when\n performing a lookup of a non-existent memory page.\n\n - CVE-2005-3109\n The HFS and HFS+ (hfsplus) modules allow local attackers\n to cause a denial of service (oops) by using hfsplus to\n mount a filesystem that is not hfsplus.\n\n - CVE-2005-3110\n A race condition in the ebtables netfilter module on an\n SMP system running under high load may allow remote\n attackers to cause a denial of service (crash).\n\n - CVE-2005-3271\n Roland McGrath discovered that exec() does not properly\n clear posix-timers in multi-threaded environments, which\n results in a resource leak and could allow a large\n number of multiple local users to cause a denial of\n service by using more posix-timers than specified by the\n quota for a single user.\n\n - CVE-2005-3272\n The kernel allows remote attackers to poison the bridge\n forwarding table using frames that have already been\n dropped by filtering, which can cause the bridge to\n forward spoofed packets.\n\n - CVE-2005-3273\n The ioctl for the packet radio ROSE protocol does not\n properly verify the arguments when setting a new router,\n which allows attackers to trigger out-of-bounds errors.\n\n - CVE-2005-3274\n A race condition on SMP systems allows local users to\n cause a denial of service (null dereference) by causing\n a connection timer to expire while the connection table\n is being flushed before the appropriate lock is\n acquired.\n\n - CVE-2005-3275\n An error in the NAT code allows remote attackers to\n cause a denial of service (memory corruption) by causing\n two packets for the same protocol to be NATed at the\n same time, which leads to memory corruption.\n\n - CVE-2005-3276\n A missing memory cleanup in the thread handling routines\n before copying data into userspace allows a user process\n to obtain sensitive information.\n\nThis update also contains a number of corrections for issues that\nturned out to have no security implication afterwards.", "edition": 25, "published": "2006-10-14T00:00:00", "title": "Debian DSA-922-1 : kernel-source-2.6.8 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-2302", "CVE-2005-1763", "CVE-2005-3108", "CVE-2005-2801", "CVE-2005-3106", "CVE-2005-3272", "CVE-2005-2872", "CVE-2005-3273", "CVE-2005-2548", "CVE-2005-1762", "CVE-2005-3109", "CVE-2005-0757", "CVE-2005-1765", "CVE-2005-3275", "CVE-2005-3110", "CVE-2005-3107", "CVE-2005-3274", "CVE-2005-1265", "CVE-2005-1761", "CVE-2005-1767", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-3271", "CVE-2005-0756", "CVE-2005-2458", "CVE-2005-3105", "CVE-2005-3276"], "modified": "2006-10-14T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:3.1", "p-cpe:/a:debian:debian_linux:kernel-source-2.6.8"], "id": "DEBIAN_DSA-922.NASL", "href": "https://www.tenable.com/plugins/nessus/22788", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-922. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22788);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2004-2302\", \"CVE-2005-0756\", \"CVE-2005-0757\", \"CVE-2005-1265\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1763\", \"CVE-2005-1765\", \"CVE-2005-1767\", \"CVE-2005-2456\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2548\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3105\", \"CVE-2005-3106\", \"CVE-2005-3107\", \"CVE-2005-3108\", \"CVE-2005-3109\", \"CVE-2005-3110\", \"CVE-2005-3271\", \"CVE-2005-3272\", \"CVE-2005-3273\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-3276\");\n script_bugtraq_id(14477, 15527, 15528, 15533);\n script_xref(name:\"DSA\", value:\"922\");\n\n script_name(english:\"Debian DSA-922-1 : kernel-source-2.6.8 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2004-2302\n A race condition in the sysfs filesystem allows local\n users to read kernel memory and cause a denial of\n service (crash).\n\n - CVE-2005-0756\n Alexander Nyberg discovered that the ptrace() system\n call does not properly verify addresses on the amd64\n architecture which can be exploited by a local attacker\n to crash the kernel.\n\n - CVE-2005-0757\n A problem in the offset handling in the xattr file\n system code for ext3 has been discovered that may allow\n users on 64-bit systems that have access to an ext3\n filesystem with extended attributes to cause the kernel\n to crash.\n\n - CVE-2005-1265\n Chris Wright discovered that the mmap() function could\n create illegal memory maps that could be exploited by a\n local user to crash the kernel or potentially execute\n arbitrary code.\n\n - CVE-2005-1761\n A vulnerability on the IA-64 architecture can lead local\n attackers to overwrite kernel memory and crash the\n kernel.\n\n - CVE-2005-1762\n A vulnerability has been discovered in the ptrace()\n system call on the amd64 architecture that allows a\n local attacker to cause the kernel to crash.\n\n - CVE-2005-1763\n A buffer overflow in the ptrace system call for 64-bit\n architectures allows local users to write bytes into\n arbitrary kernel memory.\n\n - CVE-2005-1765\n Zou Nan Hai has discovered that a local user could cause\n the kernel to hang on the amd64 architecture after\n invoking syscall() with specially crafted arguments.\n\n - CVE-2005-1767\n A vulnerability has been discovered in the stack segment\n fault handler that could allow a local attacker to cause\n a stack exception that will lead the kernel to crash\n under certain circumstances.\n\n - CVE-2005-2456\n Balazs Scheidler discovered that a local attacker could\n call setsockopt() with an invalid xfrm_user policy\n message which would cause the kernel to write beyond the\n boundaries of an array and crash.\n\n - CVE-2005-2458\n Vladimir Volovich discovered a bug in the zlib routines\n which are also present in the Linux kernel and allows\n remote attackers to crash the kernel.\n\n - CVE-2005-2459\n Another vulnerability has been discovered in the zlib\n routines which are also present in the Linux kernel and\n allows remote attackers to crash the kernel.\n\n - CVE-2005-2548\n Peter Sandstrom noticed that snmpwalk from a remote host\n could cause a denial of service (kernel oops from null\n dereference) via certain UDP packets that lead to a\n function call with the wrong argument.\n\n - CVE-2005-2801\n Andreas Gruenbacher discovered a bug in the ext2 and\n ext3 file systems. When data areas are to be shared\n among two inodes not all information were compared for\n equality, which could expose wrong ACLs for files.\n\n - CVE-2005-2872\n Chad Walstrom discovered that the ipt_recent kernel\n module on 64-bit processors such as AMD64 allows remote\n attackers to cause a denial of service (kernel panic)\n via certain attacks such as SSH brute force.\n\n - CVE-2005-3105\n The mprotect code on Itanium IA-64 Montecito processors\n does not properly maintain cache coherency as required\n by the architecture, which allows local users to cause a\n denial of service and possibly corrupt data by modifying\n PTE protections.\n\n - CVE-2005-3106\n A race condition in the thread management may allow\n local users to cause a denial of service (deadlock) when\n threads are sharing memory and waiting for a thread that\n has just performed an exec.\n\n - CVE-2005-3107\n When one thread is tracing another thread that shares\n the same memory map a local user could cause a denial of\n service (deadlock) by forcing a core dump when the\n traced thread is in the TASK_TRACED state.\n\n - CVE-2005-3108\n A bug in the ioremap() system call has been discovered\n on the amd64 architecture that could allow local users\n to cause a denial of service or an information leak when\n performing a lookup of a non-existent memory page.\n\n - CVE-2005-3109\n The HFS and HFS+ (hfsplus) modules allow local attackers\n to cause a denial of service (oops) by using hfsplus to\n mount a filesystem that is not hfsplus.\n\n - CVE-2005-3110\n A race condition in the ebtables netfilter module on an\n SMP system running under high load may allow remote\n attackers to cause a denial of service (crash).\n\n - CVE-2005-3271\n Roland McGrath discovered that exec() does not properly\n clear posix-timers in multi-threaded environments, which\n results in a resource leak and could allow a large\n number of multiple local users to cause a denial of\n service by using more posix-timers than specified by the\n quota for a single user.\n\n - CVE-2005-3272\n The kernel allows remote attackers to poison the bridge\n forwarding table using frames that have already been\n dropped by filtering, which can cause the bridge to\n forward spoofed packets.\n\n - CVE-2005-3273\n The ioctl for the packet radio ROSE protocol does not\n properly verify the arguments when setting a new router,\n which allows attackers to trigger out-of-bounds errors.\n\n - CVE-2005-3274\n A race condition on SMP systems allows local users to\n cause a denial of service (null dereference) by causing\n a connection timer to expire while the connection table\n is being flushed before the appropriate lock is\n acquired.\n\n - CVE-2005-3275\n An error in the NAT code allows remote attackers to\n cause a denial of service (memory corruption) by causing\n two packets for the same protocol to be NATed at the\n same time, which leads to memory corruption.\n\n - CVE-2005-3276\n A missing memory cleanup in the thread handling routines\n before copying data into userspace allows a user process\n to obtain sensitive information.\n\nThis update also contains a number of corrections for issues that\nturned out to have no security implication afterwards.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=309308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=311164\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322339\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-922\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package immediately and reboot the machine.\n\nThe following matrix explains which kernel version for which\narchitecture fix the problems mentioned above :\n\n Debian 3.1 (sarge) \n Source 2.6.8-16sarge1 \n Alpha architecture 2.6.8-16sarge1 \n AMD64 architecture 2.6.8-16sarge1 \n HP Precision architecture 2.6.8-6sarge1 \n Intel IA-32 architecture 2.6.8-16sarge1 \n Intel IA-64 architecture 2.6.8-14sarge1 \n Motorola 680x0 architecture 2.6.8-4sarge1 \n PowerPC architecture 2.6.8-12sarge1 \n IBM S/390 architecture 2.6.8-5sarge1 \n Sun Sparc architecture 2.6.8-15sarge1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.6.8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/11/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-2\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power3\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power3-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power4\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power4-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-powerpc\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-powerpc-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.6.8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-k8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-k8-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-em64t-p4\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-em64t-p4-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-32\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-32-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-386\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-64\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-64-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-686\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-686-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-k7\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-k7-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc32\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc64\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc64-smp\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-k8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-k8-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-em64t-p4\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-em64t-p4-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-32\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-32-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-386\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-64\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-64-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-686\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-686-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-k7\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-k7-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390-tape\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390x\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc32\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc64\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc64-smp\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-amiga\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-atari\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-bvme6000\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-hp\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mac\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mvme147\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mvme16x\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power3\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power3-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power4\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power4-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-powerpc\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-powerpc-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-q40\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-sun3\", reference:\"2.6.8-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.6.8-s390\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.6.8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.6.8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.6.8\", reference:\"2.6.8-16sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T11:51:30", "description": "Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\nand corrected in this update :\n\nAn integer overflow in vc_resize (CVE-2004-1333).\n\nA race condition in the sysfs_read_file and sysfs_write_file functions\nin 2.6.10 and earlier allows local users to read kernel memory and\ncause a DoS (crash) via large offsets in sysfs files (CVE-2004-2302).\n\nAn integer signedness error in scsi_ioctl.c (CVE-2005-0180).\n\nNetfilter allows a local user to cause a DoS (memory consumption) via\ncertain packet fragments that are reassembled twice, which causes a\ndata structure to be allocated twice (CVE-2005-0210).\n\nA DoS in pkt_ioctl in pktcdvc.c (CVE-2005-1589).\n\nAn array index overflow in the xfrm_sk_policy_insert function in\nxfrm_user.c allows local users to cause a DoS (oops or deadlock) and\npossibly execute arbitrary code (CVE-2005-2456).\n\nThe zisofs driver in versions prior to 2.6.12.5 allows local users and\nremove attackers to cause a DoS (crash) via a crafted compressed ISO\nfilesystem (CVE-2005-2457).\n\ninflate.c in the zlib routines in versions prior to 2.6.12.5 allow\nremove attackers to cause a DoS (crash) via a compressed file with\n'improper tables' (CVE-2005-2458).\n\nThe huft_build function in inflate.c in the zlib routines in versions\nprior to 2.6.12.5 returns the wrong value, allowing remote attackers\nto cause a DoS (crash) via a certain compressed file that leads to a\nNULL pointer dereference (CVE-2005-2459).\n\nA stack-based buffer overflow in the sendmsg function call in versions\nprior to 2.6.13.1 allow local users to execute arbitrary code by\ncalling sendmsg and modifying the message contents in another thread\n(CVE-2005-2490).\n\nvlan_dev.c in version 2.6.8 allows remote attackers to cause a DoS\n(oops from null dereference) via certain UDP packets that lead to a\nfunction call with the wrong argument (CVE-2005-2548).\n\nThe kernel does not properly restrict socket policy access to users\nwith the CAP_NET_ADMIN capability, which could allow local users to\nconduct unauthorized activities via ipv4/ip_sockglue.c and\nipv6/ipv6_sockglue.c (CVE-2005-2555).\n\nA memory leak in the seq_file implementation in the SCSI procfs\ninterface (sg.c) in 2.6.13 and earlier allows a local user to cause a\nDoS (memory consumption) via certain repeated reads from\n/proc/scsi/gs/devices file which is not properly handled when the\nnext() interator returns NULL or an error (CVE-2005-2800).\n\nxattr.c in the ext2 and ext3 file system code does not properly\ncompare the name_index fields when sharing xattr blocks which could\nprevent ACLs from being applied (CVE-2005-2801).\n\nThe ipt_recent module in versions prior to 2.6.12 when running on\n64bit processors allows remote attackers to cause a DoS (kernel panic)\nvia certain attacks such as SSH brute force (CVE-2005-2872).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly\nperform certain tests when the jiffies value is greater than LONG_MAX,\nwhich can cause ipt_recent netfilter rules to block too early\n(CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local\nusers to cause a DoS (oops from null dereference) via fput in a 32bit\nioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\nfunction on 64-bit systems (CVE-2005-3044).\n\nThe sys_set_mempolicy function in mempolicy.c allows local users to\ncause a DoS via a negative first argument (CVE-2005-3053).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\nvia a userspace process that issues a USB Request Block (URB) to a USB\ndevice and terminates before the URB is finished, which leads to a\nstale pointer reference (CVE-2005-3055).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear\nmemory from a previously used packet whose length is increased,\nallowing remote attackers to obtain sensitive information\n(CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use\nan incorrect function to free names_cache memory, preventing the\nmemory from being tracked by AUDITSYSCALL code and leading to a memory\nleak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use\ncertain IOCTLs on terminals of other users and gain privileges\n(CVE-2005-3257).\n\nExec does not properly clear posix-timers in multi-threaded\nenvironments, which result in a resource leak and could allow a large\nnumber of multiple local users to cause a DoS by using more posix-\ntimers than specified by the quota for a single user (CVE-2005-3271).\n\nThe rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\ndoes not properly verify the ndigis argument for a new route, allowing\nan attacker to trigger array out-of-bounds errors with a large number\nof digipeats (CVE-2005-3273).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\nrunning on SMP systems, allows local users to cause a DoS (null\ndereference) by causing a connection timer to expire while the\nconnection table is being flushed before the appropriate lock is\nacquired (CVE-2005-3274).\n\nThe NAT code in versions prior to 2.6.13 incorrectly declares a\nvariable to be static, allowing remote attackers to cause a DoS\n(memory corruption) by causing two packets for the same protocol to be\nNATed at the same time (CVE-2005-3275).\n\nThe sys_get_thread_area function in process.c in versions prior to\n2.6.12.4 and 2.6.13 does not clear a data structure before copying it\nto userspace, which may allow a user process to obtain sensitive\ninformation (CVE-2005-3276).\n\nThe following non-security fixes are also applied :\n\nDriver updates were made to the aic97xx and sata_sil modules.\n\nSupport was added for ATI ipx400 chipsets, for IDE and sound.\n\nA build problem with icecream on the x86_64 platform was fixed.\n\nThe pin1 APIC timer on RS480-based motherboards was disabled.\n\nThe provided packages are patched to fix these vulnerabilities. All\nusers are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate", "edition": 25, "published": "2006-01-15T00:00:00", "title": "Mandrake Linux Security Advisory : kernel (MDKSA-2005:219)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-2302", "CVE-2005-2457", "CVE-2005-3181", "CVE-2005-2801", "CVE-2004-1333", "CVE-2005-2872", "CVE-2005-3273", "CVE-2005-2548", "CVE-2005-0180", "CVE-2005-2873", "CVE-2005-2490", "CVE-2005-3275", "CVE-2005-1589", "CVE-2005-3274", "CVE-2005-3053", "CVE-2005-3044", "CVE-2005-3257", "CVE-2005-0210", "CVE-2005-2800", "CVE-2005-3180", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-3055", "CVE-2005-3271", "CVE-2005-2458", "CVE-2005-2555", "CVE-2005-3276"], "modified": "2006-01-15T00:00:00", "cpe": ["cpe:/o:mandrakesoft:mandrake_linux:10.1", "p-cpe:/a:mandriva:linux:kernel-2.6.8.1.26mdk", "p-cpe:/a:mandriva:linux:kernel-smp-2.6.8.1.26mdk", "p-cpe:/a:mandriva:linux:kernel-source-2.6", "p-cpe:/a:mandriva:linux:kernel-source-stripped-2.6", "p-cpe:/a:mandriva:linux:kernel-i586-up-1GB-2.6.8.1.26mdk", "p-cpe:/a:mandriva:linux:kernel-secure-2.6.8.1.26mdk", "p-cpe:/a:mandriva:linux:kernel-i686-up-64GB-2.6.8.1.26mdk", "p-cpe:/a:mandriva:linux:kernel-enterprise-2.6.8.1.26mdk"], "id": "MANDRAKE_MDKSA-2005-219.NASL", "href": "https://www.tenable.com/plugins/nessus/20450", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2005:219. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20450);\n script_version(\"1.23\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2004-1333\", \"CVE-2004-2302\", \"CVE-2005-0180\", \"CVE-2005-0210\", \"CVE-2005-1589\", \"CVE-2005-2456\", \"CVE-2005-2457\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2490\", \"CVE-2005-2548\", \"CVE-2005-2555\", \"CVE-2005-2800\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-2873\", \"CVE-2005-3044\", \"CVE-2005-3053\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3271\", \"CVE-2005-3273\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-3276\");\n script_bugtraq_id(14902);\n script_xref(name:\"MDKSA\", value:\"2005:219\");\n\n script_name(english:\"Mandrake Linux Security Advisory : kernel (MDKSA-2005:219)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\nand corrected in this update :\n\nAn integer overflow in vc_resize (CVE-2004-1333).\n\nA race condition in the sysfs_read_file and sysfs_write_file functions\nin 2.6.10 and earlier allows local users to read kernel memory and\ncause a DoS (crash) via large offsets in sysfs files (CVE-2004-2302).\n\nAn integer signedness error in scsi_ioctl.c (CVE-2005-0180).\n\nNetfilter allows a local user to cause a DoS (memory consumption) via\ncertain packet fragments that are reassembled twice, which causes a\ndata structure to be allocated twice (CVE-2005-0210).\n\nA DoS in pkt_ioctl in pktcdvc.c (CVE-2005-1589).\n\nAn array index overflow in the xfrm_sk_policy_insert function in\nxfrm_user.c allows local users to cause a DoS (oops or deadlock) and\npossibly execute arbitrary code (CVE-2005-2456).\n\nThe zisofs driver in versions prior to 2.6.12.5 allows local users and\nremove attackers to cause a DoS (crash) via a crafted compressed ISO\nfilesystem (CVE-2005-2457).\n\ninflate.c in the zlib routines in versions prior to 2.6.12.5 allow\nremove attackers to cause a DoS (crash) via a compressed file with\n'improper tables' (CVE-2005-2458).\n\nThe huft_build function in inflate.c in the zlib routines in versions\nprior to 2.6.12.5 returns the wrong value, allowing remote attackers\nto cause a DoS (crash) via a certain compressed file that leads to a\nNULL pointer dereference (CVE-2005-2459).\n\nA stack-based buffer overflow in the sendmsg function call in versions\nprior to 2.6.13.1 allow local users to execute arbitrary code by\ncalling sendmsg and modifying the message contents in another thread\n(CVE-2005-2490).\n\nvlan_dev.c in version 2.6.8 allows remote attackers to cause a DoS\n(oops from null dereference) via certain UDP packets that lead to a\nfunction call with the wrong argument (CVE-2005-2548).\n\nThe kernel does not properly restrict socket policy access to users\nwith the CAP_NET_ADMIN capability, which could allow local users to\nconduct unauthorized activities via ipv4/ip_sockglue.c and\nipv6/ipv6_sockglue.c (CVE-2005-2555).\n\nA memory leak in the seq_file implementation in the SCSI procfs\ninterface (sg.c) in 2.6.13 and earlier allows a local user to cause a\nDoS (memory consumption) via certain repeated reads from\n/proc/scsi/gs/devices file which is not properly handled when the\nnext() interator returns NULL or an error (CVE-2005-2800).\n\nxattr.c in the ext2 and ext3 file system code does not properly\ncompare the name_index fields when sharing xattr blocks which could\nprevent ACLs from being applied (CVE-2005-2801).\n\nThe ipt_recent module in versions prior to 2.6.12 when running on\n64bit processors allows remote attackers to cause a DoS (kernel panic)\nvia certain attacks such as SSH brute force (CVE-2005-2872).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly\nperform certain tests when the jiffies value is greater than LONG_MAX,\nwhich can cause ipt_recent netfilter rules to block too early\n(CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local\nusers to cause a DoS (oops from null dereference) via fput in a 32bit\nioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\nfunction on 64-bit systems (CVE-2005-3044).\n\nThe sys_set_mempolicy function in mempolicy.c allows local users to\ncause a DoS via a negative first argument (CVE-2005-3053).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\nvia a userspace process that issues a USB Request Block (URB) to a USB\ndevice and terminates before the URB is finished, which leads to a\nstale pointer reference (CVE-2005-3055).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear\nmemory from a previously used packet whose length is increased,\nallowing remote attackers to obtain sensitive information\n(CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use\nan incorrect function to free names_cache memory, preventing the\nmemory from being tracked by AUDITSYSCALL code and leading to a memory\nleak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use\ncertain IOCTLs on terminals of other users and gain privileges\n(CVE-2005-3257).\n\nExec does not properly clear posix-timers in multi-threaded\nenvironments, which result in a resource leak and could allow a large\nnumber of multiple local users to cause a DoS by using more posix-\ntimers than specified by the quota for a single user (CVE-2005-3271).\n\nThe rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\ndoes not properly verify the ndigis argument for a new route, allowing\nan attacker to trigger array out-of-bounds errors with a large number\nof digipeats (CVE-2005-3273).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\nrunning on SMP systems, allows local users to cause a DoS (null\ndereference) by causing a connection timer to expire while the\nconnection table is being flushed before the appropriate lock is\nacquired (CVE-2005-3274).\n\nThe NAT code in versions prior to 2.6.13 incorrectly declares a\nvariable to be static, allowing remote attackers to cause a DoS\n(memory corruption) by causing two packets for the same protocol to be\nNATed at the same time (CVE-2005-3275).\n\nThe sys_get_thread_area function in process.c in versions prior to\n2.6.12.4 and 2.6.13 does not clear a data structure before copying it\nto userspace, which may allow a user process to obtain sensitive\ninformation (CVE-2005-3276).\n\nThe following non-security fixes are also applied :\n\nDriver updates were made to the aic97xx and sata_sil modules.\n\nSupport was added for ATI ipx400 chipsets, for IDE and sound.\n\nA build problem with icecream on the x86_64 platform was fixed.\n\nThe pin1 APIC timer on RS480-based motherboards was disabled.\n\nThe provided packages are patched to fix these vulnerabilities. All\nusers are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-2.6.8.1.26mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-enterprise-2.6.8.1.26mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-i586-up-1GB-2.6.8.1.26mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-i686-up-64GB-2.6.8.1.26mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-secure-2.6.8.1.26mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-smp-2.6.8.1.26mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-stripped-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:10.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/11/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK10.1\", reference:\"kernel-2.6.8.1.26mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"kernel-enterprise-2.6.8.1.26mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"kernel-i586-up-1GB-2.6.8.1.26mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", cpu:\"i386\", reference:\"kernel-i686-up-64GB-2.6.8.1.26mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"kernel-secure-2.6.8.1.26mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"kernel-smp-2.6.8.1.26mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"kernel-source-2.6-2.6.8.1-26mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK10.1\", reference:\"kernel-source-stripped-2.6-2.6.8.1-26mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:14:46", "description": "The remote host is missing the patch for the advisory SUSE-SA:2005:050 (kernel).\n\n\nThe Linux kernel was updated to fix the following security issues:\n- CVE-2005-2457: A problem in decompression of files on 'zisofs'\nfilesystem was fixed.\n\n- CVE-2005-2458: A potential buffer overflow in the zlib decompression\nhandling in the kernel was fixed.\n\n- CVE-2005-2459: Some return codes in zlib decoding were fixed which\ncould have led to an attacker crashing the kernel.\n\n- CVE-2005-2555: Only processes with the CAP_NET_ADMIN capability is\nnow allowed load socket policies.\n\n- CVE-2005-2456: Fixed a potential overflow caused by missing boundary\nchecks of sock->sk_policy in net/xfrm/.\n\n- AMD64/EM64T/x86_64 only: A previous fix for a denial of service\nattack with compat 32bit mode programs was too strict and could\ncrash the kernel. (The earlier fix had the Mitre CVE ID CVE-2005-1765.)\n\n- S/390 only: Fixed /sys/ permissions where a user could change machine\nstates, including powering down or up partitions.\n\n- CVE-2005-0916: PowerPC only: A missing patch for a hugetlb memory\ncontext handling problem was added.\n\nAbove problems affect SUSE Linux 9.1 up to 9.3 and SUSE Linux\nEnterprise Server 9.", "edition": 6, "published": "2005-10-05T00:00:00", "title": "SUSE-SA:2005:050: kernel", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "modified": "2005-10-05T00:00:00", "cpe": [], "id": "SUSE_SA_2005_050.NASL", "href": "https://www.tenable.com/plugins/nessus/19929", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2005:050\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif(description)\n{\n script_id(19929);\n script_version(\"1.9\");\n \n name[\"english\"] = \"SUSE-SA:2005:050: kernel\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2005:050 (kernel).\n\n\nThe Linux kernel was updated to fix the following security issues:\n- CVE-2005-2457: A problem in decompression of files on 'zisofs'\nfilesystem was fixed.\n\n- CVE-2005-2458: A potential buffer overflow in the zlib decompression\nhandling in the kernel was fixed.\n\n- CVE-2005-2459: Some return codes in zlib decoding were fixed which\ncould have led to an attacker crashing the kernel.\n\n- CVE-2005-2555: Only processes with the CAP_NET_ADMIN capability is\nnow allowed load socket policies.\n\n- CVE-2005-2456: Fixed a potential overflow caused by missing boundary\nchecks of sock->sk_policy in net/xfrm/.\n\n- AMD64/EM64T/x86_64 only: A previous fix for a denial of service\nattack with compat 32bit mode programs was too strict and could\ncrash the kernel. (The earlier fix had the Mitre CVE ID CVE-2005-1765.)\n\n- S/390 only: Fixed /sys/ permissions where a user could change machine\nstates, including powering down or up partitions.\n\n- CVE-2005-0916: PowerPC only: A missing patch for a hugetlb memory\ncontext handling problem was added.\n\nAbove problems affect SUSE Linux 9.1 up to 9.3 and SUSE Linux\nEnterprise Server 9.\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.suse.de/security/advisories/2005_50_kernel.html\" );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\" );\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2005/10/05\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the kernel package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"kernel-bigsmp-2.6.5-7.201\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-2.6.5-7.201\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-2.6.5-7.201\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-source-2.6.5-7.201\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-syms-2.6.5-7.201\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"ltmodem-2.6.2-38.18\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-docs-2.6.5-7.201\", release:\"SUSE9.1\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"Intel-536ep-4.69-5.11\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-nongpl-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-nongpl-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-nongpl-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-source-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-syms-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-nongpl-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"ltmodem-8.31a8-6.11\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-install-initrd-1.0-48.10\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-kernel-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-docs-2.6.8-24.18\", release:\"SUSE9.2\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"Intel-536ep-4.69-10.3\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"dprobes-3.6.5-8.3\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-bigsmp-nongpl-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-default-nongpl-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-smp-nongpl-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-source-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-syms-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-um-nongpl-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-xen-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-xen-nongpl-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"ltmodem-8.31a10-7.3\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-install-initrd-1.0-50.3\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"um-host-kernel-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\nif ( rpm_check( reference:\"kernel-docs-2.6.11.4-21.9\", release:\"SUSE9.3\") )\n{\n security_hole(0);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T06:39:23", "description": "Oleg Nesterov discovered a local Denial of Service vulnerability in\nthe timer handling. When a non group-leader thread called exec() to\nexecute a different program while an itimer was pending, the timer\nexpiry would signal the old group leader task, which did not exist any\nmore. This caused a kernel panic. This vulnerability only affects\nUbuntu 5.04. (CAN-2005-1913)\n\nAl Viro discovered that the sendmsg() function did not sufficiently\nvalidate its input data. By calling sendmsg() and at the same time\nmodifying the passed message in another thread, he could exploit this\nto execute arbitrary commands with kernel privileges. This only\naffects the amd64 bit platform. (CAN-2005-2490)\n\nAl Viro discovered a vulnerability in the raw_sendmsg() function. By\ncalling this function with specially crafted arguments, a local\nattacker could either read kernel memory contents (leading to\ninformation disclosure) or manipulate the hardware state by reading\ncertain IO ports. This vulnerability only affects Ubuntu 5.04.\n(CAN-2005-2492)\n\nJan Blunck discovered a Denial of Service vulnerability in the procfs\ninterface of the SCSI driver. By repeatedly reading\n/proc/scsi/sg/devices, a local attacker could eventually exhaust\nkernel memory. (CAN-2005-2800)\n\nA flaw was discovered in the handling of extended attributes on ext2\nand ext3 file systems. Under certain condidions, this could prevent\nthe enforcement of Access Control Lists, which eventually could lead\nto information disclosure, unauthorized program execution, or\nunauthorized data modification. This does not affect the standard Unix\npermissions. (CAN-2005-2801)\n\nChad Walstrom discovered a Denial of Service in the ipt_recent module,\nwhich can be used in netfilter (Firewall configuration). A remote\nattacker could exploit this to crash the kernel by sending certain\npackets (such as an SSH brute-force attack) to a host which uses the\n'recent' module. (CAN-2005-2802).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2006-01-15T00:00:00", "title": "Ubuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-178-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2801", "CVE-2005-2872", "CVE-2005-2490", "CVE-2005-2800", "CVE-2005-2492", "CVE-2005-2802", "CVE-2005-1913"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-generic", "cpe:/o:canonical:ubuntu_linux:5.04", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-386", "cpe:/o:canonical:ubuntu_linux:4.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-386", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-xeon"], "id": "UBUNTU_USN-178-1.NASL", "href": "https://www.tenable.com/plugins/nessus/20588", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-178-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20588);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2019/08/02 13:33:00\");\n\n script_cve_id(\"CVE-2005-1913\", \"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2800\", \"CVE-2005-2801\", \"CVE-2005-2872\");\n script_xref(name:\"USN\", value:\"178-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-178-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Oleg Nesterov discovered a local Denial of Service vulnerability in\nthe timer handling. When a non group-leader thread called exec() to\nexecute a different program while an itimer was pending, the timer\nexpiry would signal the old group leader task, which did not exist any\nmore. This caused a kernel panic. This vulnerability only affects\nUbuntu 5.04. (CAN-2005-1913)\n\nAl Viro discovered that the sendmsg() function did not sufficiently\nvalidate its input data. By calling sendmsg() and at the same time\nmodifying the passed message in another thread, he could exploit this\nto execute arbitrary commands with kernel privileges. This only\naffects the amd64 bit platform. (CAN-2005-2490)\n\nAl Viro discovered a vulnerability in the raw_sendmsg() function. By\ncalling this function with specially crafted arguments, a local\nattacker could either read kernel memory contents (leading to\ninformation disclosure) or manipulate the hardware state by reading\ncertain IO ports. This vulnerability only affects Ubuntu 5.04.\n(CAN-2005-2492)\n\nJan Blunck discovered a Denial of Service vulnerability in the procfs\ninterface of the SCSI driver. By repeatedly reading\n/proc/scsi/sg/devices, a local attacker could eventually exhaust\nkernel memory. (CAN-2005-2800)\n\nA flaw was discovered in the handling of extended attributes on ext2\nand ext3 file systems. Under certain condidions, this could prevent\nthe enforcement of Access Control Lists, which eventually could lead\nto information disclosure, unauthorized program execution, or\nunauthorized data modification. This does not affect the standard Unix\npermissions. (CAN-2005-2801)\n\nChad Walstrom discovered a Denial of Service in the ipt_recent module,\nwhich can be used in netfilter (Firewall configuration). A remote\nattacker could exploit this to crash the kernel by sending certain\npackets (such as an SSH brute-force attack) to a host which uses the\n'recent' module. (CAN-2005-2802).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/09/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-doc-2.6.8.1\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-386\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-686\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-686-smp\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-generic\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-k8\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-k8-smp\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-xeon\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-386\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-686\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-686-smp\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-generic\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-k8\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-k8-smp\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-xeon\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-patch-debian-2.6.8.1\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-source-2.6.8.1\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-tree-2.6.8.1\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-doc-2.6.10\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-386\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-686\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-686-smp\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-generic\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-k8\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-k8-smp\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-xeon\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-386\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-686\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-686-smp\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-generic\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-k8\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-k8-smp\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-xeon\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-patch-ubuntu-2.6.10\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-source-2.6.10\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-tree-2.6.10\", pkgver:\"2.6.10-34.5\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.10 / linux-doc-2.6.8.1 / linux-headers-2.6 / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T06:39:06", "description": "David Howells discovered a local Denial of Service vulnerability in\nthe key session joining function. Under certain user-triggerable\nconditions, a semaphore was not released properly, which caused\nprocesses which also attempted to join a key session to hang forever.\nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2098)\n\nDavid Howells discovered a local Denial of Service vulnerability in\nthe keyring allocator. A local attacker could exploit this to crash\nthe kernel by attempting to add a specially crafted invalid keyring.\nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2099)\n\nBalazs Scheidler discovered a local Denial of Service vulnerability in\nthe xfrm_compile_policy() function. By calling setsockopt() with an\ninvalid xfrm_user policy message, a local attacker could cause the\nkernel to write to an array beyond its boundaries, thus causing a\nkernel crash. (CAN-2005-2456)\n\nTim Yamin discovered that the driver for compressed ISO file systems\ndid not sufficiently validate the iput data. By tricking an user into\nmounting a malicious CD-ROM with a specially crafted compressed ISO\nfile system, he could cause a kernel crash. (CAN-2005-2457)\n\nIt was discovered that the kernel's embedded zlib compression library\nwas still vulnerable to two old vulnerabilities of the standalone zlib\nlibrary. This library is used by various drivers and can also be used\nby third-party modules, so the impact varies. (CAN-2005-2458,\nCAN-2005-2459)\n\nPeter Sandstrom discovered a remote Denial of Service vulnerability in\nthe SNMP handler. Certain UDP packages lead to a function call with\nthe wrong argument, which resulted in a crash of the network stack.\nThis only affects Ubuntu 4.10 (Warty Warthog). (CAN-2005-2548)\n\nHerbert Xu discovered that the setsockopt() function was not\nrestricted to privileged users. This allowed a local attacker to\nbypass intended IPSec policies, set invalid policies to exploit flaws\nlike CAN-2005-2456, or cause a Denial of Service by adding policies\nuntil kernel memory is exhausted. Now the call is restricted to\nprocesses with the CAP_NET_ADMIN capability. (CAN-2005-2555)\n\nThe Ubuntu 5.04 kernel update also fixes a memory leak in the 'md'\n(Software RAID) driver which eventually lead to kernel memory\nexhaustion. Ubuntu 4.10 is not affected by this.\n(http://bugs.debian.org/317787)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2006-01-15T00:00:00", "title": "Ubuntu 4.10 / 5.04 : linux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities (USN-169-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2457", "CVE-2005-2099", "CVE-2005-2548", "CVE-2005-2098", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-generic", "cpe:/o:canonical:ubuntu_linux:5.04", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-386", "cpe:/o:canonical:ubuntu_linux:4.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-386", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-xeon"], "id": "UBUNTU_USN-169-1.NASL", "href": "https://www.tenable.com/plugins/nessus/20575", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-169-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20575);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/08/02 13:33:00\");\n\n script_cve_id(\"CVE-2005-2098\", \"CVE-2005-2099\", \"CVE-2005-2456\", \"CVE-2005-2457\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2548\", \"CVE-2005-2555\");\n script_xref(name:\"USN\", value:\"169-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.04 : linux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities (USN-169-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"David Howells discovered a local Denial of Service vulnerability in\nthe key session joining function. Under certain user-triggerable\nconditions, a semaphore was not released properly, which caused\nprocesses which also attempted to join a key session to hang forever.\nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2098)\n\nDavid Howells discovered a local Denial of Service vulnerability in\nthe keyring allocator. A local attacker could exploit this to crash\nthe kernel by attempting to add a specially crafted invalid keyring.\nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2099)\n\nBalazs Scheidler discovered a local Denial of Service vulnerability in\nthe xfrm_compile_policy() function. By calling setsockopt() with an\ninvalid xfrm_user policy message, a local attacker could cause the\nkernel to write to an array beyond its boundaries, thus causing a\nkernel crash. (CAN-2005-2456)\n\nTim Yamin discovered that the driver for compressed ISO file systems\ndid not sufficiently validate the iput data. By tricking an user into\nmounting a malicious CD-ROM with a specially crafted compressed ISO\nfile system, he could cause a kernel crash. (CAN-2005-2457)\n\nIt was discovered that the kernel's embedded zlib compression library\nwas still vulnerable to two old vulnerabilities of the standalone zlib\nlibrary. This library is used by various drivers and can also be used\nby third-party modules, so the impact varies. (CAN-2005-2458,\nCAN-2005-2459)\n\nPeter Sandstrom discovered a remote Denial of Service vulnerability in\nthe SNMP handler. Certain UDP packages lead to a function call with\nthe wrong argument, which resulted in a crash of the network stack.\nThis only affects Ubuntu 4.10 (Warty Warthog). (CAN-2005-2548)\n\nHerbert Xu discovered that the setsockopt() function was not\nrestricted to privileged users. This allowed a local attacker to\nbypass intended IPSec policies, set invalid policies to exploit flaws\nlike CAN-2005-2456, or cause a Denial of Service by adding policies\nuntil kernel memory is exhausted. Now the call is restricted to\nprocesses with the CAP_NET_ADMIN capability. (CAN-2005-2555)\n\nThe Ubuntu 5.04 kernel update also fixes a memory leak in the 'md'\n(Software RAID) driver which eventually lead to kernel memory\nexhaustion. Ubuntu 4.10 is not affected by this.\n(http://bugs.debian.org/317787)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-doc-2.6.8.1\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-386\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-686\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-686-smp\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-generic\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-k8\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-k8-smp\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-xeon\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-386\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-686\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-686-smp\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-generic\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-k8\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-k8-smp\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-xeon\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-patch-debian-2.6.8.1\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-source-2.6.8.1\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-tree-2.6.8.1\", pkgver:\"2.6.8.1-16.21\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-doc-2.6.10\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-386\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-686\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-686-smp\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-generic\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-k8\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-k8-smp\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-xeon\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-386\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-686\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-686-smp\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-generic\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-k8\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-k8-smp\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-xeon\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-patch-ubuntu-2.6.10\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-source-2.6.10\", pkgver:\"2.6.10-34.4\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-tree-2.6.10\", pkgver:\"2.6.10-34.4\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.10 / linux-doc-2.6.8.1 / linux-headers-2.6 / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:24", "bulletinFamily": "software", "cvelist": ["CVE-2005-4798"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commitdiff;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b\nVendor Specific News/Changelog Entry: http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1183)\n[Vendor Specific Advisory URL](http://www.novell.com/linux/security/advisories/2006-05-31.html)\n[Secunia Advisory ID:22093](https://secuniaresearch.flexerasoftware.com/advisories/22093/)\n[Secunia Advisory ID:22082](https://secuniaresearch.flexerasoftware.com/advisories/22082/)\nOther Advisory URL: http://www.us.debian.org/security/2006/dsa-1184\nMail List Post: http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html\n[CVE-2005-4798](https://vulners.com/cve/CVE-2005-4798)\n", "modified": "2005-09-12T19:29:44", "published": "2005-09-12T19:29:44", "href": "https://vulners.com/osvdb/OSVDB:27781", "id": "OSVDB:27781", "title": "Linux Kernel NFS readlink Long Symlink Handling Overflow DoS", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:18", "bulletinFamily": "software", "cvelist": ["CVE-2005-3276"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/usn/usn-219-1)\n[Secunia Advisory ID:17826](https://secuniaresearch.flexerasoftware.com/advisories/17826/)\n[Secunia Advisory ID:18510](https://secuniaresearch.flexerasoftware.com/advisories/18510/)\n[Secunia Advisory ID:19252](https://secuniaresearch.flexerasoftware.com/advisories/19252/)\n[Secunia Advisory ID:17648](https://secuniaresearch.flexerasoftware.com/advisories/17648/)\n[Secunia Advisory ID:18056](https://secuniaresearch.flexerasoftware.com/advisories/18056/)\nRedHat RHSA: RHSA-2006:0144\nRedHat RHSA: RHSA-2006:0101\nOther Advisory URL: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:219\nOther Advisory URL: http://www.debian.org/security/2005/dsa-922\nMail List Post: http://lkml.org/lkml/2005/8/3/36\nMail List Post: http://linux.bkbits.net:8080/linux-2.6/cset@42e81864gSEM90Oun0jA8dufpM3inw\nMail List Post: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1\n[CVE-2005-3276](https://vulners.com/cve/CVE-2005-3276)\nBugtraq ID: 15527\n", "modified": "2005-07-27T00:21:05", "published": "2005-07-27T00:21:05", "href": "https://vulners.com/osvdb/OSVDB:21281", "id": "OSVDB:21281", "title": "Linux Kernel sys_get_thread_area Function Local Information Disclosure", "type": "osvdb", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "cvelist": ["CVE-2005-2458"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/support/documentation/usn/usn-169-1)\n[Secunia Advisory ID:17826](https://secuniaresearch.flexerasoftware.com/advisories/17826/)\n[Secunia Advisory ID:17918](https://secuniaresearch.flexerasoftware.com/advisories/17918/)\n[Secunia Advisory ID:18510](https://secuniaresearch.flexerasoftware.com/advisories/18510/)\n[Secunia Advisory ID:19252](https://secuniaresearch.flexerasoftware.com/advisories/19252/)\n[Secunia Advisory ID:16355](https://secuniaresearch.flexerasoftware.com/advisories/16355/)\n[Secunia Advisory ID:18059](https://secuniaresearch.flexerasoftware.com/advisories/18059/)\n[Secunia Advisory ID:18056](https://secuniaresearch.flexerasoftware.com/advisories/18056/)\n[Secunia Advisory ID:18684](https://secuniaresearch.flexerasoftware.com/advisories/18684/)\n[Secunia Advisory ID:16663](https://secuniaresearch.flexerasoftware.com/advisories/16663/)\nRedHat RHSA: RHSA-2006:0144\nRedHat RHSA: RHSA-2006:0101\nRedHat RHSA: RHSA-2006:0190\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_50_kernel.html\nOther Advisory URL: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:219\nOther Advisory URL: http://www.debian.org/security/2005/dsa-921\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Dec/0004.html\nOther Advisory URL: http://www.debian.org/security/2005/dsa-922\nMail List Post: http://sources.redhat.com/ml/bug-gnu-utils/1999-06/msg00183.html\n[CVE-2005-2458](https://vulners.com/cve/CVE-2005-2458)\n", "modified": "2005-07-25T10:52:39", "published": "2005-07-25T10:52:39", "href": "https://vulners.com/osvdb/OSVDB:19026", "id": "OSVDB:19026", "title": "Linux Kernel zlib inflate.c Improper Tables File Local DoS", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:15", "bulletinFamily": "software", "cvelist": ["CVE-2005-2801"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.novell.com/linux/security/advisories/2005_18_kernel.html)\n[Secunia Advisory ID:17826](https://secuniaresearch.flexerasoftware.com/advisories/17826/)\n[Secunia Advisory ID:19252](https://secuniaresearch.flexerasoftware.com/advisories/19252/)\n[Secunia Advisory ID:18059](https://secuniaresearch.flexerasoftware.com/advisories/18059/)\n[Secunia Advisory ID:16750](https://secuniaresearch.flexerasoftware.com/advisories/16750/)\n[Secunia Advisory ID:17073](https://secuniaresearch.flexerasoftware.com/advisories/17073/)\n[Secunia Advisory ID:18056](https://secuniaresearch.flexerasoftware.com/advisories/18056/)\n[Secunia Advisory ID:14295](https://secuniaresearch.flexerasoftware.com/advisories/14295/)\nRedHat RHSA: RHSA-2006:0144\nRedHat RHSA: RHSA-2005:514\nOther Advisory URL: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:219\nOther Advisory URL: http://www.debian.org/security/2005/dsa-921\nOther Advisory URL: http://www.debian.org/security/2005/dsa-922\nMail List Post: http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html\nMail List Post: http://lists.debian.org/debian-kernel/2005/08/msg00238.html\n[CVE-2005-2801](https://vulners.com/cve/CVE-2005-2801)\n", "modified": "2005-03-24T21:15:20", "published": "2005-03-24T21:15:20", "href": "https://vulners.com/osvdb/OSVDB:19314", "id": "OSVDB:19314", "title": "Linux Kernel ext2/ext3 xattr.c name_index Error ACL Failure", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "seebug": [{"lastseen": "2017-11-19T22:37:04", "description": "BUGTRAQ ID: 15527\r\nCVE(CAN) ID: CVE-2005-3276\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u5728\u5904\u7406\u5185\u6838\u6570\u636e\u7ed3\u6784\u65f6\u5b58\u5728\u95ee\u9898\uff0c\u53ef\u80fd\u5bfc\u81f4\u5185\u6838\u7684\u654f\u611f\u6570\u636e\u6cc4\u9732\u3002\r\n\r\nLinux\u5185\u6838\u4ee3\u7801process.c\u4e2d\u7684sys_get_thread_area\u51fd\u6570\u5728\u6267\u884c\u62f7\u8d1d\u4e4b\u524d\u6ca1\u6709\u6e05\u9664\u6570\u636e\u7ed3\u6784\uff0c\u8fd9\u53ef\u80fd\u5141\u8bb8\u7528\u6237\u8fdb\u7a0b\u83b7\u5f97\u5c11\u91cf\u654f\u611f\u4fe1\u606f\u3002\r\n\n\nLinux kernel 2.6 < 2.6.12.4\r\nRedHat Linux WS 4\r\nRedHat Linux ES 4\r\nRedHat Linux Desktop 4\r\nRedHat Linux AS 4\n Linux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1 target=_blank>http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1</a>\r\n\r\nRedHat\r\n------\r\nRedHat\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08RHSA-2006:0101-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nRHSA-2006:0101-01\uff1aImportant: kernel security update\r\n\u94fe\u63a5\uff1a<a href=http://lwn.net/Alerts/168077/?format=printable target=_blank>http://lwn.net/Alerts/168077/?format=printable</a>", "published": "2006-08-20T00:00:00", "title": "Linux Kernel sys_get_thread_area\u5185\u6838\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-3276"], "modified": "2006-08-20T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4231", "id": "SSV:4231", "sourceData": "", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T22:28:19", "description": "BUGTRAQ ID: 14719\r\nCVE(CAN) ID: CAN-2005-2458\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u7684zlib\u4f8b\u7a0b\u7684inflate.c\u4e2d\u5b58\u5728\u6f0f\u6d1e\u3002\u5982\u679c\u7528\u6237\u6253\u5f00\u4e86\u7279\u5236\u7684\u538b\u7f29\u6587\u4ef6\u7684\u8bdd\uff0c\u5c31\u53ef\u80fd\u5bfc\u81f4kernel\u5d29\u6e83\u3002\r\n\r\n\n\nLinux kernel < 2.6.12.5\n Linux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n* Linux linux-2.6.12.5.tar.gz\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.12.5.tar.gz target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.12.5.tar.gz</a>\r\n\r\nRedHat\r\n------\r\nRedHat\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08RHSA-2006:0101-01\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nRHSA-2006:0101-01\uff1aImportant: kernel security update\r\n\u94fe\u63a5\uff1a<a href=http://lwn.net/Alerts/168077/?format=printable target=_blank>http://lwn.net/Alerts/168077/?format=printable</a>\r\n\r\nS.u.S.E.\r\n--------\r\nS.u.S.E.\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08SUSE-SA:2005:050\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nSUSE-SA:2005:050\uff1akernel multiple security problems\r\n\u94fe\u63a5\uff1a<a href=http://www.novell.com/linux/security/advisories/2005_50_kernel.html target=_blank>http://www.novell.com/linux/security/advisories/2005_50_kernel.html</a>", "published": "2006-08-17T00:00:00", "title": "Linux Kernel ZLib\u65e0\u6548\u5185\u5b58\u8bbf\u95ee\u672c\u5730\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2005-2458"], "modified": "2006-08-17T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4216", "id": "SSV:4216", "sourceData": "", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": ""}], "openvas": [{"lastseen": "2017-07-24T12:50:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2801", "CVE-2005-2872", "CVE-2005-1762", "CVE-2005-0757", "CVE-2005-3275", "CVE-2005-1768", "CVE-2005-2553", "CVE-2005-1767", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-0756", "CVE-2005-2458"], "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 921-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56013", "href": "http://plugins.openvas.org/nasl.php?oid=56013", "type": "openvas", "title": "Debian Security Advisory DSA 921-1 (kernel-source-2.4.27)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_921_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 921-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. For details on the vulnerabilities addressed by\nthe missing update, please visit the referenced security advisories.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\nDebian 3.1 (sarge)\nSource 2.4.27-10sarge1\nAlpha architecture 2.4.27-10sarge1\nARM architecture 2.4.27-2sarge1\nIntel IA-32 architecture 2.4.27-10sarge1\nIntel IA-64 architecture 2.4.27-10sarge1\nMotorola 680x0 architecture 2.4.27-3sarge1\nBig endian MIPS architecture 2.4.27-10.sarge1.040815-1\nLittle endian MIPS architecture 2.4.27-10.sarge1.040815-1\nPowerPC architecture 2.4.27-10sarge1\nIBM S/390 architecture 2.4.27-2sarge1\nSun Sparc architecture 2.4.27-9sarge1\n\nWe recommend that you upgrade your kernel package immediately and\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 921-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20921-1\";\n\nif(description)\n{\n script_id(56013);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-0756\", \"CVE-2005-0757\", \"CVE-2005-1762\", \"CVE-2005-1767\", \"CVE-2005-1768\", \"CVE-2005-2456\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2553\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3275\");\n script_bugtraq_id(14477);\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Debian Security Advisory DSA 921-1 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.4.27\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.4.27\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.4.27\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-arm\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-2\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-generic\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-generic\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mips-tools\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bast\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-lart\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-netwinder\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscpc\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscstation\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-itanium\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-itanium-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-mckinley\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-mckinley-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-itanium\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-itanium-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-mckinley\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-mckinley-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-amiga\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-atari\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bvme6000\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mac\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme147\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme16x\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-q40\", ver:\"2.4.27-3sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-ip22\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-ip22\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-sb1-swarm-bn\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r3k-kn02\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-kn04\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-cobalt\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-lasat\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-xxs1500\", ver:\"2.4.27-10.sarge1.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-apus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-nubus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-apus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-nubus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-powerpc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-apus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-nubus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-apus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-nubus\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-powerpc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390-tape\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390x\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc32\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc32-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc64\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc64-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc32\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc32-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc64\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc64-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-24T12:50:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3745", "CVE-2005-4798", "CVE-2006-2444", "CVE-2006-2446", "CVE-2006-2935", "CVE-2006-4535", "CVE-2006-1528"], "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1183-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57407", "href": "http://plugins.openvas.org/nasl.php?oid=57407", "type": "openvas", "title": "Debian Security Advisory DSA 1183-1 (kernel-source-2.4.27)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1183_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1183-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several security related problems have been discovered in the Linux\nkernel which may lead to a denial of service or even the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2005-4798\n\nA buffer overflow in NFS readlink handling allows a malicious\nremote server to cause a denial of service.\n\nCVE-2006-2935\n\nDiego Calleja Garcia discovered a buffer overflow in the DVD\nhandling code that could be exploited by a specially crafted DVD\nor USB storage device to execute arbitrary code.\n\nCVE-2006-1528\n\nA bug in the SCSI driver allows a local user to cause a denial of\nservice.\n\nCVE-2006-2444\n\nPatrick McHardy discovered a bug in the SNMP NAT helper that\nallows remote attackers to cause a denial of service.\n\nCVE-2006-2446\n\nA race condition in the socket buffer handling allows remote\nattackers to cause a denial of service.\n\nCVE-2006-3745\n\nWei Wang discovered a bug in the SCTP implementation that allows\nlocal users to cause a denial of service and possibly gain root\nprivileges.\n\nCVE-2006-4535\n\nDavid Miller reported a problem with the fix for CVE-2006-3745\nthat allows local users to crash the system using via an SCTP\nsocket with a certain SO_LINGER value.\n\n\nThe following matrix explains which kernel version for which\narchitecture fixes the problem mentioned above:\n\nstable (sarge)\nSource 2.4.27-10sarge4\nAlpha architecture 2.4.27-10sarge4\nARM architecture 2.4.27-2sarge4\nIntel IA-32 architecture 2.4.27-10sarge4\nIntel IA-64 architecture 2.4.27-10sarge4\nMotorola 680x0 architecture 2.4.27-3sarge4\nMIPS architectures 2.4.27-10.sarge4.040815-1\nPowerPC architecture 2.4.27-10sarge4\nIBM S/390 2.4.27-2sarge4\nSun Sparc architecture 2.4.27-9sarge4\nFAI 1.9.1sarge4\nmindi-kernel 2.4.27-2sarge3\nkernel-image-speakup-i386 2.4.27-1.1sarge3\nsystemimager 3.2.3-6sarge3\n\n\nFor the unstable distribution (sid) these problems won't be fixed\nanymore in the 2.4 kernel series.\n\nWe recommend that you upgrade your kernel package and reboot the\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1183-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201183-1\";\n\nif(description)\n{\n script_id(57407);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-4798\", \"CVE-2006-2935\", \"CVE-2006-1528\", \"CVE-2006-2444\", \"CVE-2006-2446\", \"CVE-2006-3745\", \"CVE-2006-4535\");\n script_bugtraq_id(18081,18101,18847,19666,20087);\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Debian Security Advisory DSA 1183-1 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.4.27\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.4.27\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.4.27\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-s390\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27-speakup\", ver:\"2.4.27-1.1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-i386-standard\", ver:\"3.2.3-6sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-ia64-standard\", ver:\"3.2.3-6sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-client\", ver:\"3.2.3-6sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-common\", ver:\"3.2.3-6sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-doc\", ver:\"3.2.3-6sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server-flamethrowerd\", ver:\"3.2.3-6sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server\", ver:\"3.2.3-6sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-2\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-3\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-generic\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-generic\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-generic\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-generic\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mips-tools\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bast\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-lart\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-netwinder\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscpc\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscstation\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-386\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k6\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-386\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k6\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-386\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-586tsc\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-686\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-686-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k6\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k7\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-2-k7-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-386\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k6\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-speakup\", ver:\"2.4.27-1.1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-speakup\", ver:\"2.4.27-1.1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mindi-kernel\", ver:\"2.4.27-2sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"fai-kernels\", ver:\"1.9.1sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-itanium\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-itanium-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-mckinley\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-mckinley-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-itanium\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-itanium-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-mckinley\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-mckinley-smp\", ver:\"2.4.27-10sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-amiga\", ver:\"2.4.27-3sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-atari\", ver:\"2.4.27-3sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bvme6000\", ver:\"2.4.27-3sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mac\", ver:\"2.4.27-3sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme147\", ver:\"2.4.27-3sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme16x\", ver:\"2.4.27-3sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-q40\", ver:\"2.4.27-3sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-ip22\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-ip22\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-sb1-swarm-bn\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r3k-kn02\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-kn04\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-cobalt\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-lasat\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-xxs1500\", ver:\"2.4.27-10.sarge4.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-apus\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-nubus\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-apus\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-nubus\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-powerpc\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-apus\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-nubus\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-apus\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-nubus\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-powerpc\", ver:\"2.4.27-10sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390-tape\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-s390x\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390-tape\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390x\", ver:\"2.4.27-2sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc32\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc32-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc64\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-2-sparc64-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc32\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc32-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc64\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-2-sparc64-smp\", ver:\"2.4.27-9sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-2302", "CVE-2005-1763", "CVE-2005-3108", "CVE-2005-2801", "CVE-2005-3106", "CVE-2005-3272", "CVE-2005-2872", "CVE-2005-3273", "CVE-2005-2548", "CVE-2005-1762", "CVE-2005-3109", "CVE-2005-0757", "CVE-2005-1765", "CVE-2005-3275", "CVE-2005-3110", "CVE-2005-3107", "CVE-2005-3274", "CVE-2005-1265", "CVE-2005-1761", "CVE-2005-1767", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-3271", "CVE-2005-0756", "CVE-2005-2458", "CVE-2005-3105", "CVE-2005-3276"], "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 922-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56014", "href": "http://plugins.openvas.org/nasl.php?oid=56014", "type": "openvas", "title": "Debian Security Advisory DSA 922-1 (kernel-source-2.4.27)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_922_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 922-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. For details on the vulnerabilities addressed by\nthe missing update, please visit the referenced security advisories.\n\nThis update also contains a number of corrections for issues that\nturned out to have no security implication afterwards.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\nDebian 3.1 (sarge)\nSource 2.6.8-16sarge1\nAlpha architecture 2.6.8-16sarge1\nAMD64 architecture 2.6.8-16sarge1\nHP Precision architecture 2.6.8-6sarge1\nIntel IA-32 architecture 2.6.8-16sarge1\nIntel IA-64 architecture 2.6.8-14sarge1\nMotorola 680x0 architecture 2.6.8-4sarge1\nPowerPC architecture 2.6.8-12sarge1\nIBM S/390 architecture 2.6.8-5sarge1\nSun Sparc architecture 2.6.8-15sarge1\n\nWe recommend that you upgrade your kernel package immediately and\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 922-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20922-1\";\n\nif(description)\n{\n script_id(56014);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:07:13 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-2302\", \"CVE-2005-0756\", \"CVE-2005-0757\", \"CVE-2005-1265\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1763\", \"CVE-2005-1765\", \"CVE-2005-1767\", \"CVE-2005-2456\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2548\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3105\", \"CVE-2005-3106\", \"CVE-2005-3107\", \"CVE-2005-3108\", \"CVE-2005-3109\", \"CVE-2005-3110\", \"CVE-2005-3271\", \"CVE-2005-3272\", \"CVE-2005-3273\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-3276\");\n script_bugtraq_id(14477,15527,15528,15533);\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 922-1 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.6.8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.6.8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.6.8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.6.8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.6.8-s390\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-amiga\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-atari\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-bvme6000\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-hp\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mac\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme147\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme16x\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-q40\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-sun3\", ver:\"2.6.8-4sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390-tape\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390x\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-default\n kernel-syms\n kernel-source\n kernel-smp\n kernel-bigsmp\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012519 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:136141256231065553", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065553", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5012519.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-default\n kernel-syms\n kernel-source\n kernel-smp\n kernel-bigsmp\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012519 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65553\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-2457\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2555\", \"CVE-2005-0916\", \"CVE-2005-2456\", \"CVE-2005-1765\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.5~7.201\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-26T08:55:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-default\n kernel-syms\n kernel-source\n kernel-smp\n kernel-bigsmp\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012519 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:65553", "href": "http://plugins.openvas.org/nasl.php?oid=65553", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5012519.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-default\n kernel-syms\n kernel-source\n kernel-smp\n kernel-bigsmp\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012519 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65553);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-2457\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2555\", \"CVE-2005-0916\", \"CVE-2005-2456\", \"CVE-2005-1765\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.5~7.201\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:50:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3745", "CVE-2005-4798", "CVE-2006-1343", "CVE-2006-4093", "CVE-2006-1855", "CVE-2006-2444", "CVE-2006-2446", "CVE-2006-2935", "CVE-2006-4535", "CVE-2006-1052", "CVE-2006-1528", "CVE-2006-4145", "CVE-2006-1856", "CVE-2006-3468", "CVE-2006-2936", "CVE-2004-2660"], "description": "The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1184-1. For details, please visit\nthe referenced security advisories.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57408", "href": "http://plugins.openvas.org/nasl.php?oid=57408", "type": "openvas", "title": "Debian Security Advisory DSA 1184-1 (kernel-source-2.6.8)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1184_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1184-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"The following matrix explains which kernel version for which\narchitecture fixes the problem mentioned above:\n\nstable (sarge)\nSource 2.6.8-16sarge5\nAlpha architecture 2.6.8-16sarge5\nAMD64 architecture 2.6.8-16sarge5\nHP Precision architecture 2.6.8-6sarge5\nIntel IA-32 architecture 2.6.8-16sarge5\nIntel IA-64 architecture 2.6.8-14sarge5\nMotorola 680x0 architecture 2.6.8-4sarge5\nPowerPC architecture 2.6.8-12sarge5\nIBM S/390 2.6.8-5sarge5\nSun Sparc architecture 2.6.8-15sarge5\nFAI 1.9.1sarge4\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.6.18-1.\n\nWe recommend that you upgrade your kernel package and reboot.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=DSA%201184-1\";\n\ntag_summary = \"The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1184-1. For details, please visit\nthe referenced security advisories.\";\n\n\n\nif(description)\n{\n script_id(57408);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-2660\", \"CVE-2005-4798\", \"CVE-2006-1052\", \"CVE-2006-1343\", \"CVE-2006-1528\", \"CVE-2006-1855\", \"CVE-2006-1856\", \"CVE-2006-2444\", \"CVE-2006-2446\", \"CVE-2006-2935\", \"CVE-2006-2936\", \"CVE-2006-3468\", \"CVE-2006-3745\", \"CVE-2006-4093\", \"CVE-2006-4145\", \"CVE-2006-4535\");\n script_bugtraq_id(17203,17830,18081,18099,18101,18105,18847,19033,19396);\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Debian Security Advisory DSA 1184-1 (kernel-source-2.6.8)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.6.8\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.6.8\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.6.8\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.6.8\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3\", ver:\"2.6.8-15sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-generic\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-generic\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-generic\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-k8\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-k8-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-em64t-p4\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-em64t-p4-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-generic\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-k8\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-k8-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-em64t-p4\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-em64t-p4-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-32\", ver:\"2.6.8-6sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-32-smp\", ver:\"2.6.8-6sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-64\", ver:\"2.6.8-6sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-64-smp\", ver:\"2.6.8-6sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-32\", ver:\"2.6.8-6sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-32-smp\", ver:\"2.6.8-6sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-64\", ver:\"2.6.8-6sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-64-smp\", ver:\"2.6.8-6sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-386\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-686\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-686-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-k7\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-k7-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-386\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-686\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-686-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-k7\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-k7-smp\", ver:\"2.6.8-16sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"fai-kernels\", ver:\"1.9.1sarge4\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium-smp\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley-smp\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-itanium\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-itanium-smp\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-mckinley\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-mckinley-smp\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium-smp\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley-smp\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-itanium\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-itanium-smp\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-mckinley\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-mckinley-smp\", ver:\"2.6.8-14sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-amiga\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-atari\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-bvme6000\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-hp\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mac\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme147\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme16x\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-q40\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-sun3\", ver:\"2.6.8-4sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power3\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power3-smp\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power4\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power4-smp\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-powerpc\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-powerpc-smp\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power3\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power3-smp\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power4\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power4-smp\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-powerpc\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-powerpc-smp\", ver:\"2.6.8-12sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3\", ver:\"2.6.8-15sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc32\", ver:\"2.6.8-15sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc64\", ver:\"2.6.8-15sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc64-smp\", ver:\"2.6.8-15sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc32\", ver:\"2.6.8-15sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc64\", ver:\"2.6.8-15sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc64-smp\", ver:\"2.6.8-15sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3745", "CVE-2005-4798", "CVE-2006-1343", "CVE-2006-4093", "CVE-2006-1855", "CVE-2006-2444", "CVE-2006-2446", "CVE-2006-2935", "CVE-2006-4535", "CVE-2006-1052", "CVE-2006-1528", "CVE-2006-4145", "CVE-2006-1856", "CVE-2006-3468", "CVE-2006-2936", "CVE-2004-2660"], "description": "The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1184-2. For details on the issues\naddressed with the missing update, please visit the referenced\nsecurity advisories.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:57477", "href": "http://plugins.openvas.org/nasl.php?oid=57477", "type": "openvas", "title": "Debian Security Advisory DSA 1184-2 (kernel-source-2.6.8)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1184_2.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1184-2\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following matrix explains which kernel version for which\narchitecture fixes the problem mentioned above:\n\nstable (sarge)\nSource 2.6.8-16sarge5\nAlpha architecture 2.6.8-16sarge5\nAMD64 architecture 2.6.8-16sarge5\nHP Precision architecture 2.6.8-6sarge5\nIntel IA-32 architecture 2.6.8-16sarge5\nIntel IA-64 architecture 2.6.8-14sarge5\nMotorola 680x0 architecture 2.6.8-4sarge5\nPowerPC architecture 2.6.8-12sarge5\nIBM S/390 2.6.8-5sarge5\nSun Sparc architecture 2.6.8-15sarge5\nFAI 1.9.1sarge4\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.6.18-1.\n\nWe recommend that you upgrade your kernel package and reboot the\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1184-2. For details on the issues\naddressed with the missing update, please visit the referenced\nsecurity advisories.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201184-2\";\n\nif(description)\n{\n script_id(57477);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:13:11 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-2660\", \"CVE-2005-4798\", \"CVE-2006-1052\", \"CVE-2006-1343\", \"CVE-2006-1528\", \"CVE-2006-1855\", \"CVE-2006-1856\", \"CVE-2006-2444\", \"CVE-2006-2446\", \"CVE-2006-2935\", \"CVE-2006-2936\", \"CVE-2006-3468\", \"CVE-2006-3745\", \"CVE-2006-4093\", \"CVE-2006-4145\", \"CVE-2006-4535\");\n script_bugtraq_id(17203,17830,18081,18099,18101,18105,18847,19033,19396);\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Debian Security Advisory DSA 1184-2 (kernel-source-2.6.8)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.6.8-s390\", ver:\"2.6.8-5sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3\", ver:\"2.6.8-5sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390\", ver:\"2.6.8-5sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390-tape\", ver:\"2.6.8-5sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390x\", ver:\"2.6.8-5sarge5\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "debian": [{"lastseen": "2020-11-11T13:18:54", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2801", "CVE-2005-2872", "CVE-2005-1762", "CVE-2005-0757", "CVE-2005-3275", "CVE-2005-1768", "CVE-2005-2553", "CVE-2005-1767", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-0756", "CVE-2005-2458"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 921-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nDecember 14th, 2005 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2005-0756 CVE-2005-0757 CVE-2005-1762 CVE-2005-1767\n CVE-2005-1768 CVE-2005-2456 CVE-2005-2458 CVE-2005-2459\n CVE-2005-2553 CVE-2005-2801 CVE-2005-2872 CVE-2005-3275\nBugTraq ID : 14477\nDebian Bug : 311164 319629 321401 322237\n\nSeveral local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilieis and Exposures project\nidentifies the following problems:\n\nCVE-2005-0756\n\n Alexander Nyberg discovered that the ptrace() system call does not\n properly verify addresses on the amd64 architecture which can be\n exploited by a local attacker to crash the kernel.\n\nCVE-2005-0757\n\n A problem in the offset handling in the xattr file system code for\n ext3 has been discovered that may allow users on 64-bit systems\n that have access to an ext3 filesystem with extended attributes to\n cause the kernel to crash.\n\nCVE-2005-1762\n\n A vulnerability has been discovered in the ptrace() system call on\n the amd64 architecture that allowas a local attacker to cause the\n kernel to crash.\n\nCVE-2005-1767\n\n A vulnerability has been discovered in the stack segment fault\n handler that could allow a local attacker to cause stack exception\n that will leed the kernel to crash under certain circumstances.\n\nCVE-2005-1768\n\n Ilja van Sprundel discovered a race condition in the IA32 (x86)\n compatibility execve() systemcall for amd64 and IA64 that allows\n local attackers to cause the kernel to panic and possibly execute\n arbitrary code.\n\nCVE-2005-2456\n\n Balazs Scheidler discovered that a local attacker could call\n setsockopt() with an invalid xfrm_user policy message which would\n cause the kernel to write beyond the boundaries of an array and\n crash.\n\nCVE-2005-2458\n\n Vladimir Volovich discovered a bug in the zlib routines which are\n also present in the Linux kernel and allows remote attackers to\n krash the kernel\n\nCVE-2005-2459\n\n Another vulnerability has been discovered in the zlib routines\n which are also present in the Linux kernel and allows remote\n attackers to crash the kernel\n\nCVE-2005-2553\n\n A null pointer dereference in ptrace when tracing a 64-bit\n executable can cause the kernel to crash.\n\nCVE-2005-2801\n\n Andreas Gruenbacher discovered a bug in the ext2 and ext3 file\n systems. When data areas are to be shared among two inodes not\n all information were compared for equality, which could expose\n wrong ACLs for files.\n\nCVE-2005-2872\n\n Chad Walstrom discovered that the ipt_recent kernel module to stop\n SSH bruteforce attacks could cause the kernel to crash on 64-bit\n architectures.\n\nCVE-2005-3275\n\n An error in the NAT code allows remote attackers to cause a denial\n of service (memory corruption) by causing two packets for the same\n protocol to be NATed at the same time, which leads to memory\n corruption.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\nSource 2.4.27-10sarge1\nAlpha architecture 2.4.27-10sarge1\nARM architecture 2.4.27-2sarge1\nIntel IA-32 architecture 2.4.27-10sarge1\nIntel IA-64 architecture 2.4.27-10sarge1\nMotorola 680x0 architecture 2.4.27-3sarge1\nBig endian MIPS architecture 2.4.27-10.sarge1.040815-1\nLittle endian MIPS architecture 2.4.27-10.sarge1.040815-1\nPowerPC architecture 2.4.27-10sarge1\nIBM S/390 architecture 2.4.27-2sarge1\nSun Sparc architecture 2.4.27-9sarge1\n\nWe recommend that you upgrade your kernel package immediately and\nreboot the machine.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 900 cf29dbb52e2fd25da1d4ecb8dbe5e854\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz\n Size/MD5 checksum: 699494 3b26bc94e734e3e9c7de8851e9e308b7\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz\n Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 831 0278c9e5d78a3f0192808e89d2fa389b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz\n Size/MD5 checksum: 29945 c6c19bbf99fbff1d67d5216f28855755\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1.dsc\n Size/MD5 checksum: 577 0f7c9c24f228948824056914841278c5\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1.tar.gz\n Size/MD5 checksum: 828336 b38387d519bee09b40f6b706d54f60fc\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 839 99ec4f95021ee6e9fb9b98087109c0d7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge1.tar.gz\n Size/MD5 checksum: 32182 efdb3fde273dc5d0124d38f6d7dccbd6\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 1581 0ddc89456decf24ce5d10aa79824cd5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz\n Size/MD5 checksum: 97268 6aa8cd7f87e3bda01cdcd09bda96e596\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 1143 21e48f420a88976b9063e88cc7d8add5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz\n Size/MD5 checksum: 53267 e3c410bc8e3bdfdfe81dbc00575f62e0\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge1.dsc\n Size/MD5 checksum: 889 a5253abf41b798233d68c8004da5049a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge1.tar.gz\n Size/MD5 checksum: 9791 3a5c08d227dac66ad83c75cd68c74375\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge1.040815-1.dsc\n Size/MD5 checksum: 1062 d03d719f6a6cef2732ba218ae40a6770\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge1.040815-1.tar.gz\n Size/MD5 checksum: 307828 fa74234db1cbd88277fcdd490b10a887\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.dsc\n Size/MD5 checksum: 1129 125083312667f1bdb7c62e217b41963a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.tar.gz\n Size/MD5 checksum: 1462360 ab3702cbcde8976d422e32d13173c942\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 825 ecfb13748a5231fb8e1580b7bcd99600\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge1.tar.gz\n Size/MD5 checksum: 8123 5e41863c13ad4b96fe90ed25abd3e33d\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc\n Size/MD5 checksum: 1074 a22bdef307d571cd0d9a055d0752111b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz\n Size/MD5 checksum: 22912 2bcc7519c5da2edfe0b450b02b1c1e85\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb\n Size/MD5 checksum: 3577464 3a2c82fcc546bee30fb522f28193f3e7\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb\n Size/MD5 checksum: 650880 2cfb0a84539c910e596abba17e7d8d48\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb\n Size/MD5 checksum: 31026166 857f97955b1c7d145990f28581731fb7\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb\n Size/MD5 checksum: 24418 c346db9cb71c6e39328d49318a2f2ed4\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-arm/kernel-patch-2.4.27-arm_2.4.27-1sarge1_all.deb\n Size/MD5 checksum: 832704 b9e1f325937d5f7596688d5dd848de55\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 5690 26d3f171f62b80b0b8e978652f8f485a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 4572104 d92c8a0b7398b6b41d52c7a55a3d88f1\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 270932 be9e18785e87f29f8632a9fc973b0bbb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 272886 dea691efa19f4b82691124fa62e8963f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 16516634 eb2e92ade4debc9bfdedb40134b3efd6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 16970506 2b58db598e31823c08f993da80ab10d0\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_alpha.deb\n Size/MD5 checksum: 18104 42337c47e36aab7279b3355987057447\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_amd64.deb\n Size/MD5 checksum: 14830 1bef3063d2042b93b8734bbf02b57e8f\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 464238 58d912323c90cc0c588d7882965a0171\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 4657690 35d64aacb4e4d9286360881edec6a359\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 1688134 5cc159ac4ba8cd9152513616ebeff876\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 1053572 2ed7da9dfede24ce6c3ac6f3300c9f30\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 7330858 93afcdcfda01d2d08b0bc86f32a3d623\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 3141064 fdd304023a6f6da48c69417b1e531469\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge1_arm.deb\n Size/MD5 checksum: 3663614 e532db0019cc83e0b40e99cc5bd16179\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_arm.deb\n Size/MD5 checksum: 16498 98ff86517ac204296c7d2a8bd9d771cb\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 8224 ae479d6dbd6c171e94a25e5b59b4243f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 1823160 c058363ae7646c370f77d620c6bb6438\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297168 19b508f76e107d8cf988560b3fd04a8b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298340 073efbc2d728e4ee3b30e980d2d0f5e6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298200 94f48b9438f8e100590c8874b3c05e0c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 300156 1143aa70f66386bf4789431e80810b2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297050 44f3d785ad2c70829373321327e6e3e6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297978 7795ea75d534ded9d2a7ade27fc3cf21\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 299650 9676b8d779e9dd09f0583d950e2fd2d5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 11046010 e32bdedde43897d24792ce5199c8e428\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12024834 edfa4a6008fde7599fbd7e5081cc2bb9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12336042 d2c1f84d0c771fa8de10c87e0cb35e70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12679824 4ab0ad4ca8bf76e6614768cee8245c24\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 11708878 7842c8dfed5e6c2cbbed136807b5cf7f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12083292 b45dd7f50ef9f4726711c4af87368037\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12415392 b56e1c928e816d53f6cba41f0138e91d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 267586 95d23b87e054f0a8dc82edd6a7f51f60\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 292452 d090775026be223c949e0f86f5b1f646\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298278 f8cc95014790c87b62bf81b2b2d2d674\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 303840 f1362454b42361047297b1ef7f90769c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 286252 d67de5ec744bad676981089e5623561c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 292100 0ce7cff58a32eb924199a652062a7e9f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 296978 fdb699b60e0d3ae5fa4df76e0203c603\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_i386.deb\n Size/MD5 checksum: 14278 b17654c8d53b3813df9eaef78810efd4\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 5190 00c8fff6af32adf62f8c91794745931b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4678756 01467522c3106fab54cf6983a9c6487d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 239184 cd07eff9264141e6ddbd015f5f76e99e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 240504 03b131531af57cd2f46cf8ff8ba93f45\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 239212 457102e92a389246447410ce172bbd2f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 240498 66cc452b54b87366d7755da6693aa76c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4916 8432a3f7650e77fc8ab88f9bf6efdc2a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4934 83fd412732f3cbc3d8b9c642f968bc61\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4944 91ec4c1ca5123a5552cb1b74bea98b29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4962 26f8609ffe3a5711730283a5ac19e206\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16665798 0dfd99eeb9d1c8933ec71f0cdc80a71e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 17023766 09ae0a0c0b133abe047cd50b8e09f02e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16623970 2b70e151d5c13c89d7646dc01d28a277\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16970478 affcf0503482e489ae8384b3d7279fce\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_ia64.deb\n Size/MD5 checksum: 19858 ba4cea60b31ac6926bc2e12c89c98232\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_hppa.deb\n Size/MD5 checksum: 16894 ef6c734bc7a3be187324d77d6432affd\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2628642 9d7d78cb18b165526d3b9c69274cc186\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2535972 5367f4e405cd97ae879d13149813beca\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2384766 853a2da6b5f179ff9d4bedf82e1a041f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2468516 788d44179a2aa91c9868c15fb371c11d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2313758 4b7cb73958e218b3f63de0c0e9347e26\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2386394 e0a43e4b96b3ddfb782dd842bf063f89\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge1_m68k.deb\n Size/MD5 checksum: 2252242 a5f233f48b188fc7889a83c676d64b9e\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_m68k.deb\n Size/MD5 checksum: 14000 c9efe0c462af304a1ae5a9d3f3ccd2c2\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 4679334 8c640c4a3323fe874fbf7736afbf592f\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 3846338 af689f1f43f75f242ee3b1ee1d8d5c98\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 3847118 3ee1d8be5f4e2e4c9e4d9e09cb9f31ac\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 7171242 1ddb30791997030df21a1ca98f4874af\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_mips.deb\n Size/MD5 checksum: 18054 9174691199f426e382a8876fbb74d0ac\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 4684404 1d8dd72aa68218631bb8c53331bc30f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 3030092 dfddac8fdc4fee01d91dcb6a4eb28eea\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 2988820 3f1df983a7cf1691052fe9af1d84b7b1\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 4099956 49da290cf77d5a9a83dd2c365d347900\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 2135184 49d13799447a86acc1462c9d58c0e8e9\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 7035572 b4040a68e042f355c42af12cdc30a587\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 4665112 ce758787e61df3a2f1d4b43dccc68a00\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_mipsel.deb\n Size/MD5 checksum: 18080 fbb7d48b4b95f67ce8777afa25168ddb\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_powerpc.deb\n Size/MD5 checksum: 16540 fde92bdf463104a5fd110846fbd10d6f\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 137990 10c69171982c0953614db790071fe897\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 137824 714f0b2cd873ea876d68d183fab7e59e\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 151838 ab7d3a6c324a2b64eb674148cead1393\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 152182 41e9c9254f399c29b0c198b6d94ca7ac\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 151902 0539b0f041ffbe37a75b71a5554ffd66\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 4681796 c5e92c06e7a9887639da199bc1b94f80\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 4691992 0f2e90800a27bf34f48ea5dc062cbb59\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 4799772 7a4ec03f1373d998539fe68d209589e3\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 2494658 54d0408ab521a0a5e0874c80ebdba402\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 1813568 f6a3da841cffbed57b7bf11119abaf0d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 13474368 134af15cd55b4b3848fdbdeff7ef214d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 12746708 631ef07000bc6f99e43011a63a65c43f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 13779958 5c40bd31a118b3bafda658e258379423\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 65396 a2d652c8bf5b5005597abda9918f02fc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 8710 4f867433a832c50e2920c4a3c21e4cb2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb\n Size/MD5 checksum: 8636 3c83da402850e2e86197a655e26377a2\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_s390.deb\n Size/MD5 checksum: 16892 6323a7ca3a316a8eaa412c2a2d9e0e7c\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-2_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 4578000 97fce93cc2ebc4da7c0a7bab1c157aef\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 2774574 86262b4b2bb4c6db5471c97dcc1747b4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390-tape_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 991868 a712b00ecf74c79fadeeb0f50b298618\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390x_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 2966354 5ebdd9b9fa80cdbdf0049683eaad24ee\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge1.040815-1_sparc.deb\n Size/MD5 checksum: 15812 85f732679a460ea8bed9a7017dbfc0b8\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 8328 1e092e0877937ac5dbf46e347992c7d3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 2023482 b50d08e5c4c12fff4473e77babeda1ab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 162670 2c495f6b6e414dc24f2c676ecd84dda4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 164478 f59e33098dec7e1ff68b162aab6d56a6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 201214 fa92988ddfba0e9f03ace13f365dfc77\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 202452 d56ab1dd8ddb9d4b10de13c37c4c4af5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 3597102 1c5334adb92bbaf0ce96e82abcf6d77e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 3784076 3d1b5e5c3e147bf760c6077fa36eb783\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 6377902 7bd0e77ec9494b0ed352917b829fa5a0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 6543220 a73b077777c3a22ca9538666d3ff8aee\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 11, "modified": "2005-12-14T00:00:00", "published": "2005-12-14T00:00:00", "id": "DEBIAN:DSA-921-1:C6057", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00322.html", "title": "[SECURITY] [DSA 921-1] New Linux 2.4.27 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-11-11T13:25:21", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3745", "CVE-2005-4798", "CVE-2006-2444", "CVE-2006-2446", "CVE-2006-2935", "CVE-2006-4535", "CVE-2006-1528"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1183-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier\nSeptember 25th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2005-4798 CVE-2006-2935 CVE-2006-1528 CVE-2006-2444\n CVE-2006-2446 CVE-2006-3745 CVE-2006-4535\nCERT advisory : VU#681569\nBugTraq IDs : 18081 18101 18847 19666 20087\n\nSeveral security related problems have been discovered in the Linux\nkernel which may lead to a denial of service or even the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2005-4798\n\n A buffer overflow in NFS readlink handling allows a malicious\n remote server to cause a denial of service.\n\nCVE-2006-2935\n\n Diego Calleja Garcia discovered a buffer overflow in the DVD\n handling code that could be exploited by a specially crafted DVD\n or USB storage device to execute arbitrary code.\n\nCVE-2006-1528\n\n A bug in the SCSI driver allows a local user to cause a denial of\n service.\n\nCVE-2006-2444\n\n Patrick McHardy discovered a bug in the SNMP NAT helper that\n allows remote attackers to cause a denial of service.\n\nCVE-2006-2446\n\n A race condition in the socket buffer handling allows remote\n attackers to cause a denial of service.\n\nCVE-2006-3745\n\n Wei Wang discovered a bug in the SCTP implementation that allows\n local users to cause a denial of service and possibly gain root\n privileges.\n\nCVE-2006-4535\n\n David Miller reported a problem with the fix for CVE-2006-3745\n that allows local users to crash the system using via an SCTP\n socket with a certain SO_LINGER value.\n\n\nThe following matrix explains which kernel version for which\narchitecture fixes the problem mentioned above:\n\n stable (sarge)\n Source 2.4.27-10sarge4\n Alpha architecture 2.4.27-10sarge4\n ARM architecture 2.4.27-2sarge4\n Intel IA-32 architecture 2.4.27-10sarge4\n Intel IA-64 architecture 2.4.27-10sarge4\n Motorola 680x0 architecture 2.4.27-3sarge4\n MIPS architectures 2.4.27-10.sarge4.040815-1\n PowerPC architecture 2.4.27-10sarge4\n IBM S/390 2.4.27-2sarge4\n Sun Sparc architecture 2.4.27-9sarge4\n FAI 1.9.1sarge4\n mindi-kernel 2.4.27-2sarge3\n kernel-image-speakup-i386 2.4.27-1.1sarge3\n systemimager 3.2.3-6sarge3\n\n\nFor the unstable distribution (sid) these problems won't be fixed\nanymore in the 2.4 kernel series.\n\nWe recommend that you upgrade your kernel package and reboot the\nmachine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge4.dsc\n Size/MD5 checksum: 900 0a2336025f8cbcfc621ba50b9660a7bf\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge4.diff.gz\n Size/MD5 checksum: 748331 b5b22b68654428a9da5b966b913c752a\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz\n Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge4.dsc\n Size/MD5 checksum: 831 88a98b9f6aa9ebd3cdfe4978f4ee56da\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge4.tar.gz\n Size/MD5 checksum: 31842 6ab91f91278a604a4916a2b31905d515\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge4.dsc\n Size/MD5 checksum: 840 cd0d106949bcd9a40dcdc4d2a4d862d2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge4.tar.gz\n Size/MD5 checksum: 34000 2dec31a15fe7ea34f1f8c5dc62911568\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge4.dsc\n Size/MD5 checksum: 1581 01aef428bb7beb4c4b85ead4f7560647\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge4.tar.gz\n Size/MD5 checksum: 99332 f88a415582bc8ab14077618daadaaac2\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge4.dsc\n Size/MD5 checksum: 1143 43ad8f588032f8e388251589d81a90ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge4.tar.gz\n Size/MD5 checksum: 55153 292ecbc0d7503145a1ddaa8a230643f4\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge4.dsc\n Size/MD5 checksum: 876 43ed0b4fa60018a09b7b5dc9df3f7079\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge4.tar.gz\n Size/MD5 checksum: 12396 a24fa72798951290096a5946be320b1c\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-1.dsc\n Size/MD5 checksum: 1051 6c465dd7e08dff3e591a395bbe6476e8\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge4.040815-1.tar.gz\n Size/MD5 checksum: 308729 f14792acf8a4725d3050ed4b0cb8f4be\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge4.dsc\n Size/MD5 checksum: 832 97bd5affa5f2a14c517d3a9a5d0e9e0b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge4.tar.gz\n Size/MD5 checksum: 10148 0e1a0b39d5e5546bc07c4228ee4f615b\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge4.dsc\n Size/MD5 checksum: 1074 efb105f7cdecd3eab73f29ba72cd5f8b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge4.tar.gz\n Size/MD5 checksum: 24326 accdb4ce4bb6e551ac717b558ce30a29\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-s390/kernel-patch-2.4.27-s390_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 821 c27125e2804aee56cbc72c49944f1f3d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-s390/kernel-patch-2.4.27-s390_2.4.27-2sarge1.diff.gz\n Size/MD5 checksum: 1515447 832ee00211a2df22a91ae4ba1ee6ec2a\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-s390/kernel-patch-2.4.27-s390_2.4.27.orig.tar.gz\n Size/MD5 checksum: 503981 14cfa98beb29c47b080c7b58a7e7ecb2\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge4.dsc\n Size/MD5 checksum: 1131 df39d9eb3665bde335c73e8f5b79c41f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge4.tar.gz\n Size/MD5 checksum: 1464290 1d6901e2c966af9664f6927b5132e032\n\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge3.dsc\n Size/MD5 checksum: 732 2b9eb5951e8845d997b09d2c6e5c093b\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge3.tar.gz\n Size/MD5 checksum: 18478 138bcb10c41d699d8da5ce0d57a99f9c\n\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge3.dsc\n Size/MD5 checksum: 750 d2fe1fdb6e3eec91a14a5c04a2771100\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge3.diff.gz\n Size/MD5 checksum: 4643 f12edff362c684cb55148ba303ab3110\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz\n Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301\n\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge3.dsc\n Size/MD5 checksum: 1012 d336248751eb3dc712d735db94f17446\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge3.tar.gz\n Size/MD5 checksum: 15979089 aa21b1d250b7b2e738a73504e99dcd2b\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.dsc\n Size/MD5 checksum: 621 91dc07d5678dc04fa77ee3f082e042c8\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.tar.gz\n Size/MD5 checksum: 28939 8308d8932bf9aea671d3644975c7dda2\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge4_all.deb\n Size/MD5 checksum: 3581526 02b22e7928c2c1492ac09027470522d5\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge4_all.deb\n Size/MD5 checksum: 700932 80d41a68d88ee856986bb8bcfe9bc793\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge4_all.deb\n Size/MD5 checksum: 31037234 534b6b2271445072053134883c3d751d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge4_all.deb\n Size/MD5 checksum: 27318 ea7848043c9df3a95da9e5095da5893b\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-s390/kernel-patch-2.4.27-s390_2.4.27-2sarge1_all.deb\n Size/MD5 checksum: 532268 fe433204c47dce4edcc3e7663e440fc2\n\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge3_all.deb\n Size/MD5 checksum: 2420420 d94901322ed779ac670e135a8440b2e0\n\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge3_all.deb\n Size/MD5 checksum: 4760662 5855e76c47690b0dfa70785b6a1f2ca3\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge3_all.deb\n Size/MD5 checksum: 9546576 87996510de39b3ac23aa15f36914cf1c\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge3_all.deb\n Size/MD5 checksum: 31108 1f6afea14eb6b21550cde51ceeddb00c\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge3_all.deb\n Size/MD5 checksum: 31332 c387c541a6787dbc7ff417d160cef59b\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge3_all.deb\n Size/MD5 checksum: 632064 92edcc1b25a875e5c30737a2fe70c531\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge3_all.deb\n Size/MD5 checksum: 16616 f24ac7d25eb5121f09bc28b4ed9f3b1a\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge3_all.deb\n Size/MD5 checksum: 117730 94e132e19815fc68558a470a6c81e877\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 5690 26d3f171f62b80b0b8e978652f8f485a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge4_alpha.deb\n Size/MD5 checksum: 7632 2445e35987d49ac25d54e03f4d812278\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 4572104 d92c8a0b7398b6b41d52c7a55a3d88f1\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 270932 be9e18785e87f29f8632a9fc973b0bbb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 272886 dea691efa19f4b82691124fa62e8963f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge4_alpha.deb\n Size/MD5 checksum: 4574146 d4f40822ff7d2b81745fcbad93c6c681\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb\n Size/MD5 checksum: 272884 7441b62133c6f10e2556ec0703912049\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb\n Size/MD5 checksum: 274864 9f1fff33bda8359a29401dfb5a68ae26\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 16516634 eb2e92ade4debc9bfdedb40134b3efd6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb\n Size/MD5 checksum: 16970506 2b58db598e31823c08f993da80ab10d0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge4_alpha.deb\n Size/MD5 checksum: 16530564 e35e28151550092e60061c6f02bb73e7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge4_alpha.deb\n Size/MD5 checksum: 16981142 b4e1b2a3e0a5536b0af285ecb8c06b02\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_alpha.deb\n Size/MD5 checksum: 20030 0cecb3666ee659837fbe610c39c61e32\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_amd64.deb\n Size/MD5 checksum: 16798 30e9f8cb575c9a89228ec3358570f9b3\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge4_arm.deb\n Size/MD5 checksum: 466036 0ec1622badaf906ebe04c4e9664120ba\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge4_arm.deb\n Size/MD5 checksum: 4659450 70550ea501a0f66d8b28b4188a6cd3ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge4_arm.deb\n Size/MD5 checksum: 1694270 7313913662a26b45d228fbe6f1c83a99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge4_arm.deb\n Size/MD5 checksum: 1058586 8147420a25a14158dc1f8d3445a2a430\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge4_arm.deb\n Size/MD5 checksum: 7338878 890a70f30487bfad6d30c5b8fee6e796\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge4_arm.deb\n Size/MD5 checksum: 3150260 d6e2d089dedb4eb6a7f769890c3edeca\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge4_arm.deb\n Size/MD5 checksum: 3673250 704fc370fc395d231914fd7fa5cfdd43\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_arm.deb\n Size/MD5 checksum: 18422 0c56ce3bb0e4f77b64c8a980a0e27f12\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_hppa.deb\n Size/MD5 checksum: 18820 509ab877c25a81e5ab2080fc65ee8ee0\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 8224 ae479d6dbd6c171e94a25e5b59b4243f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 10110 602c8ca8fb370ee253db8336f26c99c7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 1823160 c058363ae7646c370f77d620c6bb6438\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297168 19b508f76e107d8cf988560b3fd04a8b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298340 073efbc2d728e4ee3b30e980d2d0f5e6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298200 94f48b9438f8e100590c8874b3c05e0c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 300156 1143aa70f66386bf4789431e80810b2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297050 44f3d785ad2c70829373321327e6e3e6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 297978 7795ea75d534ded9d2a7ade27fc3cf21\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 299650 9676b8d779e9dd09f0583d950e2fd2d5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 1824668 da5f7095dd33c721a38893502e625979\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 298730 6dab70747a06a41255021d7e1285acd5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 299722 9e1a30002ad3880b2060210b7d2208aa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 299878 f76659d1243043578de452963ede6e46\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 301510 f0a217bab1ef540c24d48a90e6b266bf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 299110 40eba95c72df0de2be570161bc0d46bb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 299656 8e1456b82b4402781c285f1b9e8011f8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 301494 34dfd2fbc0d0957dac92cfe4485a7563\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 11046010 e32bdedde43897d24792ce5199c8e428\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12024834 edfa4a6008fde7599fbd7e5081cc2bb9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12336042 d2c1f84d0c771fa8de10c87e0cb35e70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12679824 4ab0ad4ca8bf76e6614768cee8245c24\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 11708878 7842c8dfed5e6c2cbbed136807b5cf7f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12083292 b45dd7f50ef9f4726711c4af87368037\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 12415392 b56e1c928e816d53f6cba41f0138e91d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 11051542 b20eeb3c509ba498bebc9e715491b456\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 12035042 7918144e5aa082597a924bd586faba2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 12352942 65d58be41a7887ea54af9627e454232f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 12692654 07275530155e3c813ad444d94484284d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 11722988 0289fe967373e95f580b770c85b1d23a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 12095314 f91cb833aa97fa8a24529ae40343fd24\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 12433462 dc6e39a89aed9d04aa96e77992741d29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 267586 95d23b87e054f0a8dc82edd6a7f51f60\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 292452 d090775026be223c949e0f86f5b1f646\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 298278 f8cc95014790c87b62bf81b2b2d2d674\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 303840 f1362454b42361047297b1ef7f90769c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 286252 d67de5ec744bad676981089e5623561c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 292100 0ce7cff58a32eb924199a652062a7e9f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb\n Size/MD5 checksum: 296978 fdb699b60e0d3ae5fa4df76e0203c603\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 269552 3e5f1d99455c3d8fb148d0385eb50dbe\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 294448 3ed90f48e0bc6e3122acd6d9f1e2d393\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 300280 90f3bf91543bae03fc9a58b7da0cbbd2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 306010 883ff5c2940b58e2add0da99249f3af7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 288252 87dde248ef2f3fc8b54b318b6b300bc0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 294146 713aaebe3caf1c8d34d8863b2df483dd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge4_i386.deb\n Size/MD5 checksum: 299096 f85e32d1715f76577e0012a393a8aa53\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_i386.deb\n Size/MD5 checksum: 16156 00845cf1a994cbbc869b733884059a83\n\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb\n Size/MD5 checksum: 4772038 238e18da8cd8497ed37668733ca0d7f7\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge3_i386.deb\n Size/MD5 checksum: 11306880 9dae592d44791ef0aa752ed27dbaa2bd\n\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge3_i386.deb\n Size/MD5 checksum: 7769788 f560d9bbbaea787f7dd4bf594938d59c\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4_i386.deb\n Size/MD5 checksum: 12000944 db0b06c129d5906ee5a5573415d1f352\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 5190 00c8fff6af32adf62f8c91794745931b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 7058 ac95d0b4257544a67458180f58904168\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 4678756 01467522c3106fab54cf6983a9c6487d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 239184 cd07eff9264141e6ddbd015f5f76e99e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 240504 03b131531af57cd2f46cf8ff8ba93f45\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 239212 457102e92a389246447410ce172bbd2f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 240498 66cc452b54b87366d7755da6693aa76c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 4689188 8819e9547726fb46d789fb79ee4972b8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 242178 8b098d01b8dc91fc9fd24158299835c5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 242848 641d59723ee16c39060a582733942052\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 241912 5043864a5e6270796fc1dbb4b48e4e87\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 242750 6061b8a357fe2c78c65d11171a234031\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 6830 34f798cebe568b05b68730248db1fac7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 6838 d30b496f7f7b5bd63f5c3af74a2b0bfc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 6858 7bc187acabee9b6f036674f77f531435\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 6874 776a1bf241883d1c568a84a753ee3eab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16665798 0dfd99eeb9d1c8933ec71f0cdc80a71e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 17023766 09ae0a0c0b133abe047cd50b8e09f02e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16623970 2b70e151d5c13c89d7646dc01d28a277\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb\n Size/MD5 checksum: 16970478 affcf0503482e489ae8384b3d7279fce\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 16676426 b0727c1d58545f67348da625615c6959\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 17033308 15424feb7e8d7197b446bc1d7f262f01\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 16628074 2f409b542f17fef3d0648f894dcccb99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge4_ia64.deb\n Size/MD5 checksum: 16986728 04ec0557d7babf7d2f6faed8a4f1dafb\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_ia64.deb\n Size/MD5 checksum: 21784 deb8adf7f5a2c3f125e88b72f4e5d806\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge4_m68k.deb\n Size/MD5 checksum: 2641912 6f4a895ce13d72b0012e4c20e29d0b1d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge4_m68k.deb\n Size/MD5 checksum: 2545082 4f6d92555461e4516f33240ffbeaa0bc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge4_m68k.deb\n Size/MD5 checksum: 2396292 ecb64193223ba0a1921bada3b108bd0d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge4_m68k.deb\n Size/MD5 checksum: 2478100 9ced9b8f0291c9805b4030953fc4af29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge4_m68k.deb\n Size/MD5 checksum: 2325564 f465bf68703f087c24ed94a25a009b94\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge4_m68k.deb\n Size/MD5 checksum: 2396996 88f45b3a8ea54a1cd0a88754fa3ed325\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge4_m68k.deb\n Size/MD5 checksum: 2262170 aeb89e3e22cb2e10da5be7eeb6d673d7\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_m68k.deb\n Size/MD5 checksum: 15900 8194eb4c394619f08126a208122ce6ec\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-1_mips.deb\n Size/MD5 checksum: 4681070 bfd674644d49ee349ff89e8f3573c030\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge4.040815-1_mips.deb\n Size/MD5 checksum: 3853598 43d8c06798ce14150978c69cba964434\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge4.040815-1_mips.deb\n Size/MD5 checksum: 3856622 749a60d3f39bf0eaad0fe1cfc3632863\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-1_mips.deb\n Size/MD5 checksum: 7184636 c6afad254628f4adb796b4c5d6f2a67e\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_mips.deb\n Size/MD5 checksum: 20004 df364bdfa0985c1370272c77d16d1bbb\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge4.040815-1_mipsel.deb\n Size/MD5 checksum: 4685964 5ed0170e31509ba6560a95f2b2185446\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge4.040815-1_mipsel.deb\n Size/MD5 checksum: 3036378 e296f6d8f89b809ac47fd5ee4740011a\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge4.040815-1_mipsel.deb\n Size/MD5 checksum: 2998372 6f1f552c294495e2ee4572f6ad35f118\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge4.040815-1_mipsel.deb\n Size/MD5 checksum: 4106222 163f1a722740ed7fc4ccf154cf315dbc\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge4.040815-1_mipsel.deb\n Size/MD5 checksum: 2140966 516dd73ba557727eb471dcfe9f9931e8\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge4.040815-1_mipsel.deb\n Size/MD5 checksum: 7046056 62a2991b3dde5384371a0e5375d31839\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge4.040815-1_mipsel.deb\n Size/MD5 checksum: 4676792 0b903ffb7bcc90de74523d31bb30ac25\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_mipsel.deb\n Size/MD5 checksum: 20048 8ec6f018f91783e61e0f1128a15f5a7a\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 142738 a9041a7e6fa2bdad090cdcd737664084\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 142582 f2c0b689ad22d64907d11ff119e1586c\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 156528 587e0541503c1a0c585d149e5f37f7f3\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 156816 238998f6e2d8bc9f5fc8a775d1941e34\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 156604 12f25b316bd25604209a3cbaf5fbd178\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 4683788 6f8daa7ee570ab03414c95fee28f750d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 4693896 7d9450ac7257cdc47a39029e470fdc51\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 4801492 c114b71fe46e45f2bc8d0cb115b82a47\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 2501708 241522d021e46710f0c09a42abb7e04f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 1818940 c48f4b10b6e887cc67bb44aafe719b58\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 13485830 3d2da4eb5cb59f34cdac15658c6631b9\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 12757364 a0081b92274d2565ea6a19dda1a96280\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 13792872 0204b3a7c7d1976383dd01e93f6104b2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 65420 86eb08fe122937b2b5eca16d1daffc7e\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 10582 7e4db127bc2d2c1d37e7eda2c0d14f4d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge4_powerpc.deb\n Size/MD5 checksum: 10502 1f96ad86ef5b1b7bf000d196d96544df\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_powerpc.deb\n Size/MD5 checksum: 18440 af6b6e949a6bd999654f4d978bc38811\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-2_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 4578000 97fce93cc2ebc4da7c0a7bab1c157aef\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge4_s390.deb\n Size/MD5 checksum: 4579242 1507d4fa17cf60c0a618a3c1bb47cf88\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 2774574 86262b4b2bb4c6db5471c97dcc1747b4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390-tape_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 991868 a712b00ecf74c79fadeeb0f50b298618\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-2-s390x_2.4.27-2sarge1_s390.deb\n Size/MD5 checksum: 2966354 5ebdd9b9fa80cdbdf0049683eaad24ee\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge4_s390.deb\n Size/MD5 checksum: 2780816 81c27854e61828072cde83feeb6114c2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge4_s390.deb\n Size/MD5 checksum: 995236 29e81e95c729baa1e4068d048160e9f6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge4_s390.deb\n Size/MD5 checksum: 2973100 41c6473b350b47b4652df8c3ec194647\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_s390.deb\n Size/MD5 checksum: 18896 3ad4aed59201a28ee2e9908acbd4a029\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 8328 1e092e0877937ac5dbf46e347992c7d3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 10116 59b85820309273cb2a3d4fb37ad675d1\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 2023482 b50d08e5c4c12fff4473e77babeda1ab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 162670 2c495f6b6e414dc24f2c676ecd84dda4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 164478 f59e33098dec7e1ff68b162aab6d56a6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 201214 fa92988ddfba0e9f03ace13f365dfc77\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 202452 d56ab1dd8ddb9d4b10de13c37c4c4af5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 2024562 fe43768fc817da675a784ecc53a78eb4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 163918 efddcf277ffeb9b83f6cacbcdf6e3f64\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 165746 5ecda633027cae3f0515ff7055371e12\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 202354 1abd15b240f7b7a6c3a2f245b69396b5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 203690 677b6e40982ec286185a02dfbadc2ec7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 3597102 1c5334adb92bbaf0ce96e82abcf6d77e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 3784076 3d1b5e5c3e147bf760c6077fa36eb783\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 6377902 7bd0e77ec9494b0ed352917b829fa5a0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb\n Size/MD5 checksum: 6543220 a73b077777c3a22ca9538666d3ff8aee\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 3603836 aa1f8cf8b8ce570adecc45a2b1d75935\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 3791704 04e3a6d2bf535c163f28fcc75a7d296b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 6383944 b7d97b37f35d18ef38e65407858db330\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge4_sparc.deb\n Size/MD5 checksum: 6549170 84cd3c946a1b3dbe7c8ca248df33b19b\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge4.040815-1_sparc.deb\n Size/MD5 checksum: 17730 3ad6d5b885f7424cfc67c591b695fe89\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 9, "modified": "2006-09-25T00:00:00", "published": "2006-09-25T00:00:00", "id": "DEBIAN:DSA-1183-1:885D0", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00276.html", "title": "[SECURITY] [DSA 1183-1] New Linux 2.4.27 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-11-11T13:24:03", "bulletinFamily": "unix", "cvelist": ["CVE-2004-2302", "CVE-2005-1763", "CVE-2005-3108", "CVE-2005-2801", "CVE-2005-3106", "CVE-2005-3272", "CVE-2005-2872", "CVE-2005-3273", "CVE-2005-2548", "CVE-2005-1762", "CVE-2005-3109", "CVE-2005-0757", "CVE-2005-1765", "CVE-2005-3275", "CVE-2005-3110", "CVE-2005-3107", "CVE-2005-3274", "CVE-2005-1265", "CVE-2005-1761", "CVE-2005-1767", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-3271", "CVE-2005-0756", "CVE-2005-2458", "CVE-2005-3105", "CVE-2005-3276"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 922-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nDecember 14th, 2005 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2004-2302 CVE-2005-0756 CVE-2005-0757 CVE-2005-1265\n CVE-2005-1761 CVE-2005-1762 CVE-2005-1763 CVE-2005-1765\n\t\t CVE-2005-1767 CVE-2005-2456 CVE-2005-2458 CVE-2005-2459\n\t\t CVE-2005-2548 CVE-2005-2801 CVE-2005-2872 CVE-2005-3105\n\t\t CVE-2005-3106 CVE-2005-3107 CVE-2005-3108 CVE-2005-3109\n\t\t CVE-2005-3110 CVE-2005-3271 CVE-2005-3272 CVE-2005-3273\n\t\t CVE-2005-3274 CVE-2005-3275 CVE-2005-3276\nBugTraq IDs : 14477 15527 15528 15533\nDebian Bugs : 309308 311164 321401 322237 322339\n\nSeveral local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilieis and Exposures project\nidentifies the following problems:\n\nCVE-2004-2302\n\n A race condition in the sysfs filesystem allows local users to\n read kernel memory and cause a denial of service (crash).\n\n\nCVE-2005-0756\n\n Alexander Nyberg discovered that the ptrace() system call does not\n properly verify addresses on the amd64 architecture which can be\n exploited by a local attacker to crash the kernel.\n\nCVE-2005-0757\n\n A problem in the offset handling in the xattr file system code for\n ext3 has been discovered that may allow users on 64-bit systems\n that have access to an ext3 filesystem with extended attributes to\n cause the kernel to crash.\n\nCVE-2005-1265\n\n Chris Wright discovered that the mmap() function could create\n illegal memory maps that could be exploited by a local user to\n crash the kernel or potentially execute arbitrary code.\n\nCVE-2005-1761\n\n A vulnerability on the IA-64 architecture can lead local attackers\n to overwrite kernel memory and crash the kernel.\n\nCVE-2005-1762\n\n A vulnerability has been discovered in the ptrace() system call on\n the amd64 architecture that allowas a local attacker to cause the\n kernel to crash.\n\nCVE-2005-1763\n\n A buffer overflow in the ptrace system call for 64-bit\n architectures allows local users to write bytes into arbitrary\n kernel memory.\n\nCVE-2005-1765\n\n Zou Nan Hai has discovered that a local user could cause the\n kernel to hang on the amd64 architecture after invoking syscall()\n with specially crafted arguments.\n\nCVE-2005-1767\n\n A vulnerability has been discovered in the stack segment fault\n handler that could allow a local attacker to cause stack exception\n that will leed the kernel to crash under certain circumstances.\n\nCVE-2005-2456\n\n Balazs Scheidler discovered that a local attacker could call\n setsockopt() with an invalid xfrm_user policy message which would\n cause the kernel to write beyond the boundaries of an array and\n crash.\n\nCVE-2005-2458\n\n Vladimir Volovich discovered a bug in the zlib routines which are\n also present in the Linux kernel and allows remote attackers to\n krash the kernel\n\nCVE-2005-2459\n\n Another vulnerability has been discovered in the zlib routines\n which are also present in the Linux kernel and allows remote\n attackers to crash the kernel\n\nCVE-2005-2548\n\n Peter Sandstrom noticed that snmpwalk from a remote host could\n cause a denial of service (kernel oops from null dereference) via\n certain UDP packets that lead to a function call with the wrong\n argument.\n\nCVE-2005-2801\n\n Andreas Gruenbacher discovered a bug in the ext2 and ext3 file\n systems. When data areas are to be shared among two inodes not\n all information were compared for equality, which could expose\n wrong ACLs for files.\n\nCVE-2005-2872\n\n Chad Walstrom discovered that the ipt_recent kernel module on\n 64-bit processors such as AMD64 ows remote attackers to cause a\n denial of service (kernel panic) via certain attacks such as SSH\n brute force.\n\nCVE-2005-3105\n\n The mprotect code on Itanium IA-64 Montecito processors does not\n properly maintain cache coherency as required by the architecture,\n which allows local users to cause a denial of service and possibly\n corrupt data by modifying PTE protections.\n\nCVE-2005-3106\n\n A race condition in the thread management may allow local users to\n cause a denial of service (deadlock) when threads are sharing\n memory and waiting for a thread that has just performed an exec.\n\nCVE-2005-3107\n\n When one thread is tracing another thread that shares the same\n memory map a local user could cause a denial of service (deadlock)\n by forcing a core dump when the traced thread is in the\n TASK_TRACED state.\n\nCVE-2005-3108\n\n A bug in the ioremap() system call has been discovered on the\n amd65 architecture that could allow local users to cause a\n denial of service or an information leak when performing a lookup\n of a non-existant memory page.\n\nCVE-2005-3109\n\n The HFS and HFS+ (hfsplus) modules allow local attackers to cause\n a denial of service (oops) by using hfsplus to mount a filesystem\n that is not hfsplus.\n\nCVE-2005-3110\n\n A race ondition in the ebtables netfilter module on an SMB system\n running under high load may allow remote attackers to cause a\n denial of service (crash).\n\nCVE-2005-3271\n\n Roland McGrath discovered exec() does not properly clear\n posix-timers in multi-threaded environments, which results in a\n resource leak and could allow a large number of multiple local\n users to cause a denial of service by using more posix-timers than\n specified by the quota for a single user.\n\nCVE-2005-3272\n\n The kernel allows remote attackers to poison the bridge forwarding\n table using frames that have already been dropped by filtering,\n which can cause the bridge to forward spoofed packets.\n\nCVE-2005-3273\n\n The ioctl for the packet radio ROSE protocol does not properly\n verify the arguments when setting a new router, which allows\n attackers to trigger out-of-bounds errors.\n\nCVE-2005-3274\n\n A race condition in on SMP systems allows local users to cause a\n denial of service (null dereference) by causing a connection timer\n to expire while the connection table is being flushed before the\n appropriate lock is acquired.\n\nCVE-2005-3275\n\n An error in the NAT code allows remote attackers to cause a denial\n of service (memory corruption) by causing two packets for the same\n protocol to be NATed at the same time, which leads to memory\n corruption.\n\nCVE-2005-3276\n\n A missing memory cleanup in the thread handling routines before\n copying data into userspace allows a user process to obtain\n sensitive information.\n\nThis update also contains a number of corrections for issues that\nturned out to have no security implication afterwards.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\nSource 2.6.8-16sarge1\nAlpha architecture 2.6.8-16sarge1\nAMD64 architecture 2.6.8-16sarge1\nHP Precision architecture 2.6.8-6sarge1\nIntel IA-32 architecture 2.6.8-16sarge1\nIntel IA-64 architecture 2.6.8-14sarge1\nMotorola 680x0 architecture 2.6.8-4sarge1\nPowerPC architecture 2.6.8-12sarge1\nIBM S/390 architecture 2.6.8-5sarge1\nSun Sparc architecture 2.6.8-15sarge1\n\nWe recommend that you upgrade your kernel package immediately and\nreboot the machine.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc\n Size/MD5 checksum: 1001 84ee501faac6cc5966fea3326bc5f6f0\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz\n Size/MD5 checksum: 961237 cd72f4d2eb2309a2d77d2ec7a3471c7c\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz\n Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc\n Size/MD5 checksum: 812 9b010ed11a18ae7a63ca1c0d9ce6b520\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz\n Size/MD5 checksum: 37158 c1e462dc0aceed47aeba4788de1ef813\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc\n Size/MD5 checksum: 1097 19abba41030b997320056d4006afaec3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz\n Size/MD5 checksum: 73962 73afecb44cda1a833afae9ade8592ae6\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge1.dsc\n Size/MD5 checksum: 1008 f8913a5c70c8e6db41ba33582aa1eedd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge1.tar.gz\n Size/MD5 checksum: 65779 f6d20923c5a468b8c396f396d3f54468\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc\n Size/MD5 checksum: 1047 8f17db00dbe1e0cfe9959e0ede3abad7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz\n Size/MD5 checksum: 88795 b5551e3a6f67218c2a37514b8662e4b7\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc\n Size/MD5 checksum: 1191 1450b82c0ebd64a2f89e5b39b6fba66f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz\n Size/MD5 checksum: 62501 04ce7a79112bf21d7732b362bf2f2a8c\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge1.dsc\n Size/MD5 checksum: 874 cc02a1965a5236b0b56418924aeca2b2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge1.tar.gz\n Size/MD5 checksum: 14227 fc0f38314b443bc4375a230622c69bed\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc\n Size/MD5 checksum: 1026 628e05a33d5383d644c40c44b5a262a8\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz\n Size/MD5 checksum: 24891 c099d3dc524bff486e3ac3aaed728baf\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc\n Size/MD5 checksum: 833 0ca25fa6cf5060acbd7f86ee78b10fcb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz\n Size/MD5 checksum: 11363 cc5f02d8a1cc1c93edfd229bdcc9cb53\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge1.dsc\n Size/MD5 checksum: 1036 28ddac5872f5c07438473aa97b0babb0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge1.tar.gz\n Size/MD5 checksum: 22734 5a9d2e75078588a6f94918aebc25e89b\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb\n Size/MD5 checksum: 6179472 b7388d2256a4396d2da938a687b3ab9b\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb\n Size/MD5 checksum: 1007230 309f32838373e76c9b61be0e6c191252\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb\n Size/MD5 checksum: 34934446 65dca34768d7aa10074845d9b2f20431\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb\n Size/MD5 checksum: 32120 5b04fd03ede3ae235a03624dc53e2026\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb\n Size/MD5 checksum: 9182 04e70fd86504e721ad91a2b3352231d2\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 4972 9373407fba3ac5dd750058711dbaba35\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5040 0e0546f2897a3a4e70efe7a564fb6aff\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5002 ec64c94170f496062172d743aee4442a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5068 bf99db45889934b45ce4834b9c770b16\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 4972 db66d54714fc6042db69d30918c51b02\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5040 7712bc3701d2548903dd5b9337ab3b91\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 4994 6621e8ce1be6e3f4a8b41991d834b144\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 5064 d0f9af9891bd728a119763fddc6d3394\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3304098 c9e4aeaa7b178b3396e8784dab38cc00\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3097378 d1f63a282acbc6b3f6891617b9350fae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3010318 9b541a162fc8d966abf43c2a9fdce4d8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 2983934 73a518deadceae9ea5ee730fbaae8c61\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3171548 0c9ffc6fe6914da804987a43cd74e9f7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 2975620 b1bc12e308b7abf81ae7878680f17617\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3044876 d578ffdb0e11b61cb6446d599b160560\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 3102300 9936cab2275643f32728c4f6d4dc77ad\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge1_m68k.deb\n Size/MD5 checksum: 2988830 fa46326fc2398c39d044bda9120dbea0\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 5083010 42c4dd8c6c67ce7940f0d24bb745385c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 2973758 c8d12dd2fbddca3ab1b7bd905de4a90c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 1140118 328edfc2944127e2f1d6dca1842ce51d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 3179326 487c36323990a6ae1119f4c30f16cdd9\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 7, "modified": "2005-12-14T00:00:00", "published": "2005-12-14T00:00:00", "id": "DEBIAN:DSA-922-1:C3994", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00323.html", "title": "[SECURITY] [DSA 922-1] New Linux 2.6.8 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:24:13", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3745", "CVE-2005-4798", "CVE-2006-1343", "CVE-2006-4093", "CVE-2006-1855", "CVE-2006-2444", "CVE-2006-2446", "CVE-2006-2935", "CVE-2006-4535", "CVE-2006-1052", "CVE-2006-1528", "CVE-2006-4145", "CVE-2006-1856", "CVE-2006-3468", "CVE-2006-2936", "CVE-2004-2660"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1184-2 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier\nSeptember 26th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.6.8\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2004-2660 CVE-2005-4798 CVE-2006-1052 CVE-2006-1343\n CVE-2006-1528 CVE-2006-1855 CVE-2006-1856 CVE-2006-2444\n CVE-2006-2446 CVE-2006-2935 CVE-2006-2936 CVE-2006-3468\n CVE-2006-3745 CVE-2006-4093 CVE-2006-4145 CVE-2006-4535\nCERT advisory : VU#681569\nBugTraq IDs : 17203 17830 18081 18099 18101 18105 18847 19033 19396\n 19562 19615 19666 20087\n\nThis advisory covers the S/390 components of the recent security\nupdate for the Linux 2.6.8 kernel that was missing due to technical\nproblems. For reference below please see the original advisory text.\n\nSeveral security related problems have been discovered in the Linux\nkernel which may lead to a denial of service or even the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2004-2660\n\n Toshihiro Iwamoto discovered a memory leak in the handling of\n direct I/O writes that allows local users to cause a denial of\n service.\n\nCVE-2005-4798\n\n A buffer overflow in NFS readlink handling allows a malicious\n remote server to cause a denial of service.\n\nCVE-2006-1052\n\n Stephen Smalley discovered a bug in the SELinux ptrace handling\n that allows local users with ptrace permissions to change the\n tracer SID to the SID of another process.\n\nCVE-2006-1343\n\n Pavel Kankovsky discovered an information leak in the getsockopt\n system call which can be exploited by a local program to leak\n potentially sensitive memory to userspace.\n\nCVE-2006-1528\n\n Douglas Gilbert reported a bug in the sg driver that allows local\n users to cause a denial of service by performing direct I/O\n transfers from the sg driver to memory mapped I/O space.\n\nCVE-2006-1855\n\n Mattia Belletti noticed that certain debugging code left in the\n process management code could be exploited by a local attacker to\n cause a denial of service.\n\nCVE-2006-1856\n\n Kostik Belousov discovered a missing LSM file_permission check in\n the readv and writev functions which might allow attackers to\n bypass intended access restrictions.\n\nCVE-2006-2444\n\n Patrick McHardy discovered a bug in the SNMP NAT helper that\n allows remote attackers to cause a denial of service.\n\nCVE-2006-2446\n\n A race condition in the socket buffer handling allows remote\n attackers to cause a denial of service.\n\nCVE-2006-2935\n\n Diego Calleja Garcia discovered a buffer overflow in the DVD\n handling code that could be exploited by a specially crafted DVD\n or USB storage device to execute arbitrary code.\n\nCVE-2006-2936\n\n A bug in the serial USB driver has been discovered that could be\n exploited by a custom made USB serial adapter to consume arbitrary\n amounts of memory.\n\nCVE-2006-3468\n\n James McKenzie discovered a denial of service vulnerability in the\n NFS driver. When exporting an ext3 file system over NFS, a remote\n attacker could exploit this to trigger a file system panic by\n sending a specially crafted UDP packet.\n\nCVE-2006-3745\n\n Wei Wang discovered a bug in the SCTP implementation that allows\n local users to cause a denial of service and possibly gain root\n privileges.\n\nCVE-2006-4093\n\n Olof Johansson discovered that the kernel did not disable the HID0\n bit on PowerPC 970 processors which could be exploited by a local\n attacker to cause a denial of service.\n\nCVE-2006-4145\n\n A bug in the Universal Disk Format (UDF) filesystem driver could\n be exploited by a local user to cause a denial of service.\n\nCVE-2006-4535\n\n David Miller reported a problem with the fix for CVE-2006-3745\n that allows local users to crash the system using via an SCTP\n socket with a certain SO_LINGER value.\n\n\nThe following matrix explains which kernel version for which\narchitecture fixes the problem mentioned above:\n\n stable (sarge)\n Source 2.6.8-16sarge5\n Alpha architecture 2.6.8-16sarge5\n AMD64 architecture 2.6.8-16sarge5\n HP Precision architecture 2.6.8-6sarge5\n Intel IA-32 architecture 2.6.8-16sarge5\n Intel IA-64 architecture 2.6.8-14sarge5\n Motorola 680x0 architecture 2.6.8-4sarge5\n PowerPC architecture 2.6.8-12sarge5\n IBM S/390 2.6.8-5sarge5\n Sun Sparc architecture 2.6.8-15sarge5\n FAI 1.9.1sarge4\n\nDue to some internal problems kernel packages for the S/390 are\nmissing and will be provided later.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.6.18-1.\n\nWe recommend that you upgrade your kernel package and reboot the\nmachine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge5.dsc\n Size/MD5 checksum: 846 1bcc93834f3d4ae2a83731ba2dab444c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge5.tar.gz\n Size/MD5 checksum: 13994 feb0f938746f52cf80597ef8ff5691fc\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge5_all.deb\n Size/MD5 checksum: 12084 ab2e51bb8bbbbfcc392b725f955f96c0\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge5_s390.deb\n Size/MD5 checksum: 5087410 92c4b60e889e92f05f30214020b50955\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge5_s390.deb\n Size/MD5 checksum: 2981914 f71d20cba548768ee4e44ffe28be947d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge5_s390.deb\n Size/MD5 checksum: 1144574 7e3ae52a9d115cdca1c79d3946cd4e6c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge5_s390.deb\n Size/MD5 checksum: 3189746 f1bd52a536ae5a13427c8b935bd81434\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 7, "modified": "2006-09-26T00:00:00", "published": "2006-09-26T00:00:00", "id": "DEBIAN:DSA-1184-2:E2806", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00278.html", "title": "[SECURITY] [DSA 1184-2] New Linux 2.6.8 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-30T02:23:07", "bulletinFamily": "unix", "cvelist": ["CVE-2006-3745", "CVE-2005-4798", "CVE-2006-1343", "CVE-2006-4093", "CVE-2006-1855", "CVE-2006-2444", "CVE-2006-2446", "CVE-2006-2935", "CVE-2006-4535", "CVE-2006-1052", "CVE-2006-1528", "CVE-2006-4145", "CVE-2006-1856", "CVE-2006-3468", "CVE-2006-2936", "CVE-2004-2660"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1184-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier\nSeptember 25th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.6.8\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE IDs : CVE-2004-2660 CVE-2005-4798 CVE-2006-1052 CVE-2006-1343\n CVE-2006-1528 CVE-2006-1855 CVE-2006-1856 CVE-2006-2444\n CVE-2006-2446 CVE-2006-2935 CVE-2006-2936 CVE-2006-3468\n CVE-2006-3745 CVE-2006-4093 CVE-2006-4145 CVE-2006-4535\nCERT advisory : VU#681569\nBugTraq IDs : 17203 17830 18081 18099 18101 18105 18847 19033 19396\n 19562 19615 19666 20087\n\nSeveral security related problems have been discovered in the Linux\nkernel which may lead to a denial of service or even the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2004-2660\n\n Toshihiro Iwamoto discovered a memory leak in the handling of\n direct I/O writes that allows local users to cause a denial of\n service.\n\nCVE-2005-4798\n\n A buffer overflow in NFS readlink handling allows a malicious\n remote server to cause a denial of service.\n\nCVE-2006-1052\n\n Stephen Smalley discovered a bug in the SELinux ptrace handling\n that allows local users with ptrace permissions to change the\n tracer SID to the SID of another process.\n\nCVE-2006-1343\n\n Pavel Kankovsky discovered an information leak in the getsockopt\n system call which can be exploited by a local program to leak\n potentially sensitive memory to userspace.\n\nCVE-2006-1528\n\n Douglas Gilbert reported a bug in the sg driver that allows local\n users to cause a denial of service by performing direct I/O\n transfers from the sg driver to memory mapped I/O space.\n\nCVE-2006-1855\n\n Mattia Belletti noticed that certain debugging code left in the\n process management code could be exploited by a local attacker to\n cause a denial of service.\n\nCVE-2006-1856\n\n Kostik Belousov discovered a missing LSM file_permission check in\n the readv and writev functions which might allow attackers to\n bypass intended access restrictions.\n\nCVE-2006-2444\n\n Patrick McHardy discovered a bug in the SNMP NAT helper that\n allows remote attackers to cause a denial of service.\n\nCVE-2006-2446\n\n A race condition in the socket buffer handling allows remote\n attackers to cause a denial of service.\n\nCVE-2006-2935\n\n Diego Calleja Garcia discovered a buffer overflow in the DVD\n handling code that could be exploited by a specially crafted DVD\n or USB storage device to execute arbitrary code.\n\nCVE-2006-2936\n\n A bug in the serial USB driver has been discovered that could be\n exploited by a custom made USB serial adapter to consume arbitrary\n amounts of memory.\n\nCVE-2006-3468\n\n James McKenzie discovered a denial of service vulnerability in the\n NFS driver. When exporting an ext3 file system over NFS, a remote\n attacker could exploit this to trigger a file system panic by\n sending a specially crafted UDP packet.\n\nCVE-2006-3745\n\n Wei Wang discovered a bug in the SCTP implementation that allows\n local users to cause a denial of service and possibly gain root\n privileges.\n\nCVE-2006-4093\n\n Olof Johansson discovered that the kernel did not disable the HID0\n bit on PowerPC 970 processors which could be exploited by a local\n attacker to cause a denial of service.\n\nCVE-2006-4145\n\n A bug in the Universal Disk Format (UDF) filesystem driver could\n be exploited by a local user to cause a denial of service.\n\nCVE-2006-4535\n\n David Miller reported a problem with the fix for CVE-2006-3745\n that allows local users to crash the system using via an SCTP\n socket with a certain SO_LINGER value.\n\n\nThe following matrix explains which kernel version for which\narchitecture fixes the problem mentioned above:\n\n stable (sarge)\n Source 2.6.8-16sarge5\n Alpha architecture 2.6.8-16sarge5\n AMD64 architecture 2.6.8-16sarge5\n HP Precision architecture 2.6.8-6sarge5\n Intel IA-32 architecture 2.6.8-16sarge5\n Intel IA-64 architecture 2.6.8-14sarge5\n Motorola 680x0 architecture 2.6.8-4sarge5\n PowerPC architecture 2.6.8-12sarge5\n IBM S/390 2.6.8-5sarge5\n Sun Sparc architecture 2.6.8-15sarge5\n FAI 1.9.1sarge4\n\nDue to some internal problems kernel packages for the S/390 are\nmissing and will be provided later.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.6.18-1.\n\nWe recommend that you upgrade your kernel package and reboot the\nmachine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge5.dsc\n Size/MD5 checksum: 812 b693fc8bbad53791662bf9c658883653\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge5.tar.gz\n Size/MD5 checksum: 40132 35e177d76bce7e3734e26ba3920412c4\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge5.dsc\n Size/MD5 checksum: 1103 3babaf0fab68f89b89bbe32b4eb5cc86\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge5.tar.gz\n Size/MD5 checksum: 77603 8a44e1f45213ef3a263b5f4934885cee\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge5.dsc\n Size/MD5 checksum: 1008 d8d58bc88487d599fd9479e68c72268c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge5.tar.gz\n Size/MD5 checksum: 68554 a69d4a4cd584136ab90b331de132264d\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge5.dsc\n Size/MD5 checksum: 1047 108b890101a8cbe3a4cba4330775dddc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge5.tar.gz\n Size/MD5 checksum: 91797 0a1f8d61b3b360a899f311506a5ed479\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge5.dsc\n Size/MD5 checksum: 1191 b0603843539a0a75ccb286f2ace930c7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge5.tar.gz\n Size/MD5 checksum: 65230 bad61e9854bff8ec53156d31839ee147\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge5.dsc\n Size/MD5 checksum: 874 5a64d7ec2a16eeddbecb943b563a00e1\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge5.tar.gz\n Size/MD5 checksum: 18371 31002e1be5f792aaa5a8e3b85b85663e\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge5.dsc\n Size/MD5 checksum: 1036 765f929fe270cadfdde4411f2dcdce9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge5.tar.gz\n Size/MD5 checksum: 27915 ecdad48fe56a34c5912417d96c456ecd\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge5.dsc\n Size/MD5 checksum: 1072 fa7d3a7c2190d2d9c2d2e0010f37d055\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge5.tar.gz\n Size/MD5 checksum: 27874 1e9e1b1fa66ed32cddfddc13f567cce9\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5.dsc\n Size/MD5 checksum: 1002 ccd454121194183d44b49916c25c6480\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5.diff.gz\n Size/MD5 checksum: 1057522 6d623f68b9f4558b0e453f17c1129b34\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz\n Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.dsc\n Size/MD5 checksum: 621 91dc07d5678dc04fa77ee3f082e042c8\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4.tar.gz\n Size/MD5 checksum: 28939 8308d8932bf9aea671d3644975c7dda2\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge5_all.deb\n Size/MD5 checksum: 6190814 ff156b96da5b482d2c279858377162ae\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge5_all.deb\n Size/MD5 checksum: 1103964 b81e9832dfd7f8489a9aed122493a640\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge5_all.deb\n Size/MD5 checksum: 34943256 8b10f7c83c981cc311e68c61b5d8ad87\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge5_all.deb\n Size/MD5 checksum: 36142 dad58738d77db061e566e2212047b1cb\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge5_alpha.deb\n Size/MD5 checksum: 2761050 9d86fcd3e98d5ace83075d80a02ce729\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge5_alpha.deb\n Size/MD5 checksum: 233202 e922e9573a48d6dd5f46833bf6f029b7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge5_alpha.deb\n Size/MD5 checksum: 228180 ab00a15f66b44efbb1c3737ab9dcce89\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge5_alpha.deb\n Size/MD5 checksum: 20232948 80af39fd4ba73bfbd29da9f57c4d5dba\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge5_alpha.deb\n Size/MD5 checksum: 20090338 a73fdf837233ca593e5d1b853227751d\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 2723802 639f7076be8f340d8e005815d5ca6640\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 227250 a39a03866acc6c318a16bbb25213a322\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 226276 ff591e5d5ad1e6bf2ec320cd0516c238\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 222420 ce42d0ccc255c240e16d29cd21a4d2e8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 224178 cd7218fb598b6ac4d58fcee42c7b60e6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 220764 d0a50d034e989c60ee351533244f9a71\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 12569560 d809f930a0b51a0d26f095444a2b3e69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 13266594 5fd0aad813cf4bc8de8c696e19a8a764\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 13228726 26e93dbdc9d1742912fdf1f7869755db\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 13073122 ca9e7b8095060f012e0ca8272dc1bdc3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_amd64.deb\n Size/MD5 checksum: 13050722 7d076b5f5b577b96c64728b27c86ea17\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 2803540 cb1f020f91b4f2974f3c023ec977a674\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 212636 2adf00a3f1623f6a6d0f5c41b9e8a142\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 211998 d4353bc65e679d48d75591338d24f499\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 211516 c16b01ba0c4ccfbb560c5aa150f128f5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 210996 7d1ea9036e5c5e250d8a779d7bc5a5d2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 16035106 63a000baa3c5accde72fc52c52c7e8ea\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 16940902 9eb05566a4efd13f4dcdfc35300d1b62\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 17487200 3c3df7721c30bcb9120da11ec0e05508\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge5_hppa.deb\n Size/MD5 checksum: 18317352 cc62eb70d336e643e89b98a56f192219\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 2723796 4417c8fbc0a5fc8c57f44b3224333c73\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 227238 ce873c665e873e0e64eb0326ee759044\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 226282 0e40b1f1483cec93a07277b91648e1ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 222382 4b01f2e5d84ab049b4775bbe00e96c30\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 224170 7996b833450f8a189094abbb7a16a456\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 220744 668f08d37f554035097bf12f3e0aa7f5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 12570136 c47c0307b74ff3ad96e428f072ddc21c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 13268342 aa7178f0eba544ecb5eb09daa8fa4464\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 13228902 61cb755d2fefbee646f59cb8b067d180\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 13227150 7d4e7cc50ee13c04cea3676578a8d5eb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 13202148 c986a7533859313f32a16107e4cc48fa\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 2780616 88c40c053096833cee36f9e0d2fd2a37\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 259552 a6516c9058aadfbcf924c9fba2092ffe\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 257412 5c464a4529417364dc7a9b0f900bbf90\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 254580 a037ecae10f6459f542966e042895452\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 257586 34e1f86815969d0622214cf91e214ea1\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 254796 ac9cb9744cb60dd5038aca92254a8499\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 14066300 7ded56e75941f998756b3f6711c4021e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 15549728 b0648b5e62974dd803214b7633b468b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 15384062 6cbcc15f94b986b2ece57101db195fbc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 15271760 98db653b59db10b9126600d9408c00ca\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge5_i386.deb\n Size/MD5 checksum: 15162058 25f84f36f5583bc65f7996c17ac27bfb\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge4_i386.deb\n Size/MD5 checksum: 12000944 db0b06c129d5906ee5a5573415d1f352\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 7790 441986d03a7ecac076921a2dc204dde5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 7862 1b609adbf938b585c6375158a0f938ec\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 7822 4f5c9899b996ad86bb384899c900875e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 7892 32dae7eeac53f9828b9209f88e46f350\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 3100286 0d50f6db944de51b032e1a558b65989b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 201372 2d9bce2e35bb6400d5d80057b7f45898\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 201182 01f5d1d5d4fe0986aac04973725f70ab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 201162 1440ce8f6781a08ce1648925cb35e34d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 200724 8cb4f893d1c76828e22f642a35039c6f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 7786 2ae8d5d742deec64baaecd1b95c41f2f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 7850 75c09ccecc2fbfd1367e9b2375eb3aa2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 7818 4243fb7dc34f99cefd673bb3cee6a47d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 7884 6eb5b2f29bb67004a043abe8651fe1a4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 21486196 30e43a7b123a1c1cb04a2669138b525b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 22141992 cef3005a14538dc6cc756a478897f080\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 21414114 8e0689d56a8ffff7b24120fcdc563b4d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge5_ia64.deb\n Size/MD5 checksum: 22159010 ab8b47e398096642e3d77f88fa7afa48\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 3306528 1fcf6d780313788df48c6effd284afa4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 3104468 f549bdc0c4425dbf2e4754c71f337681\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 3016322 4265aaca4ba1d14344da0ab7e389b057\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 2988544 a33d9385ec84d450e2cfd8b7c096d877\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 3175518 768425faa8c9fd6a576b72be587509a3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 2980276 79b41b28f663e562d8178edff85ff308\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 3050078 a0ec5ab5ef0a2974b2a53cdd3e96ea72\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 3110846 4d1977a0d5beb7743e19a97d01319233\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge5_m68k.deb\n Size/MD5 checksum: 2995694 2f49e2b7d119fdff8ec195ac6e9f619a\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 408454 3e43c58ba6b0c1738e8e07121f5186c3\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 408416 99ef4e1c8ac0e2204d5f267b9caa324b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 407746 85a0f87adab8eb919165211fb214d996\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 407666 cbf0d53d33c920c369c7716efc61fcb1\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 407996 4470cf088d76a24982a4fa705b0956f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 407812 e5cb49fc122ef93c3b568630c53ba13d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 5149114 cf66501fd8f1e1e4e98c44fbe60ce62b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 13586572 accb6b5d125e19467b801525e2479e7f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 13938498 ef41199d6ad8d30614c8cf12db99ff93\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 13570412 f522d52c8098621be06b4bb9d3c31f8f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 13927512 ffc2d49a03a912816a21036f7221d6dc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 13602626 8288b7056a059275070ddb6eabcea52b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge5_powerpc.deb\n Size/MD5 checksum: 13859172 192bd75b60329cf4ea3f51c244216728\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge5_sparc.deb\n Size/MD5 checksum: 6358 4205daad6d320287142995acd7e065e5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge5_sparc.deb\n Size/MD5 checksum: 2891752 d2e8787c5d659372c3859316b7af9ebe\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge5_sparc.deb\n Size/MD5 checksum: 111256 8fd0a9dad476d362c71906cafe1e8bda\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge5_sparc.deb\n Size/MD5 checksum: 146126 895ba69ef78dd93b423b132d077fc8b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge5_sparc.deb\n Size/MD5 checksum: 146650 84095db294e9d0d22198415e9efd3928\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge5_sparc.deb\n Size/MD5 checksum: 4555508 24ca6b4ffef8dcfe36a19e20671f177c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge5_sparc.deb\n Size/MD5 checksum: 7434812 8386ec5b36e60a6fb11c90c2dd75c1e3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge5_sparc.deb\n Size/MD5 checksum: 7637248 ca48b2ebaf5357162c16f3ae21f32624\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "edition": 2, "modified": "2006-09-25T00:00:00", "published": "2006-09-25T00:00:00", "id": "DEBIAN:DSA-1184-1:BA0C5", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00277.html", "title": "[SECURITY] [DSA 1184-1] New Linux 2.6.8 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "cvelist": ["CVE-2004-2302", "CVE-2005-2457", "CVE-2005-3181", "CVE-2005-2801", "CVE-2004-1333", "CVE-2005-2872", "CVE-2005-3273", "CVE-2005-2548", "CVE-2005-0180", "CVE-2005-2873", "CVE-2005-2490", "CVE-2005-3275", "CVE-2005-1589", "CVE-2005-3274", "CVE-2005-3053", "CVE-2005-3044", "CVE-2005-3257", "CVE-2005-0210", "CVE-2005-2800", "CVE-2005-3180", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-3055", "CVE-2005-3271", "CVE-2005-2458", "CVE-2005-2555", "CVE-2005-3276"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:219\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : November 30, 2005\r\n Affected: 10.1\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n An integer overflow in vc_resize (CAN-2004-1333).\r\n \r\n A race condition in the sysfs_read_file and sysfs_write_file functions\r\n in 2.6.10 and earlier allows local users to read kernel memory and\r\n cause a DoS (crash) via large offsets in sysfs files (CAN-2004-2302).\r\n \r\n An integer signedness error in scsi_ioctl.c (CVE-2005-0180).\r\n \r\n Netfilter allows a local user to cause a DoS (memory consumption) via\r\n certain packet fragments that are reassembled twice, which causes a\r\n data structure to be allocated twice (CVE-2005-0210).\r\n \r\n A DoS in pkt_ioctl in pktcdvc.c (CVE-2005-1589).\r\n \r\n An array index overflow in the xfrm_sk_policy_insert function in\r\n xfrm_user.c allows local users to cause a DoS (oops or deadlock) and\r\n possibly execute arbitrary code (CVE-2005-2456).\r\n \r\n The zisofs driver in versions prior to 2.6.12.5 allows local users and\r\n remove attackers to cause a DoS (crash) via a crafted compressed ISO\r\n filesystem (CVE-2005-2457).\r\n \r\n inflate.c in the zlib routines in versions prior to 2.6.12.5 allow\r\n remove attackers to cause a DoS (crash) via a compressed file with\r\n "improper tables" (CVE-2005-2458).\r\n \r\n The huft_build function in inflate.c in the zlib routines in versions\r\n prior to 2.6.12.5 returns the wrong value, allowing remote attackers to\r\n cause a DoS (crash) via a certain compressed file that leads to a null\r\n pointer dereference (CVE-2005-2459).\r\n \r\n A stack-based buffer overflow in the sendmsg function call in versions\r\n prior to 2.6.13.1 allow local users to execute arbitrary code by\r\n calling sendmsg and modifying the message contents in another thread\r\n (CVE-2005-2490).\r\n \r\n vlan_dev.c in version 2.6.8 allows remote attackers to cause a DoS\r\n (oops from null dereference) via certain UDP packets that lead to\r\n a function call with the wrong argument (CVE-2005-2548).\r\n \r\n The kernel does not properly restrict socket policy access to users\r\n with the CAP_NET_ADMIN capability, which could allow local users to\r\n conduct unauthorized activities via ipv4/ip_sockglue.c and\r\n ipv6/ipv6_sockglue.c (CVE-2005-2555).\r\n \r\n A memory leak in the seq_file implementation in the SCSI procfs\r\n interface (sg.c) in 2.6.13 and earlier allows a local user to cause a\r\n DoS (memory consumption) via certain repeated reads from\r\n /proc/scsi/gs/devices file which is not properly handled when the\r\n next() interator returns NULL or an error (CVE-2005-2800).\r\n \r\n xattr.c in the ext2 and ext3 file system code does not properly compare\r\n the name_index fields when sharing xattr blocks which could prevent\r\n ACLs from being applied (CVE-2005-2801).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 when running on 64bit\r\n processors allows remote attackers to cause a DoS (kernel panic) via\r\n certain attacks such as SSH brute force (CVE-2005-2872).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 does not properly\r\n perform certain tests when the jiffies value is greater than LONG_MAX,\r\n which can cause ipt_recent netfilter rules to block too early\r\n (CVE-2005-2873).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n The sys_set_mempolicy function in mempolicy.c allows local users to\r\n cause a DoS via a negative first argument (CVE-2005-3053).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n Exec does not properly clear posix-timers in multi-threaded\r\n environments, which result in a resource leak and could allow a large\r\n number of multiple local users to cause a DoS by using more posix-\r\n timers than specified by the quota for a single user (CVE-2005-3271).\r\n \r\n The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\r\n does not properly verify the ndigis argument for a new route, allowing\r\n an attacker to trigger array out-of-bounds errors with a large number\r\n of digipeats (CVE-2005-3273).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The NAT code in versions prior to 2.6.13 incorrectly declares a\r\n variable to be static, allowing remote attackers to cause a DoS (memory\r\n corruption) by causing two packets for the same protocol to be NATed at\r\n the same time (CVE-2005-3275).\r\n \r\n The sys_get_thread_area function in process.c in versions prior to\r\n 2.6.12.4 and 2.6.13 does not clear a data structure before copying it\r\n to userspace, which may allow a user process to obtain sensitive\r\n information (CVE-2005-3276).\r\n \r\n The following non-security fixes are also applied:\r\n \r\n Driver updates were made to the aic97xx and sata_sil modules.\r\n \r\n Support was added for ATI ipx400 chipsets, for IDE and sound.\r\n \r\n A build problem with icecream on the x86_64 platform was fixed.\r\n \r\n The pin1 APIC timer on RS480-based motherboards was disabled.\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1589\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2548\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2801\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3053\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3271\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 10.1:\r\n cc60a0c2a5c0425db63a625526475898 10.1/RPMS/kernel-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n 9c85d79e18e3dec0bd80605ab4ed7bc6 10.1/RPMS/kernel-enterprise-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n 619c620342e4786903ad174827a78982 10.1/RPMS/kernel-i586-up-1GB-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n bdfc653a5ca1e456d3c15c2f8f35d98d 10.1/RPMS/kernel-i686-up-64GB-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n a9241f9cd330bc79360f0dda4fa1eec5 10.1/RPMS/kernel-secure-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n 29bbd09a962d59cd92e60ab644439b6f 10.1/RPMS/kernel-smp-2.6.8.1.26mdk-1-1mdk.i586.rpm\r\n cae06806ff7412caa156fcea3d86c78f 10.1/RPMS/kernel-source-2.6-2.6.8.1-26mdk.i586.rpm\r\n 34122459890fa39f27a81cec4c3e56e6 10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-26mdk.i586.rpm\r\n 104478404575b1903f8ca961a0e68a21 10.1/SRPMS/kernel-2.6.8.1.26mdk-1-1mdk.src.rpm\r\n\r\n Mandriva Linux 10.1/X86_64:\r\n d8d56fcbe9daa46d35e80aa61ba6a6ce x86_64/10.1/RPMS/kernel-2.6.8.1.26mdk-1-1mdk.x86_64.rpm\r\n f784c422b1f5874e6456d8fc3eeb2449 x86_64/10.1/RPMS/kernel-secure-2.6.8.1.26mdk-1-1mdk.x86_64.rpm\r\n 1566275e89bb4087535f9de77157a5b6 x86_64/10.1/RPMS/kernel-smp-2.6.8.1.26mdk-1-1mdk.x86_64.rpm\r\n d30568e225088db18fe1bc72fc108ea9 x86_64/10.1/RPMS/kernel-source-2.6-2.6.8.1-26mdk.x86_64.rpm\r\n e1b2c9cf2feb58611eb7d48d8216bb45 x86_64/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-26mdk.x86_64.rpm\r\n 104478404575b1903f8ca961a0e68a21 x86_64/10.1/SRPMS/kernel-2.6.8.1.26mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDjffWmqjQ0CJFipgRAqT9AKCj6LQEho3qcisjiq7+8ongRHGzJACg5Cuy\r\nMD+4kCb7IPC636s6mwpEITY=\r\n=TuUh\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2005-12-01T00:00:00", "published": "2005-12-01T00:00:00", "id": "SECURITYVULNS:DOC:10473", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10473", "title": "MDKSA-2005:219 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "cvelist": ["CVE-2005-2801", "CVE-2005-2490", "CVE-2005-2800", "CVE-2005-2492", "CVE-2005-2802", "CVE-2005-1913"], "description": "===========================================================\r\nUbuntu Security Notice USN-178-1 September 09, 2005\r\nlinux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities\r\nCAN-2005-1913, CAN-2005-2490, CAN-2005-2492, CAN-2005-2800,\r\nCAN-2005-2801, CAN-2005-2802\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 4.10 (Warty Warthog)\r\nUbuntu 5.04 (Hoary Hedgehog)\r\n\r\nThe following packages are affected:\r\n\r\nlinux-image-2.6.10-5-386\r\nlinux-image-2.6.10-5-686\r\nlinux-image-2.6.10-5-686-smp\r\nlinux-image-2.6.10-5-amd64-generic\r\nlinux-image-2.6.10-5-amd64-k8\r\nlinux-image-2.6.10-5-amd64-k8-smp\r\nlinux-image-2.6.10-5-amd64-xeon\r\nlinux-image-2.6.10-5-itanium\r\nlinux-image-2.6.10-5-itanium-smp\r\nlinux-image-2.6.10-5-k7\r\nlinux-image-2.6.10-5-k7-smp\r\nlinux-image-2.6.10-5-mckinley\r\nlinux-image-2.6.10-5-mckinley-smp\r\nlinux-image-2.6.10-5-power3\r\nlinux-image-2.6.10-5-power3-smp\r\nlinux-image-2.6.10-5-power4\r\nlinux-image-2.6.10-5-power4-smp\r\nlinux-image-2.6.10-5-powerpc\r\nlinux-image-2.6.10-5-powerpc-smp\r\nlinux-image-2.6.8.1-5-386\r\nlinux-image-2.6.8.1-5-686\r\nlinux-image-2.6.8.1-5-686-smp\r\nlinux-image-2.6.8.1-5-amd64-generic\r\nlinux-image-2.6.8.1-5-amd64-k8\r\nlinux-image-2.6.8.1-5-amd64-k8-smp\r\nlinux-image-2.6.8.1-5-amd64-xeon\r\nlinux-image-2.6.8.1-5-k7\r\nlinux-image-2.6.8.1-5-k7-smp\r\nlinux-image-2.6.8.1-5-power3\r\nlinux-image-2.6.8.1-5-power3-smp\r\nlinux-image-2.6.8.1-5-power4\r\nlinux-image-2.6.8.1-5-power4-smp\r\nlinux-image-2.6.8.1-5-powerpc\r\nlinux-image-2.6.8.1-5-powerpc-smp\r\nlinux-patch-debian-2.6.8.1\r\nlinux-patch-ubuntu-2.6.10\r\n\r\nThe problem can be corrected by upgrading the affected package to\r\nversion 2.6.8.1-16.22 (for Ubuntu 4.10), or 2.6.10-34.5 (for Ubuntu\r\n5.04). After a standard system upgrade you need to reboot your\r\ncomputer to effect the necessary changes.\r\n\r\nDetails follow:\r\n\r\nOleg Nesterov discovered a local Denial of Service vulnerability in\r\nthe timer handling. When a non group-leader thread called exec() to\r\nexecute a different program while an itimer was pending, the timer\r\nexpiry would signal the old group leader task, which did not exist any\r\nmore. This caused a kernel panic. This vulnerability only affects\r\nUbuntu 5.04. (CAN-2005-1913)\r\n\r\nAl Viro discovered that the sendmsg() function did not sufficiently\r\nvalidate its input data. By calling sendmsg() and at the same time\r\nmodifying the passed message in another thread, he could exploit this\r\nto execute arbitrary commands with kernel privileges. This only\r\naffects the amd64 bit platform. (CAN-2005-2490)\r\n\r\nAl Viro discovered a vulnerability in the raw_sendmsg() function. By\r\ncalling this function with specially crafted arguments, a local\r\nattacker could either read kernel memory contents (leading to\r\ninformation disclosure) or manipulate the hardware state by reading\r\ncertain IO ports. This vulnerability only affects Ubuntu 5.04.\r\n(CAN-2005-2492)\r\n\r\nJan Blunck discovered a Denial of Service vulnerability in the procfs\r\ninterface of the SCSI driver. By repeatedly reading\r\n/proc/scsi/sg/devices, a local attacker could eventually exhaust\r\nkernel memory. (CAN-2005-2800)\r\n\r\nA flaw was discovered in the handling of extended attributes on ext2\r\nand ext3 file systems. Under certain condidions, this could prevent\r\nthe enforcement of Access Control Lists, which eventually could lead\r\nto information disclosure, unauthorized program execution, or\r\nunauthorized data modification. This does not affect the standard Unix\r\npermissions. (CAN-2005-2801)\r\n\r\nChad Walstrom discovered a Denial of Service in the ipt_recent module,\r\nwhich can be used in netfilter (Firewall configuration). A remote\r\nattacker could exploit this to crash the kernel by sending certain\r\npackets (such as an SSH brute force attack) to a host which uses the\r\n"recent" module. (CAN-2005-2802)\r\n\r\n\r\nUpdated packages for Ubuntu 4.10 (Warty Warthog):\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.22.diff.gz\r\n Size/MD5: 3153574 b93a4715512f8140edb7254661d3ada0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.22.dsc\r\n Size/MD5: 2121 ed803ada3c962e41cfd8bda695f2ae2e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1.orig.tar.gz\r\n Size/MD5: 44728688 79730a3ad4773ba65fab65515369df84\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-doc-2.6.8.1_2.6.8.1-16.22_all.deb\r\n Size/MD5: 6162498 8c15bf8f847edcf1dac2fc71d3d93d0c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-patch-debian-2.6.8.1_2.6.8.1-16.22_all.deb\r\n Size/MD5: 1510900 8f3d8ac833811fa85d85cbe268e51750\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.22_all.deb\r\n Size/MD5: 36723722 7d183a5c6bc309dee686999d3508af8e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-tree-2.6.8.1_2.6.8.1-16.22_all.deb\r\n Size/MD5: 309546 98743b819f50f614880908f8ea7ed4d5\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 248980 bee14ce4cd792b501d3435d185a0c4eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 244830 51be43fdeaecfb98f14593a33491de13\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 247846 cfe1256e29610819cb839be4838f3179\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 243256 50fdf047fc49e54a62e1611357da6be1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 3180726 edccc6d4579abb294b1342b0bd9725c1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 14352358 0d4ba51a6389cf12161e037f763deab7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 14829818 7dfc83b2b4cd9b6e776a435f3ac13ef2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 14864762 7aceb7d2fd868bc5c75d9f26b7d2caec\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 14686788 166984ba1fafc038bef48988b71f539c\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-386_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 278218 dd5d60b43863fbdabd961f68a44b2864\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 273298 ffd6f2057299c61db47eb796a9c796b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 276046 b2733b8df9b8418af583da27a55ad29a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 273554 f1df8510d8b0c72037f3849fbc458de9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 276210 81a0a41d45c5e971489f8d38fde2c7ac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 3221368 f0d4b3d1e3df6c7046fbb767dd12e19b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-386_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 15497922 69a88c086ec2aaf01c9e725f29b307c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 16346806 0b528a56199537060f1cd287ae2ddf0b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 16517346 ebb67b3ea82ce3db26c106f580b1fe05\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 16450256 7747f8438f9075e9f502181a82fec80d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 16575234 9a77e01a859130585a1f19c37356e8a2\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 214110 2a71f6bc39dc0e3cd6eb0f5582464330\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 214740 aad1be7583d13938daaedae8213d0743\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 213668 6f560dd0656d08aa957061b25e9d0b15\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 214486 8e872a18a6d21886bd029054583517d0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 214194 7ed062e0d6f6919e1fa190d13d9bbce2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 216420 d3f832d7ead70f5d158fead1962f96ec\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 3298368 cb742594f8973b9579373c326a380913\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 16370564 70a01d32865eaed429ab25f1779554df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 15942494 3dafc6823bda2f0a3a39356cfaa3081a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 16356562 892a3432b2b56b0cc43e728074cbb564\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 15932662 99a8b0f04eb2b1549262469dae7d736c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 16292994 0205ed5cb025a95d2cf009a2985c2643\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 15975362 f671af6817b8010be009faaf8ad887ed\r\n\r\nUpdated packages for Ubuntu 5.04 (Hoary Hedgehog):\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.5.diff.gz\r\n Size/MD5: 6085053 b0ed04da41cb2ab7765c48bf525d17bc\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.5.dsc\r\n Size/MD5: 3145 24cf1603336df0eb9938422e2b54be1f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz\r\n Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.5_all.deb\r\n Size/MD5: 6782128 0348bf5a6fe2b9b70d2ba7b288b64f86\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.5_all.deb\r\n Size/MD5: 37510628 3c8d717bc6977b445e3b1a80327610eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.5_all.deb\r\n Size/MD5: 503674 ceec60f114c7b030c4e0ac518509d398\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 20824 d8370d8429cb2587e29cb43af68c9a33\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 47400 8314f360086cd8735b31ab231e65ac10\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 88892 ca37ffc2a3747f28639110e824236670\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 30012 84e3740ab27024dd8726fd668d2e4f46\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 41240 d69ce367a5cc5883aef7bb72463aad59\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 73598 1f80be784232d0c525f3d9d2e15a72eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 5742 bdd1ac08f9aa4479f31d6a672e070ee0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 34852 de01e83f0b568558248031b89eaef410\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 55180 dba0d48fa0332ad176c6c52e583c16f4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 112982 353b9b8936bbc35c066c26e6161d7ba3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 40812 fe2f7863c9c8df7abb66bcd4c76c8116\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 115708 36a6f64fce7260eb9a81f2eeca0fff3c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 174634 7ab370312a20129c258cafa4d1269664\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 82586 a65116e6cf4439bea981de1ef162813e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 1465894 02324547a232b13aeb59c15eb560d358\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-generic_2.6.10-34.5_amd64.deb\r\n Size/MD5: 285598 3968ad610a87f01030b851e1849d9bfd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8-smp_2.6.10-34.5_amd64.deb\r\n Size/MD5: 282276 6060059958d9e95ae269987832bac878\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8_2.6.10-34.5_amd64.deb\r\n Size/MD5: 284466 8333938fb41a208f0a7752ddd1ef471e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-xeon_2.6.10-34.5_amd64.deb\r\n Size/MD5: 279768 2c86f968ba01f2136497ff55fb28ae6e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.5_amd64.deb\r\n Size/MD5: 6136548 de585f1811aab25459fa6914c153f205\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-generic_2.6.10-34.5_amd64.deb\r\n Size/MD5: 14574394 591d27b114d1d1af00ce666fe9d4a4b2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8-smp_2.6.10-34.5_amd64.deb\r\n Size/MD5: 15121522 c5769c1110baea6152889d711e61bb72\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8_2.6.10-34.5_amd64.deb\r\n Size/MD5: 15087422 35a61442feb7a51db9485744f2abca97\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-xeon_2.6.10-34.5_amd64.deb\r\n Size/MD5: 14960626 f88b1d0208b0671ea7e5f474fa9c420d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.5_amd64.deb\r\n Size/MD5: 1352730 dbf148931f5ad216e9e170b6a1d35087\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 14224 a51e1e901117a35e65fdf6f8236f38e6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 178478 cdfe5fe00257afd1d702f7311b8ee4a6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 174854 592865f33bf2a227ba55df31c84d0ae1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 731032 30bd2a98393f5f42a2b3d90b432dd4b8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 780912 425526852583d6428b1371b26f8e9684\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 150014 1de424583e98267f5a698f5ee63f0b01\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 168132 7595ff0d722ddb8d6c0374650db87816\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 9554 cfe3bda4cb23a39ce72c032c0d5d6757\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 94860 4872c8e77249184bf40455c2d1ccd299\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 45720 466633b016a71cbd2d3d22d7c7db5d9a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 33160 2112c24e9cf4ca8382bc48bddbc4a175\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 55288 8d8dd01f2f7673bbd5ab11b50f5707ef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 4662 7eaa2da6676926e340016a6a78590166\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 7838 f9f6547061e1fa3032520fdfc528465c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 53794 170f9783a3c3ea060ddca697d13dda94\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 111102 c750209b227e8c5b3111e3f66f010b8e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 10156 1ab786daeec1cde2bc7c926fbc5c3b7f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 60458 bdf0a89367ed8b58ccbfa3c6afe9bb47\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 208568 07980e1d48c960154c3773308cc1fab5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 69254 ddd5bd72c23834862524d2ff1795b38f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 394738 5086b7b18013d69dbcbcb4bfda3e6ed6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 294486 7c06374de4e883232ddf0bf7142f926e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 12072 d27a9b583c99c8507f24fa326b48a2b2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 22652 c85e2301ae1ce78fbc0137070adf5ac0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 28796 95c28547a8fae71fafa411d88b0e307b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 56786 1134da88575b6d1bfb19a24d4c566e92\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 34940 7de24a13ba25e019e12cc554e9814abe\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 247454 f4052dea3f739c92a2a92fc69f3f1e4c\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 18164 caa71092c9fa306cc4a5f6cb5f420367\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 44824 2ef7d247c56685d69ac599c6df0462ce\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 103046 7d9210b1589019a9b569b619598a0328\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 86004 99d70509c0ff8add499b932f2e2c3dc9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 29090 797f973f82b731426e52d87e5f468251\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 39772 ca78183613a6bf2ebdf55af5df909c9b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 71152 19e76fb2fd3c7dc50216881f7f67caee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 5502 0ae2c6b53d7a063b001fa11eebbf4ff2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 31582 80088b8f7058d3377c34d1fcf9e1ea7c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 52938 bae6a18bd10288e4b7ccf11dd16ca6b5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 104454 92488721fbbcfa1c7d7ac5ffa1e1ee16\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 38626 7e258150e3fc923dff018ad11cb17766\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 114512 2d7650ee1a44016e879bdc4ecf0f0813\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 190654 7482512927e32d63ff56ff2084554e9f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 86540 4abace4168752594d1232b3a666e9392\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 1389428 9d099d48fd1b645f83e4575f5b4433c5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-386_2.6.10-34.5_i386.deb\r\n Size/MD5: 313642 bdc80db73640809b25f7ccb52c1ce242\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686-smp_2.6.10-34.5_i386.deb\r\n Size/MD5: 309172 b93a3aa86d091fb56c5aa7de7655a71c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686_2.6.10-34.5_i386.deb\r\n Size/MD5: 311448 9c687f8489e5d1b4e792cd0200bcc9da\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7-smp_2.6.10-34.5_i386.deb\r\n Size/MD5: 309516 86605c2c686baf1f8559411f2e0dcae6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7_2.6.10-34.5_i386.deb\r\n Size/MD5: 311764 0b97921d73997f59f727543703cde4d6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.5_i386.deb\r\n Size/MD5: 6133384 65fb79c603881d0aa48eee5529c14297\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-386_2.6.10-34.5_i386.deb\r\n Size/MD5: 15611772 a3f4169777b8d8df66c469adf91a8dd2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686-smp_2.6.10-34.5_i386.deb\r\n Size/MD5: 16188344 f8cc286f9344f4023c80e49d218ac272\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686_2.6.10-34.5_i386.deb\r\n Size/MD5: 16606358 64dc1bc6767b8f53e3fd82b5e8ecefb5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7-smp_2.6.10-34.5_i386.deb\r\n Size/MD5: 16295486 271804f204ad0819ffccf21830839908\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7_2.6.10-34.5_i386.deb\r\n Size/MD5: 16672310 d21c32323e9fe9dd9ac6ec08824e8120\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.5_i386.deb\r\n Size/MD5: 1347552 2186d2185692f9c484059e36867ea517\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 14076 f81cd40fe15a693589ebffc3b83ad344\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 183174 ace7b3203d01585ad215280f19b87598\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 172736 9a56c6bd18d0b0e7adb154d25fbaba62\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 967824 8e5296af896607829bb134cf0234ab36\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 780722 d82df162f2216d5e921151580f7a341b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 140656 2d72fe65b8775bd98599dc8bc89e4106\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 167960 a360879ae8223bc56111a9304151c932\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 9346 fd35308b07cc73eefa6dfaeb8b46d211\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 89328 3b650f54b04cd18059334a135e5a7b50\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 48128 d412542033ba4859e1c63a938d1e1108\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 30880 2ccda440cf7d29a083eff699a0571618\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 65894 0e316f525515a8681cefbe26f58a8169\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 4504 126b6f44b5f05815d93d4578490d249b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 7752 ca2a476d63f4d82c227fe3b608f17809\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 50776 a7e6dc2cc767d1ccbe22bb8531221568\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 111588 25b3191b7646fbb65325eee15e86c625\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 9894 e85e1e379791186709ad00c679d81302\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 57154 773ad374c344df1c4de8bab813882346\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 241932 191ca683591be80b8e0cfd39b83d6491\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 66232 1ec1f9e21161398608f90f2763e650c5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 436544 1ba0dbda71ff6d3c4350747a93716e46\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 485690 11503cd14dd0f1784c76bebc69028401\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 11472 77f6325c51456c8660637acb1268b682\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 21246 3595c832b3dd85923a815b7e30b4bc07\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 29528 5c41f327cb2bd735b73fb9bfee96512a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 106148 d714bebb0c794f660005f9e9b9047612\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 33824 aa26572579f36dc5a046b268cb348696\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 261340 fc89217dfcdc91a252fa5cabf3939ff7\r\n\r\n ia64 architecture (Intel Itanium)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 94098 2a80ea9614971884876c97a367b089a8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 63026 eb91ff4eccd14425bc9e080da4a9b727\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 183100 6124fa5494092eedf2de9d77ed165155\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 54712 70ca01915e8472dca2bc84aab629b1e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 45310 ea3d24ea24c03c54c0a55b5a37d80b61\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 255842 cb60e19a312eb631bc8a2c12dcf30eb7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 17488 e8e3bdecd9823adf439bebf68a41cd62\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 8424 246dec1f8037c73d625077adb7b3fece\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 103810 aa73b547d8ba6e070589a4152d4e8bb1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 249094 816cef17f6a16b1a03aa8318ea5b63c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 98122 0df41c845c4ca7ca446cd2d8cd446991\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 273072 c63f2ec506541b487ec421259b8224e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 244398 b527254c172a702f48d92b7f7018d999\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 202578 62b1a9d8433e54087fe87daffabb2f09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 2769928 5fbb5bfe2e2ac6ab85f1e72de0a30162\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-itanium-smp_2.6.10-34.5_ia64.deb\r\n Size/MD5: 256624 6c28afa47c6ec4a5882770bcb03ea3c2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-itanium_2.6.10-34.5_ia64.deb\r\n Size/MD5: 256602 102dc0aa4d4f64785423420824a42961\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-mckinley-smp_2.6.10-34.5_ia64.deb\r\n Size/MD5: 256528 c80eeb25b1a936db38729ce4f3210914\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-mckinley_2.6.10-34.5_ia64.deb\r\n Size/MD5: 256360 bfdbcde050e311bb4a1a8e4afd4c7383\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.5_ia64.deb\r\n Size/MD5: 6179520 93ac5ad8973f31f12c1287d2aa77e2da\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-itanium-smp_2.6.10-34.5_ia64.deb\r\n Size/MD5: 24748600 0ae3877f626fae6afc741c060c6a627a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-itanium_2.6.10-34.5_ia64.deb\r\n Size/MD5: 24718606 dfe79fc86d73424d139b1baf19f15aa7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-mckinley-smp_2.6.10-34.5_ia64.deb\r\n Size/MD5: 24825116 3727ad9af9d2c3b8967a76b327814954\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-mckinley_2.6.10-34.5_ia64.deb\r\n Size/MD5: 24665196 f372db5048299f6b14e5aa0a653cba6f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.5_ia64.deb\r\n Size/MD5: 1354246 a1666f0680f34560f3581a22ad559f1a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 26246 efbd128218c7149f8fb452cb7542108d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 311748 12e1c03bfa16c35c7ca017a1a8280da0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 361304 c2913dad9773a6f3d1c55319e48ee1a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 1783846 29270df596e1010393a65430cd453f11\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 16880 b40444ad6df169a459705d19f7daf1d4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 86890 c7ca24b944a031b663a1db04b2b4c006\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 109374 ba47d7938accf10b48cdcf0125e18ab1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 55722 dc366aa9197f950583752d29373964fa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 112130 5c699413fee9a5f72f233f196c7ca642\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 17806 7dd4b9b8b4a7b5ffc1a6ec1f55336d4b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 116504 ab3cdd780ccd73d6af388c1412a3641a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 284570 4e932af932ccda0aed29ff51de819b0e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 120642 9cfb6bd77d5e0fa690a90ec379c9ea38\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 112292 2406b0ff776db0f01a5bee096af8edb0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 1852148 a47dadba88ae2e56268d44e1113f7429\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 9452 3e12b794dd57550eba7acbf2633f5aed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 69838 0567b0951c01a1b06fc73879258fe688\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 223160 b8334d841c860814565a711eb5daa6a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 65146 ecc9d3fa059005edd29d89fa0d9e42fb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 538546 2e24292712ce2548877f293745acb19a\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 24052 f655d346a3046cacbeb91014e799ffa8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 24052 9ef94ee93e178676161f3c7127c0b027\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 24040 3705c9f7a02a9ae2cb23fd93919d1cc9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 58268 50cc94ad8c4fdb18dc82227a5f899ccc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 58278 423cfa986539c4b22c97d0a48768a4c4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 58254 f190009487d6a9b44a980387ce05ac97\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30280 4abec3797af1625157d95913b096ac55\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30280 5417ff56ba6844848747d6d2f2a1bb94\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30262 1db0fb75463b6f9c310e2567bf95e9af\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 109244 3af7cefac8659b972efa5f0dd9db1141\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 109238 87a604640413ceca5d060f0c567f2f1c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 109212 1c1faff4c29d5fa2e1234ea3111cfbac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35386 c10f79f81affd61d21e5bf1af612673a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35390 de155a327f31b7ae1c184c23a08f4c71\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35376 24487f69581ec9100a2e6df7c0cb10a6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30932 331f492867717ae3938a4109dd8e98eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30934 7b84118c83e015536f697bbd8a3bf7be\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30910 9a1403b9b6bfc6a407548b546810ae5d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 212960 7edaf9bac9e1e06e9b2c0439147dfbc2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 212944 e21d0ccc720b073d0f37392f9983ebb7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 212918 0b881361f57f6e9bde5bbe7b15ebd1ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 6166 5f0c2ddf428d9247c01c32a4275fdea3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 6162 7f0c53cf8ab172eb5b744c6cb26c4e53\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 6154 5814f14f7d8dc42bd292a40872ed1ea2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 43426 3a611b6121ba203ed14939d1a64722e5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 43418 2e2a05ccdcc8efdbab89088bb4a4b2f6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 43418 a035a30831954a8e6b52515272a1181f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 4588 5c143924e1c2300cc85b2baacea6d3e6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 4584 378365a095f54c46be36809edd1d2d74\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 4588 5f6d20a314a1396798424a0211d0da4b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 66000 2e9a78966d640cbdf731be7ab0952de7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 65994 28b6c9887e0668aa1edc19c69c868866\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 65996 917d74b8d4f3c0ce10e4e98324a8a92a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 117104 a255940b9318169380397206db7966dc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 117106 4e48f0dfbc04596849cf62b83dee4806\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 116854 19b255f942cc154d5a6c37950f7fa17f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 66632 e4537940aef6c2c1ad5b388fdea58da2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 66628 061e2b4caee3bab979a76f96985ad8f4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 66624 43d53dae2dc5cd760a78c61f8cfe5ebb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 142072 04b41a16405163f07af9184352661983\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 142070 25e450b4b3caa247c9167262d7aedd09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 142070 65fe1696a5d36b72b2bbc917a818b934\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213954 cf22b3f5f717275ed1dd84bf881d8975\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213978 b77ebf861675978d14ddd940d467f319\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213872 a2448811810ac592e91abc51e959b9ee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 107000 9ac815ac195972c098a0062361522adf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 107002 166833641f88fa957d6688bb40d60403\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 107010 c3f5a47e89af5445c3aad68fa93bae29\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 1866206 8fdebbcac09eea2a839cf9cd8badc33b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 1870638 809c7e1f532e43ddeec886be923f0fc7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 1900970 2bd025ab8df3aed43bd129c24e2c0b39\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 249410 7ab8a58453dc3ae13ed54e534f2a8ec9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 248874 c4f1ebdbc9d3d259e0167a3aab744874\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 249226 7b763f11acca6277d3ec60883ae57189\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 248674 6a49d08afe19de1ee7d6e04904bebdb7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 249726 6ef7e56b619ec904475dedad27f85ae8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 250458 38746140799290d7c21351bc56d744ac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 6154392 c90a8a0d7c6b4fcf26c586c39b73ebc3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15641168 26041ccbf1af9341e202947eb33b94ca\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15206084 e19a43416a527bccd5c0b3b304487ee5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15635442 fd466bf70b86af1b96bb3476cdf92bd9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15203326 83b25c464737a1e408e2740c1d86b67b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15547852 488feaa4fc48a5bf739bf4246dd729cb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15240076 57ddce08c411c933099c8d108a9ec19a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 1347810 e4e8f8aecdb078689a1d0359f4c4d759\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 17354 f5ae566b4bff76d99bc877593fa41746\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 17352 ca96d3ce5451a6cb1915ace61d7907b9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 17350 4c5eca50cc3968ef0e7afa2f3954a2e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213682 f6fc102028e58f6fb2916d5b503ad046\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213688 c1efad49e8d6f32a3aa7320033326b8d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213440 d6a9872c3316c44b326a33654b7a93c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 210740 bc0d0a70b4872a6ec902b4f344aab40c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 210744 7977ee766c9630ab2d5e0694e8e57b87\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 210744 9662c14552f8ec9d74026e59c33f934c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 688374 17758ef1bcd2f453b50d6212ecd1c3da\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 688344 269cdd6527a452284bfe2e46f8bc9bda\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 686856 f3089ef28e5f74e320ee362750ccb0a4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 780746 4422f5193b43b6a70808182073fd1556\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 780742 828d4603b57ba0daf57700f21de6e9a0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 780710 5108abef45fdf47740718078c0b89478\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 511208 947429f162dea945eed3019e187cf12a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 511192 caaae182c5276e3b991efdd463a5f136\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 510790 8d68a6c869f2bc7cf7930beb4968ef2f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 257712 8f2ed3ae2bedf97c0473e69795a25575\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 257708 15426063915d783ba3913e18078c4d12\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 256818 7a9a6ca59de49f6b792dc215e8355f4a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 84374 f6a14c0da44cfd64864af44e2c2480a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 84376 5197bee71f2d103b224d0bdc421b90dd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 84356 36d62805f7d2c02ac529122bc5631f73\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 60976 e42a21b173098bc712cfcafb44878db0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 60982 8b4fe0701ed286b592d00acc2f220c5e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 60988 ef5ce9034e3bbdd959209eaeeefc4449\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 64988 6361a36f1f3631fa91f698d6efe1d20f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 64980 f8bf47897575e9a69bc2428cf5fac90f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 64984 4cf4b51cf34540a6cde1c9ea1206c567\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 5378 1e2696208d90b6a287bde467212ea9aa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 5370 e3258cbbdf79f077f333b86f9adc4ba0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 5366 61d610b1f09b0f01abd83c267305b300\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63270 4cec3b41422e52ae946fd263e6aff74f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63272 ff625a958747b338747973c2c123633c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63232 c3cf4570e42141226844153c9f0cb7de\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 131648 2a0501fca97972ef04438a8165ec904b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 131652 cf1aca5d3ac004b42aaf31ccfd7cfd2b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 131662 09e20027343045bf63051acd562471b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 70974 75f16151fd25c7a8580850d89c7cd39a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 70968 913656678758fa15d630ceeb23be7c4b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 70952 4280a28de850937fe29c27dd6183c613\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 357316 ab852ca166bb9c4b835ee8d68bc9154a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 357308 30b11d8c9f812ec7af75d57e8c4a8b42\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 357310 2392e428acb17337dfb03d8d0bb62462\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 80734 91d3d6993b4eb281aba5774b7387f0b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 80734 83acb0ab2ef9348d0e04817a895b1a86\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 80728 bc5907665811dbd3ff8cfc22d9c91fdb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 510968 536294e705678b660abbaf79ca6d93a9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 510948 4b40dbd6ce72afc7b86732c8f5641c2b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 510736 e25972efaea83bd90fa3ae1ef2265b9d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 389116 1e31db22a8c2c897d1348230a2a164d7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 389096 8d0b766cb48d7b5353efcc0bcf668878\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 388950 c3e43e6393e7b22d66a0d5e5ce39246e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63148 388f85771210644d1763e931f1d6c849\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63160 2ed21c4bb6fbf1f33c54b7cf4ae9c60d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63032 cc8ada1a27d105184dc748f197897916\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 23352 fb02117d391c60c218d62044bc6f319b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 23340 7841e03e2976c9f8556a70f5e931cd3c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 23106 5479974450bd1b1f2725336c4e56fafb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35376 d30d17a9e27c27958d05330b5c894799\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35378 94c43da2eacc5eec323aacf114850ddd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35372 bef1d0e3193cee5c70b9e35369f3d628\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 135026 63bfa042a67268715539729586316416\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 135004 858dfb6325a3e4aaaa4210612b7a69fd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 134980 bdbf5a24582a18a4b2ca97fcefbd34ea\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 42398 0702bd860def97845d49e2a61b2881e2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 42392 2257e8bee9385807e82a97f7d0c5650a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 42394 4b98bbcd05c09f7705283f064909c8c4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 294748 c5e1491d0d562ad2dc7b7f60645b9908\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 294744 1b3aaa486dd0a8245db43fd53575f8b4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 294742 0c21521da6803566145a99bffe7f9ae7\r\n", "edition": 1, "modified": "2005-09-10T00:00:00", "published": "2005-09-10T00:00:00", "id": "SECURITYVULNS:DOC:9691", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:9691", "title": "[USN-178-1] Linux kernel vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:13", "bulletinFamily": "software", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n________________________________________________________________________\r\n______\r\n\r\nSUSE Security Announcement\r\n\r\nPackage: kernel\r\nAnnouncement ID: SUSE-SA:2005:050\r\nDate: Thu, 01 Sep 2005 14:00:00 +0000\r\nAffected Products: 9.1, 9.2, 9.3\r\nSUSE Linux Enterprise Server 9\r\nNovell Linux Desktop 9\r\nVulnerability Type: denial of service, local privilege escalation\r\nSeverity (1-10): 7\r\nSUSE Default Package: yes\r\nCross-References: CAN-2005-2457\r\nCAN-2005-2458\r\nCAN-2005-2459\r\nCAN-2005-2555\r\nCAN-2005-2456\r\nCAN-2005-0916\r\n\r\nContent of This Advisory:\r\n1) Security Vulnerability Resolved:\r\nvarious security issues and bugfixes for the Linux kernel\r\nProblem Description\r\n2) Solution or Workaround\r\n3) Special Instructions and Notes\r\n4) Package Location and Checksums\r\n5) Pending Vulnerabilities, Solutions, and Workarounds:\r\nSee SUSE Security Summary Report.\r\n6) Authenticity Verification and Additional Information\r\n\r\n________________________________________________________________________\r\n______\r\n\r\n1) Problem Description and Brief Discussion\r\n\r\nThe Linux kernel was updated to fix the following security issues:\r\n- CAN-2005-2457: A problem in decompression of files on "zisofs"\r\nfilesystem was fixed.\r\n\r\n- CAN-2005-2458: A potential buffer overflow in the zlib decompression\r\nhandling in the kernel was fixed.\r\n\r\n- CAN-2005-2459: Some return codes in zlib decoding were fixed which\r\ncould have led to an attacker crashing the kernel.\r\n\r\n- CAN-2005-2555: Only processes with the CAP_NET_ADMIN capability is\r\nnow allowed load socket policies.\r\n\r\n- CAN-2005-2456: Fixed a potential overflow caused by missing boundary\r\nchecks of sock->sk_policy in net/xfrm/.\r\n\r\n- AMD64/EM64T/x86_64 only: A previous fix for a denial of service\r\nattack with compat 32bit mode programs was too strict and could\r\ncrash the kernel. (The earlier fix had the Mitre CVE ID CAN-2005-1765.)\r\n\r\n- S/390 only: Fixed /sys/ permissions where a user could change machine\r\nstates, including powering down or up partitions.\r\n\r\n- CAN-2005-0916: PowerPC only: A missing patch for a hugetlb memory\r\ncontext handling problem was added.\r\n\r\nAbove problems affect SUSE Linux 9.1 up to 9.3 and SUSE Linux\r\nEnterprise Server 9.\r\n\r\nAdditionally following bugs were fixed for SUSE Linux Enterprise\r\nServer 9 and SUSE Linux 9.1:\r\n- The reported process start times sometimes were incorrect.\r\n- The OCFS2 filesystem was updated to version 1.0.2. (SLES 9 only)\r\n- A potential deadlock in cpuset handling was fixed.\r\n- Fixed a potential crash on startup of the tg3 network driver.\r\n- Avoid high IRQ latencies in the VM handling.\r\n- rpm/post.sh was fixed so that initrd.previous is preserved again.\r\n- A problem in the handling of the tape ioctl MTIOCPOS was fixed.\r\n- Make the OOM process killer send SIGTERM first instead of SIGKILL.\r\n- Fixed a netfilter connection track return code mismatch.\r\n- Fixed a typo in the ipt_TTL netfilter module.\r\n- XEN was updated to version 2.0.6b. (i386 only)\r\n- Allow rsize/wsize values less than 4096 for NFS mounts.\r\n- A data corruption problem within the reiserfs filesystem in\r\nthe handling of writing to mmaped regions after close of the file\r\ndescriptor was fixed.\r\n\r\n2) Solution or Workaround\r\n\r\nThere is no known workaround, please install the update packages.\r\n\r\n3) Special Instructions and Notes\r\n\r\nSPECIAL INSTALLATION INSTRUCTIONS\r\n=================================\r\nThe following paragraphs guide you through the installation\r\nprocess in a step-by-step fashion. The character sequence "****"\r\nmarks the beginning of a new paragraph. In some cases, the steps\r\noutlined in a particular paragraph may or may not be applicable\r\nto your situation. Therefore, make sure that you read through\r\nall of the steps below before attempting any of these\r\nprocedures. All of the commands that need to be executed must be\r\nrun as the superuser 'root'. Each step relies on the steps\r\nbefore it to complete successfully.\r\n\r\n**** Step 1: Determine the needed kernel type.\r\n\r\nUse the following command to determine which kind of kernel is\r\ninstalled on your system:\r\n\r\nrpm -qf --qf '%{name}\n' /boot/vmlinuz\r\n\r\n**** Step 2: Download the packages for your system.\r\n\r\nDownload the kernel RPM package for your distribution with the\r\nname indicated by Step 1. Starting from SUSE LINUX 9.2, kernel\r\nmodules that are not free were moved to a separate package with\r\nthe suffix '-nongpl' in its name. Download that package as well\r\nif you rely on hardware that requires non-free drivers, such as\r\nsome ISDN adapters. The list of all kernel RPM packages is\r\nappended below.\r\n\r\nThe kernel-source package does not contain a binary kernel in\r\nbootable form. Instead, it contains the sources that correspond\r\nwith the binary kernel RPM packages. This package is required to\r\nbuild third party add-on modules.\r\n\r\n**** Step 3: Verify authenticity of the packages.\r\n\r\nVerify the authenticity of the kernel RPM package using the\r\nmethods as listed in Section 6 of this SUSE Security\r\nAnnouncement.\r\n\r\n**** Step 4: Installing your kernel rpm package.\r\n\r\nInstall the rpm package that you have downloaded in Step 2 with\r\nthe command\r\n\r\nrpm -Uhv <FILE>\r\n\r\nreplacing <FILE> with the filename of the RPM package\r\ndownloaded.\r\n\r\nWarning: After performing this step, your system may not boot\r\nunless the following steps have been followed\r\ncompletely.\r\n\r\n**** Step 5: Configuring and creating the initrd.\r\n\r\nThe initrd is a RAM disk that is loaded into the memory of your\r\nsystem together with the kernel boot image by the boot loader.\r\nThe kernel uses the content of this RAM disk to execute commands\r\nthat must be run before the kernel can mount its root file\r\nsystem. The initrd is typically used to load hard disk\r\ncontroller drivers and file system modules. The variable\r\nINITRD_MODULES in /etc/sysconfig/kernel determines which kernel\r\nmodules are loaded in the initrd.\r\n\r\nAfter a new kernel rpm has been installed, the initrd must be\r\nrecreated to include the updated kernel modules. Usually this\r\nhappens automatically when installing the kernel rpm. If\r\ncreating the initrd fails for some reason, manually run the\r\ncommand\r\n\r\n/sbin/mkinitrd\r\n\r\n**** Step 6: Update the boot loader, if necessary.\r\n\r\nDepending on your software configuration, you either have the\r\nLILO or GRUB boot loader installed and initialized on your\r\nsystem. Use the command\r\n\r\ngrep LOADER_TYPE /etc/sysconfig/bootloader\r\n\r\nto find out which boot loader is configured.\r\n\r\nThe GRUB boot loader does not require any further action after a\r\nnew kernel has been installed. You may proceed to the next step\r\nif you are using GRUB.\r\n\r\nIf you use the LILO boot loader, lilo must be run to\r\nreinitialize the boot sector of the hard disk. Usually this\r\nhappens automatically when installing the kernel RPM. In case\r\nthis step fails, run the command\r\n\r\n/sbin/lilo\r\n\r\nWarning: An improperly installed boot loader will render your\r\nsystem unbootable.\r\n\r\n**** Step 7: Reboot.\r\n\r\nIf all of the steps above have been successfully completed on\r\nyour system, the new kernel including the kernel modules and the\r\ninitrd are ready to boot. The system needs to be rebooted for\r\nthe changes to be active. Make sure that all steps have been\r\ncompleted then reboot using the command\r\n\r\n/sbin/shutdown -r now\r\n\r\nYour system will now shut down and restart with the new kernel.\r\n\r\n4) Package Location and Checksums\r\n\r\nThe preferred method for installing security updates is to use the YaST\r\nOnline Update (YOU) tool. YOU detects which updates are required and\r\nautomatically performs the necessary steps to verify and install them.\r\nAlternatively, download the update packages for your distribution manually\r\nand verify their integrity by the methods listed in Section 6 of this\r\nannouncement. Then install the packages using the command\r\n\r\nrpm -Fhv <file.rpm>\r\n\r\nto apply the update, replacing <file.rpm> with the filename of the\r\ndownloaded RPM package.\r\n\r\nOur maintenance customers are notified individually. The packages are\r\noffered for installation from the maintenance web.\r\n\r\nx86 Platform:\r\n\r\nSUSE Linux 9.3:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10\r\n.3.i586.rpm\r\n109dae42886f2911ecd8cc4af99c3b2c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/dprobes-3.6.5-8.3.i\r\n586.rpm\r\nbfeb0c950feeaa75c79a4a57cc87f551\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.1\r\n1.4-21.9.i586.rpm\r\n7e7ba551fe6b92107a0ba09826d8e120\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongp\r\nl-2.6.11.4-21.9.i586.rpm\r\na93a42d93d0afa839e8884ca9ac42c99\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.\r\n11.4-21.9.i586.rpm\r\n2d8a2dc424c11b5da3949de154c4b80c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nong\r\npl-2.6.11.4-21.9.i586.rpm\r\n6f7a4b0a62ced6586aa7353ed748c90c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4\r\n-21.9.i586.rpm\r\n750dea25641d0ad7d773159d47ca4e73\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2\r\n.6.11.4-21.9.i586.rpm\r\nee34377746c4b71d6d7afc7534571ca8\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.1\r\n1.4-21.9.i586.rpm\r\n3239a4c642281f183de39665146066f4\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.\r\n4-21.9.i586.rpm\r\n963b94068f885e168a66827d69800671\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-\r\n21.9.i586.rpm\r\nceee524474d29063a2d822c72c0b1f51\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.\r\n6.11.4-21.9.i586.rpm\r\n52740f234d74c21a0e5623187bf26936\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4\r\n-21.9.i586.rpm\r\na4c2cf202304fcf52ce85cb7dcc61d4f\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2\r\n.6.11.4-21.9.i586.rpm\r\nf8ef60057bc59af1547652b1c4602341\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.3\r\n.i586.rpm\r\n3bc9843472d9ed2441ba86e9b8b9ce32\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-ini\r\ntrd-1.0-50.3.i586.rpm\r\ne539dfe0c114e43074c2cf28941b6370\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.\r\n11.4-21.9.i586.rpm\r\n41feebd67d6f7423cbba6237225f5f5c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.1\r\n1.4-21.9.noarch.rpm\r\n6b30319984cb6de2077d45f315df61c1\r\n\r\nSUSE Linux 9.2:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.\r\n11.i586.rpm\r\nb9770aab503fa879cd55f4de3ce048f0\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8\r\n-24.18.i586.rpm\r\nf2d18f3a10c1e2dbea9ea504ab6b9ff4\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongp\r\nl-2.6.8-24.18.i586.rpm\r\n868363c524a6aa6b0e2557459cf63a64\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.\r\n8-24.18.i586.rpm\r\n3621a8e1ec926d6da0a274e1f23a3ea1\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nong\r\npl-2.6.8-24.18.i586.rpm\r\nf11a56495ff83f34dc1fb38305415f54\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24\r\n.18.i586.rpm\r\nbf5e230555f840dd9eb8911198cbc371\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2\r\n.6.8-24.18.i586.rpm\r\n5ee7ee747863bade5b1dce5dbf9c7e15\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8\r\n-24.18.i586.rpm\r\n6917011ebed217407e11a01ffc7bf626\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-2\r\n4.18.i586.rpm\r\n0dc29fb67711452cdbe5559c0cfde5fb\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.\r\n18.i586.rpm\r\n3003c431b7e9a42bebbf784af93a3f76\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.\r\n6.8-24.18.i586.rpm\r\n09f993e9d0cd44e35cfc413ba7e78bf2\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.11\r\n.i586.rpm\r\nfe37f4b03e17a6744186109e392a55a0\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-ini\r\ntrd-1.0-48.10.i586.rpm\r\nbd22da540dc368149a2c9be16d8003c7\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.\r\n8-24.18.i586.rpm\r\nde3787a34b56330cdd0adc94dc1d6006\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8\r\n-24.18.noarch.rpm\r\n1f21b6b38e708a5dc1aefce5625422a9\r\n\r\nSUSE Linux 9.1:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5\r\n-7.201.i586.rpm\r\naa45d2173b5566458c3f0f3398cc0f3d\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.\r\n5-7.201.i586.rpm\r\n63eeab850bdfa1a4305e28539320623b\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.\r\n201.i586.rpm\r\n0a676bfc456c2313cfa5494a2e7c6b27\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5\r\n-7.201.i586.rpm\r\n9d3f2c8f10d6d5003a8ea7092db297d3\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7\r\n.201.i586.rpm\r\n26a74b8ddedef7338925436ba003c8c4\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.18\r\n.i586.rpm\r\ndcf21f7128d4706d2da312f9a6b8dc90\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5\r\n-7.201.noarch.rpm\r\ncab23dd81c314831b410b54c0dfbc42a\r\nsource rpm(s):\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-\r\n7.201.nosrc.rpm\r\n4ba7837432933e6596c96ee60dda1234\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5\r\n-7.201.nosrc.rpm\r\nb05d0775cc2af4b0e3dba0526be965d2\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.\r\n201.src.rpm\r\n73f3e4ed493276c33cd4053651d799a1\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.2\r\n01.nosrc.rpm\r\nfcb5dcbdb2488a76bae06adb4ea78dee\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-\r\n7.201.src.rpm\r\n1553435ba0f6daaeccc63f10a29fa45c\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.\r\n201.src.rpm\r\n60be37a607d8026f610fc9b8c1e9ae17\r\nftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.18.\r\nsrc.rpm\r\n6e1255189986a535415ba4b4e0564520\r\n\r\nx86-64 Platform:\r\n\r\nSUSE Linux 9.3:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.\r\n6.11.4-21.9.x86_64.rpm\r\n4d70cd8cb28769225df3dee3ee3a75b8\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-no\r\nngpl-2.6.11.4-21.9.x86_64.rpm\r\nccbfe4e8c9a494e503e8ffac13f5c96b\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11\r\n.4-21.9.x86_64.rpm\r\n728b815392936f82c1adc851ea8e29d3\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl\r\n-2.6.11.4-21.9.x86_64.rpm\r\n4035b4d7327357bfe0d6716436fd19e0\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6\r\n.11.4-21.9.x86_64.rpm\r\n2a786f6c08590518a18d9681dca4ad52\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.1\r\n1.4-21.9.x86_64.rpm\r\nf1746cd488a6da7a5e0a19969826550c\r\nsource rpm(s):\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.1\r\n1.4-21.9.nosrc.rpm\r\naa979e173bc503975cf13cbab233bfb4\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-\r\n21.9.nosrc.rpm\r\n8754d80bf918690b92d831ea71488a86\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11\r\n.4-21.9.src.rpm\r\n8644df179ff0d981a5fdce59e4e1fbfe\r\nftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4\r\n-21.9.src.rpm\r\n1bbb661256f769a3fae67fdd19a563fe\r\n\r\nSUSE Linux 9.2:\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.\r\n6.8-24.18.x86_64.rpm\r\na8230f827e8cd61908bb11f16507edf2\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-no\r\nngpl-2.6.8-24.18.x86_64.rpm\r\nb4e58b8b233457a1fc7155faf339ac46\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-\r\n24.18.x86_64.rpm\r\nad755caed5c5218190e3fb7d421f1e2a\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl\r\n-2.6.8-24.18.x86_64.rpm\r\n5bf4775c72b70883fd17273ff2999161\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6\r\n.8-24.18.x86_64.rpm\r\nb9db64d95bcae9c070597a5720fb25a2\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8\r\n-24.18.x86_64.rpm\r\n0e65e631c2e9ba35e6d1bf1163e7a8a8\r\nsource rpm(s):\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8\r\n-24.18.nosrc.rpm\r\ne4b8d7c2fdb1b9872494d069746dd90b\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.\r\n18.nosrc.rpm\r\naaa890bb4ae4ae23c97f5bffcbcd2903\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-\r\n24.18.src.rpm\r\n2b05f5c1a7fbf7d71ed7b2c0ed2d0c54\r\nftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24\r\n.18.src.rpm\r\n4e4ee957d672abc004abff13e39be8a2\r\n\r\nSUSE Linux 9.1:\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6\r\n.5-7.201.noarch.rpm\r\n3f727ff28a5e40fd0c472fc2beacb6f7\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-\r\n2.6.5-7.201.x86_64.rpm\r\ne868e8d135eaa480aa65eeb4936aa9ed\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.\r\n5-7.201.x86_64.rpm\r\nf0c10b5ecdeace7416a914c4f6bf9a77\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2\r\n.6.5-7.201.x86_64.rpm\r\n5f058bc7b8b8e01c154e601c6802772b\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6\r\n.5-7.201.x86_64.rpm\r\n8344d1a6429b502c2b6a13bae440c1a6\r\nsource rpm(s):\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6\r\n.5-7.201.nosrc.rpm\r\nba19c499f451e49609a518c220614512\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-\r\n7.201.src.rpm\r\n060132033a7b024f0a79131e3312cc30\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7\r\n.201.nosrc.rpm\r\n7c62646a0d6c8036d5cb74d9dbd071b3\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.\r\n5-7.201.src.rpm\r\n17cd263a0ec18dee41099c560685e928\r\nftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-\r\n7.201.src.rpm\r\n7834c7e97de98f4611f600ec1bfdb7dc\r\n\r\n________________________________________________________________________\r\n______\r\n\r\n5) Pending Vulnerabilities, Solutions, and Workarounds:\r\n\r\nSee SUSE Security Summary Report.\r\n________________________________________________________________________\r\n______\r\n\r\n6) Authenticity Verification and Additional Information\r\n\r\n- Announcement authenticity verification:\r\n\r\nSUSE security announcements are published via mailing lists and on Web\r\nsites. The authenticity and integrity of a SUSE security announcement is\r\nguaranteed by a cryptographic signature in each announcement. All SUSE\r\nsecurity announcements are published with a valid signature.\r\n\r\nTo verify the signature of the announcement, save it as text into a file\r\nand run the command\r\n\r\ngpg --verify <file>\r\n\r\nreplacing <file> with the name of the file where you saved the\r\nannouncement. The output for a valid signature looks like:\r\n\r\ngpg: Signature made <DATE> using RSA key ID 3D25D3D9\r\ngpg: Good signature from "SuSE Security Team <security (at) suse (dot) de [email concealed]>"\r\n\r\nwhere <DATE> is replaced by the date the document was signed.\r\n\r\nIf the security team's key is not contained in your key ring, you can\r\nimport it from the first installation CD. To import the key, use the\r\ncommand\r\n\r\ngpg --import gpg-pubkey-3d25d3d9-36e12d04.asc\r\n\r\n- Package authenticity verification:\r\n\r\nSUSE update packages are available on many mirror FTP servers all over the\r\nworld. While this service is considered valuable and important to the free\r\nand open source software community, the authenticity and the integrity of\r\na package needs to be verified to ensure that it has not been tampered\r\nwith.\r\n\r\nThere are two verification methods that can be used independently from\r\neach other to prove the authenticity of a downloaded file or RPM package:\r\n\r\n1) Using the internal gpg signatures of the rpm package\r\n2) MD5 checksums as provided in this announcement\r\n\r\n1) The internal rpm package signatures provide an easy way to verify the\r\nauthenticity of an RPM package. Use the command\r\n\r\nrpm -v --checksig <file.rpm>\r\n\r\nto verify the signature of the package, replacing <file.rpm> with the\r\nfilename of the RPM package downloaded. The package is unmodified if it\r\ncontains a valid signature from build (at) suse (dot) de [email concealed] with the key ID 9C800ACA.\r\n\r\nThis key is automatically imported into the RPM database (on\r\nRPMv4-based distributions) and the gpg key ring of 'root' during\r\ninstallation. You can also find it on the first installation CD and at\r\nthe end of this announcement.\r\n\r\n2) If you need an alternative means of verification, use the md5sum\r\ncommand to verify the authenticity of the packages. Execute the command\r\n\r\nmd5sum <filename.rpm>\r\n\r\nafter you downloaded the file from a SUSE FTP server or its mirrors.\r\nThen compare the resulting md5sum with the one that is listed in the\r\nSUSE security announcement. Because the announcement containing the\r\nchecksums is cryptographically signed (by security (at) suse (dot) de [email concealed]), the\r\nchecksums show proof of the authenticity of the package if the\r\nsignature of the announcement is valid. Note that the md5 sums\r\npublished in the SUSE Security Announcements are valid for the\r\nrespective packages only. Newer versions of these packages cannot be\r\nverified.\r\n\r\n- SUSE runs two security mailing lists to which any interested party may\r\nsubscribe:\r\n\r\nsuse-security (at) suse (dot) com [email concealed]\r\n- General Linux and SUSE security discussion.\r\nAll SUSE security announcements are sent to this list.\r\nTo subscribe, send an e-mail to\r\n<suse-security-subscribe (at) suse (dot) com [email concealed]>.\r\n\r\nsuse-security-announce (at) suse (dot) com [email concealed]\r\n- SUSE's announce-only mailing list.\r\nOnly SUSE's security announcements are sent to this list.\r\nTo subscribe, send an e-mail to\r\n<suse-security-announce-subscribe (at) suse (dot) com [email concealed]>.\r\n\r\nFor general information or the frequently asked questions (FAQ),\r\nsend mail to <suse-security-info (at) suse (dot) com [email concealed]> or\r\n<suse-security-faq (at) suse (dot) com [email concealed]>.\r\n\r\n=====================================================================\r\nSUSE's security contact is <security (at) suse (dot) com [email concealed]> or <security (at) suse (dot) de [email concealed]>.\r\nThe <security (at) suse (dot) de [email concealed]> public key is listed below.\r\n=====================================================================\r\n________________________________________________________________________\r\n______\r\n\r\nThe information in this advisory may be distributed or reproduced,\r\nprovided that the advisory is not modified in any way. In particular, the\r\nclear text signature should show proof of the authenticity of the text.\r\n\r\nSUSE Linux Products GmbH provides no warranties of any kind whatsoever\r\nwith respect to the information contained in this security advisory.\r\n\r\nType Bits/KeyID Date User ID\r\npub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security (at) suse (dot) de [email concealed]>\r\npub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build (at) suse (dot) de [email concealed]>\r\n\r\n- -----BEGIN PGP PUBLIC KEY BLOCK-----\r\nVersion: GnuPG v1.0.6 (GNU/Linux)\r\nComment: For info see http://www.gnupg.org\r\n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\r\nDgCfZ5Wj+f7cnYpFZI6GkAyyczG09sE=\r\n=LRKC\r\n- -----END PGP PUBLIC KEY BLOCK-----\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.2 (GNU/Linux)\r\n\r\niQEVAwUBQxcQmHey5gA9JdPZAQKEJwf9HJ48ccSkW6zu7vkhuyC95yGHJJDTHhSo\r\nV3MQnpQJQXFDOOs0CzlQmWhDWrgji1OdSAkbUYgrnD8PpXR/ci+kVksNGjp9ZWqL\r\nmqF27aglz/00jmknS+NqfLyFK6KD0tnA6XC0246yZJwGUqv8p2adYkdtwvLj5UtK\r\nlTyLm1lFmygwFy6Yj5ZzQ+P2VE3PWNFF4wi9P+rzaBbLU2qErqNqlL2OznmgP/ON\r\nVhWqqeCfs7EoLburpzMlMbr6hwmJ0T7P6oLto9Jx77helRUjv+gPigtruQkO6o9x\r\nbSbFp/viKkzhoWk653o0EWYPlI81L5E9ZvzTs3hVmTMFlONiPmONJw==\r\n=UDS2\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2005-09-02T00:00:00", "published": "2005-09-02T00:00:00", "id": "SECURITYVULNS:DOC:9632", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:9632", "title": "SUSE Security Announcement: kernel multiple security problems (SUSE-SA:2005:050)", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:13", "bulletinFamily": "software", "cvelist": ["CVE-2005-2457", "CVE-2005-2099", "CVE-2005-2548", "CVE-2005-2098", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "===========================================================\r\nUbuntu Security Notice USN-169-1 August 19, 2005\r\nlinux-source-2.6.8.1, linux-source-2.6.10 vulnerabilities\r\nCAN-2005-2098, CAN-2005-2456, CAN-2005-2457, CAN-2005-2458,\r\nCAN-2005-2459, CAN-2005-2548, CAN-2005-2555\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 4.10 (Warty Warthog)\r\nUbuntu 5.04 (Hoary Hedgehog)\r\n\r\nThe following packages are affected:\r\n\r\nlinux-image-2.6.10-5-386\r\nlinux-image-2.6.10-5-686\r\nlinux-image-2.6.10-5-686-smp\r\nlinux-image-2.6.10-5-amd64-generic\r\nlinux-image-2.6.10-5-amd64-k8\r\nlinux-image-2.6.10-5-amd64-k8-smp\r\nlinux-image-2.6.10-5-amd64-xeon\r\nlinux-image-2.6.10-5-itanium\r\nlinux-image-2.6.10-5-itanium-smp\r\nlinux-image-2.6.10-5-k7\r\nlinux-image-2.6.10-5-k7-smp\r\nlinux-image-2.6.10-5-mckinley\r\nlinux-image-2.6.10-5-mckinley-smp\r\nlinux-image-2.6.10-5-power3\r\nlinux-image-2.6.10-5-power3-smp\r\nlinux-image-2.6.10-5-power4\r\nlinux-image-2.6.10-5-power4-smp\r\nlinux-image-2.6.10-5-powerpc\r\nlinux-image-2.6.10-5-powerpc-smp\r\nlinux-image-2.6.8.1-5-386\r\nlinux-image-2.6.8.1-5-686\r\nlinux-image-2.6.8.1-5-686-smp\r\nlinux-image-2.6.8.1-5-amd64-generic\r\nlinux-image-2.6.8.1-5-amd64-k8\r\nlinux-image-2.6.8.1-5-amd64-k8-smp\r\nlinux-image-2.6.8.1-5-amd64-xeon\r\nlinux-image-2.6.8.1-5-k7\r\nlinux-image-2.6.8.1-5-k7-smp\r\nlinux-image-2.6.8.1-5-power3\r\nlinux-image-2.6.8.1-5-power3-smp\r\nlinux-image-2.6.8.1-5-power4\r\nlinux-image-2.6.8.1-5-power4-smp\r\nlinux-image-2.6.8.1-5-powerpc\r\nlinux-image-2.6.8.1-5-powerpc-smp\r\nlinux-patch-debian-2.6.8.1\r\nlinux-patch-ubuntu-2.6.10\r\n\r\nThe problem can be corrected by upgrading the affected package to\r\nversion 2.6.8.1-16.21 (for Ubuntu 4.10), or 2.6.10-34.4 (for Ubuntu\r\n5.04). You need to reboot your computer after a standard system\r\nupgrade to effect the necessary changes.\r\n\r\nDetails follow:\r\n\r\nDavid Howells discovered a local Denial of Service vulnerability in\r\nthe key session joining function. Under certain user-triggerable\r\nconditions, a semaphore was not released properly, which caused\r\nprocesses which also attempted to join a key session to hang forever.\r\nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2098)\r\n\r\nDavid Howells discovered a local Denial of Service vulnerability in\r\nthe keyring allocator. A local attacker could exploit this to crash\r\nthe kernel by attempting to add a specially crafted invalid keyring.\r\nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2099)\r\n\r\nBalazs Scheidler discovered a local Denial of Service vulnerability in\r\nthe xfrm_compile_policy() function. By calling setsockopt() with an\r\ninvalid xfrm_user policy message, a local attacker could cause the\r\nkernel to write to an array beyond its boundaries, thus causing a\r\nkernel crash. (CAN-2005-2456)\r\n\r\nTim Yamin discovered that the driver for compressed ISO file systems\r\ndid not sufficiently validate the iput data. By tricking an user into\r\nmounting a malicious CD-ROM with a specially crafted compressed ISO\r\nfile system, he could cause a kernel crash. (CAN-2005-2457)\r\n\r\nIt was discovered that the kernel's embedded zlib compression library\r\nwas still vulnerable to two old vulnerabilities of the standalone zlib\r\nlibrary. This library is used by various drivers and can also be used\r\nby third party modules, so the impact varies. (CAN-2005-2458,\r\nCAN-2005-2459)\r\n\r\nPeter Sandstrom discovered a remote Denial of Service vulnerability in\r\nthe SNMP handler. Certain UDP packages lead to a function call with\r\nthe wrong argument, which resulted in a crash of the network stack.\r\nThis only affects Ubuntu 4.10 (Warty Warthog). (CAN-2005-2548)\r\n\r\nHerbert Xu discovered that the setsockopt() function was not\r\nrestricted to privileged users. This allowed a local attacker to\r\nbypass intended IPSec policies, set invalid policies to exploit flaws\r\nlike CAN-2005-2456, or cause a Denial of Service by adding policies\r\nuntil kernel memory is exhausted. Now the call is restricted to\r\nprocesses with the CAP_NET_ADMIN capability. (CAN-2005-2555)\r\n\r\nThe Ubuntu 5.04 kernel update also fixes a memory leak in the "md"\r\n(Software RAID) driver which eventually lead to kernel memory\r\nexhaustion. Ubuntu 4.10 is not affected by this.\r\n(http://bugs.debian.org/317787)\r\n\r\n\r\nUpdated packages for Ubuntu 4.10 (Warty Warthog):\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21.diff.gz\r\n Size/MD5: 3150931 2592465ee5409ee070b46abb6db208af\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21.dsc\r\n Size/MD5: 2121 5e1cd652e18a353051f396fd957609b7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1.orig.tar.gz\r\n Size/MD5: 44728688 79730a3ad4773ba65fab65515369df84\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-doc-2.6.8.1_2.6.8.1-16.21_all.deb\r\n Size/MD5: 6158086 19d0ccdfd79bb49c64ed07e774147999\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-patch-debian-2.6.8.1_2.6.8.1-16.21_all.deb\r\n Size/MD5: 1508724 c6639ae2c9c8161dc2e59d453800cade\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.21_all.deb\r\n Size/MD5: 36728390 76dd7c90e34a64853216ab57cb7f4fe0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-tree-2.6.8.1_2.6.8.1-16.21_all.deb\r\n Size/MD5: 309334 192494d605d7f907e4f5abb00de3fc18\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 248804 8d55088ad0277c7942b04905844c83c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 244778 90b37eb9698a1d496816a0cda72bd137\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 247606 f4f80b507d21fa332a894978a1f74bc1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 243122 fa6e460907d3817c24fb63547fceefe7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 3180438 c294a14b798342743402ca97eb69cff8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 14352022 9b40c909eb2fef2ca09e717df04e6b30\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 14829664 3e22c0fb4f2a444f68eefd54c19dd801\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 14863718 a18e2860b05488856124ec57b84a30c3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.21_amd64.deb\r\n Size/MD5: 14686614 8a829015c2efc262e42374f66df802e8\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-386_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 278044 0f0ed87c28d52e92ad44ca227a53fef9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 273130 89a4ecfae04b6bffff940e3ad38b2f09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 275992 4ed3c0fa3502b95ce3b3e1165966c502\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 273640 b8746918e52e2f63a95a6f0d156df9fd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 276132 c3f93f3f3d34cda6c4642f7828381fd3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 3221238 797d734bbe4152e282bd322aa0c28773\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-386_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 15497320 334177b31b3603f129c37bea25d45d77\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 16346430 4f2bf6270d71b0695de4eeed90882809\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 16517780 ca57bc5ec9618654f5926111b4444ffb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 16450172 80d7d11389a98fb376a6484c4b563e5c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7_2.6.8.1-16.21_i386.deb\r\n Size/MD5: 16575230 c0fece845baa30df4a910964fb7dcb31\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 213492 20a0fca0ad9b88e5cb482d6d5e6f40fc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 214526 0798b1a32577dfb2adddb4da11a730f5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 213220 d3e9b0acad728a9a278bf58f1e752f22\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 214070 422c9839d9fab9b040582abbaeb9a17f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 213918 19346de3802f2f8e7f7fcf3fca4f57fc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 216150 be02cbae0671d073f6ab69622646a44e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 3298218 9148211f6f8c3d54c12510b412befd59\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 16370308 5617bd877f1b0d04ea3b751832ea35b1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 15942120 6aa761fd924ebc01eb41678d3eb0a6b4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 16356246 6ba5b3b0d32f02fdcacd5c3ce454599e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 15932268 fb678da934f0b16df49b1aef97f90051\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 16292410 af41ad03cf3e13f964ff4007b22f6c5f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.21_powerpc.deb\r\n Size/MD5: 15975292 03d379b33553b12b194c81039d91f7db\r\n\r\nUpdated packages for Ubuntu 5.04 (Hoary Hedgehog):\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4.diff.gz\r\n Size/MD5: 6041200 4564aed5352b2e3cb8f172a30887ddb1\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4.dsc\r\n Size/MD5: 2645 7c9af2cf3df003eb9cb19f5ee77644e0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz\r\n Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.4_all.deb\r\n Size/MD5: 6780284 4d2dec8b6e6baa5d6e1b90474ee05d91\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.4_all.deb\r\n Size/MD5: 37514478 50bf50110a60cd13608dd637c2de57ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.4_all.deb\r\n Size/MD5: 503476 c66c0ea8a91f5b112af362dc3df5757b\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 20828 6a28d2ade25817cc3e2368cb719f7f09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 47396 390b9278ebb802e2c897fb15615cb911\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 88892 e2ae6bba29eb561f3cdd68c751a3e15a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 30020 e49ef4804d666ab23070faf6c706cce1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 41234 3cd553baef921c73dab913686387e2bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 73592 805e5d067c63e70ecd27e326df87b6c2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 5742 ad6fbed07a117d3ab55a100cc45857b7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 34852 3e4f9b315b1f2ec558af3d11adfb30df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 55184 f8d462a04508347ed9e5b7fe04575874\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 112972 16352097c826664188af0f3e7c548edc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 40806 88b025dbe3a6ef3ff196b953372cfe91\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 115734 de38182b39528c3cff753aef83fa4282\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 174628 7951046302e24ff2a804ba096c083884\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 82592 1e013fe88ab7a92dc29ef97ba3d5a8fb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 1465770 f5270288a221e150b59ca767e664640c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-generic_2.6.10-34.4_amd64.deb\r\n Size/MD5: 285430 f1167642c6061177e41fe5a216a1eef5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8-smp_2.6.10-34.4_amd64.deb\r\n Size/MD5: 282344 ce210d40b0366ea80d0ebbdb022d3faa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8_2.6.10-34.4_amd64.deb\r\n Size/MD5: 284322 d3aee75b29b7a6380810efbff39014e1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-xeon_2.6.10-34.4_amd64.deb\r\n Size/MD5: 280016 0fae42f06be47a805e99ad30a9b853d2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_amd64.deb\r\n Size/MD5: 6136286 f3789612e6dcdc712b54ae913a388373\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-generic_2.6.10-34.4_amd64.deb\r\n Size/MD5: 14573534 2cae783edd734f1f2856bd9ebf07de2e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8-smp_2.6.10-34.4_amd64.deb\r\n Size/MD5: 15121222 ea5fceb7f01367bfea3c75cee2ba1ca8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8_2.6.10-34.4_amd64.deb\r\n Size/MD5: 15086566 d577f2ae4be792d392fe39862b763af9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-xeon_2.6.10-34.4_amd64.deb\r\n Size/MD5: 14960568 8b5044dbe7e197a081176aefa881e20c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_amd64.deb\r\n Size/MD5: 1350520 992d26c9208eaa58d73431e848300ad7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 14226 f9b3f5692bc97b2b6126463beb079bba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 178480 ed673c280dbc72f585d9f758250d5b7f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 174854 da683587fa305fe60f9fceea108e3fbc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 731046 dec8eb5c577d960c510de5859fddc6e1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 780902 55dac3746af67a93e0216c7663d11080\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 150018 ce51c5a21dcf081b55ff133c7551fe7e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 168132 fe6470ed4149c966ad0b02f5837bb53f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 9560 45138e7132c22d07250a4d08f965241c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 94858 9c6b98daee160ee106415cc71d631877\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 45728 ff3f87447c5b4cdf7ff6f92c958cf25f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 33162 a7b48c602f2beffc6540c4ebc192b917\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 55286 5924910f721ae41bcd8e5fee3faf3a92\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 4662 4ea53b1b6d8ddc11406353a2929f1ac5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 7840 cb3fe4f61299ed2624e920b0d5a5ad18\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 53804 a69417f7f8c48ad5871cd4b8ca2f2e70\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 111112 6d327d30d7b7adb3197adc0bd39a67be\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 10164 c898bdf01a889bcf62211f8fba618a87\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 60460 f38cbf0cda98d6df39b7a29a6553dad8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 208568 297295a2a62b5925c18da8c79f8fd217\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 69254 fd6d705e6a6381b63e39f8ec087c4af4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 394750 2d6e4b96116becfbc127e801c8bfb5f4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 294482 c5877bc5d5ce6a16a945fcfdd03663b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 12078 4b19866599d12de319dcd9363470115f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 22658 4712b3ca6d5b7a0ace1f9b5148b842b0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 28796 06b5d6185f35669e38971306f10992ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 56782 1660dab0f77a74a859cfa63a71042375\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 34936 06fd69670c6aab6f422878860490e8db\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.4_amd64.udeb\r\n Size/MD5: 247456 73714c2c823c2cd541cebc015ab744e2\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 18156 c8b2f02968c7eee342a49b5251b71a8a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 44824 d89baaedf6345e30e39b3cf796d175d1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 103034 bebdea2e76c271c429e885fc5ecdc77f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 86000 f96e58f5f41fecec7deed5e24df0b714\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 29090 76b983db144df6d9ee771fdce7029ca6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 39770 d1b068bb72fcf316156878c7970ab373\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 71146 ddae881a5548dfc43778a72de0c64f26\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 5500 34d41df49453a7d36f16fb1dd24db6e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 31580 850469c10a719fef4d80bf9162b845ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 52938 4d6071502a847a572fa66d99920fec88\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 104448 7832f619154558c2cab1d03eb896b125\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 38622 df81ddcb826807946f82069b1e1a6a43\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 114568 4bc16f98c3fa2053954a2bb3f7acc4d2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 190646 eb1382c61174e9bae6bfdc6e6e401e98\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 86538 53a7321e67d1ef5886bc97345ea65f3e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 1389502 8306eb54c3640159b9f08ff6e6b2f29b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-386_2.6.10-34.4_i386.deb\r\n Size/MD5: 313384 f66fd0977b03e7dd7f0214c62f47b91a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686-smp_2.6.10-34.4_i386.deb\r\n Size/MD5: 308948 8dd9e78a1943e479aa0dae0e26526f4c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686_2.6.10-34.4_i386.deb\r\n Size/MD5: 311196 b9940d417b4dd26a97db35d93e221c93\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7-smp_2.6.10-34.4_i386.deb\r\n Size/MD5: 309152 6ceaa7d2a2608427503cdae992c1a0b4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7_2.6.10-34.4_i386.deb\r\n Size/MD5: 311306 5f48f618c6375c4c5e9a62cc558ef9f3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_i386.deb\r\n Size/MD5: 6133154 bfb429c7674a9aed5cf4f50801043acf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-386_2.6.10-34.4_i386.deb\r\n Size/MD5: 15611142 f798f9c9d08bdf0ad17d98a5d32419f7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686-smp_2.6.10-34.4_i386.deb\r\n Size/MD5: 16187540 c9ef6d027e3ccb35602e217ccfacf4a8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686_2.6.10-34.4_i386.deb\r\n Size/MD5: 16606154 357b76381f4582f084c66886ccdd5b45\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7-smp_2.6.10-34.4_i386.deb\r\n Size/MD5: 16294386 4d9d2ee80fcbdab06aa498282ea8dc54\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7_2.6.10-34.4_i386.deb\r\n Size/MD5: 16671724 08f654e995fefcd22ac8b5796e4b8b37\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_i386.deb\r\n Size/MD5: 1345436 c0950b5b624e314ee6d4c25a4c86ee57\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 14074 1bac2a7dd02bb7b9d295c68b83d70aa6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 183160 600f0c2daa02218e1ce41b24e2d3eb76\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 172738 8d3551377c4db082ebdd7f662652646c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 967776 fb33397fc93defb6caea6da53b15caee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 780704 dab5953d0c85d39ffdbfc8c2d8ab294b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 140652 dd03b224f23e7ac4a9d159af609224d5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 167958 2ca7c46af16597a0daf41f64b10d9db8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 9340 c35aece8d1b9990ca05692ba780cdf16\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 89324 57e508e34fa99d19104780918cab302e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 48130 eb4ea28a87fc027482246d97b5626899\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 30882 9454b412769a75d8c824561eadf62db6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 65890 ff683c39e4b989c1315a8c203633e9ec\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 4500 cf6d5176a96775a82371eb883063183d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 7750 0f3edff0714149fa18539f54407ee5df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 50772 5002eb27a78dd0164f50d8153e3b3e5d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 111586 249e36cf94a9f4da0deddf662f1ff0c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 9890 7658d131f0f492bd48bff35e64f4ced8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 57146 e7e56adfede67694e7b76d51d5e04edb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 241930 a1ae0a86b71761e1776d5dd76b55c21a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 66226 6adddaf96a50183939a4a0e22b3a4ff2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 436516 8b63963c51b1ec04420d068ebebbea94\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 485666 9ce812efd370a2e8d248ab43984880fd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 11470 5e43542b223c13898d77ba4a8e273193\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 21240 3005e76d6d59a7630d82baedd092af89\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 29524 e3a0cdc7879b18ae0631e0ca14e8eb9d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 106140 7f220883426d1b17cdeed44ea1d2174b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 33818 a98c73148bfe00e48314222e2d0139ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-386-di_2.6.10-34.4_i386.udeb\r\n Size/MD5: 261336 62ef9590de3e912383969f2197b6cc00\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 24052 abc25938a2b1e6d1de8c258fd3b2ff09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 24050 a6e734975aadd9eac25f2188cd537d1e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 24036 04752ff30bea278fd74a30332c027088\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 58274 e185737861b39d526be448f5075a44d2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 58278 7de5e5723f3f4925a2952288836670e5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 58264 5d1ac6ea1c2813b6a9b286617cdc8dbd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30286 46dd898ac6263ec0bc37246992df0d6f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30284 dc63a525784387fe2a8b11709382a83b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30262 601200b0d70b58f217adf2d75c586a59\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 109256 5b7ac7750db740a1871b209fa8dec2d7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 109254 1620597776fdaa117c1f60c852ef184a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 109226 c8604627c649578cee5c1477b0a4a03c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35384 1552df305c8b64db2654190188b8a93f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35380 ba6bb83f878f291f9bdb0e35d15f4673\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35380 286ce7234264d10133d13d00bc9ee726\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30934 9d0ca7d879a298c13f914df7d6d71cc6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30932 fb267c2199cfd65d21a1af13bdc71c6a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 30914 8af0e49bbf3c04e69fce71ad5a5b7f06\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 212962 4c06439a55b889b39e6bd0ab76dec4d1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 212950 282471171b183a704d148b6ae4ceb5a3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 212930 68b795c8b3015a5ec7cb934a6d48cee5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 6166 d24b91f0c72482aa7988f67c1e9ec899\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 6164 9a7834b0dd749398f777d17893ecd228\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 6156 4ecfd79e504f9e20df37a70266a58570\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 43422 5cbade59079e7fb4ee21d81c01f90815\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 43416 856868a1c1e6c92f5216f5b03d4d0902\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 43422 a7995f72bdd1ce689793a92767605db6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 4582 c0fe9553c17d6668b545ee025c76366c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 4586 ffdff9ffecf48ba5d084b97ac9343c08\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 4590 23483028a94dd59b980cd918098bee2b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66004 c7e9c5e2b51c040e93a24bb0e91127f2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 65992 2a0482a7c789593e418732cef226df1c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66002 a9ddbe1988133503ba0749ca79541904\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 117104 dcf6f4179e46d476a3a7b1c095d34629\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 117104 740994399f2cd9249273e5657d3365d6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 116854 0bad2ab33539f124797b20967db0e251\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66632 2c0c68f4af7e27f7dd1c1b55f1c04811\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66628 6791905b4d99c4863e91c7e177281dd6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 66626 de6019978daa56e20067d34863152736\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 142064 5cb5408755a2288c27378280be9eccb7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 142060 cfa6b645e81bdaea47f87eeac15483bb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 142060 05a5254948ac70029db1835074865750\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213964 9219869952bf8531856b574ffa74aa47\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213972 35d11ed0bebb6dc163815f7240e8a173\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213880 3f38edccc43485077cce0ae5091cdb9f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 107006 6190487d80141d37710f23557b525e5d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 107002 51da3578513b1233d8a662869f1e9d22\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 107008 8a188ee440b32700bfb6cfa2f3ac3cf1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 1866202 3b03b8f24408f780499a2280ab5914a6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 1870588 f88e18156ae774b0c5f65179f86195ae\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 1900896 91464e45b94aef452f98299e6e26af11\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 249258 980ad70aaf96f3f211e7b19dc7fdd86e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 248698 8cafb8a776bd39eb4438a38b78ec3051\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 248980 6ff81e40b4b746df89d515388127afb4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 248514 3fffb5b8a615a1e8446b68ba3df3e39a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 249542 4ae94182401b51c9186c817afffb1270\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 250280 efefb8b619fedb90072122e93a8b8dd5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 6154248 61bd2cb9c413ab3491b9ae9406ccaf50\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15640972 3d2c68fa213750fd802ca6161502e6a1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15206638 d96473548cc05ea4afbaf2936c37d907\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15634972 b165001d375e4f681b8ccb9489673d23\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15203542 19ad28dc6b46cbe57a709526de9f1883\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc-smp_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15549118 cdba867e5b824bd8b82488864e92bb37\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 15239942 b35e338e07cf4e3082bb6e9ec8981e09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.4_powerpc.deb\r\n Size/MD5: 1350442 2d992bd6f0940acc06fe578a1fe50df4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 17356 1fbf0503244841ccc2cca1376f9dfe07\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 17350 bc18075b026098a566aab6b8d37e5f53\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 17348 b92c52442e03132c35dccd51f031433d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213700 e8cbef93f620de254f38b16d94c8cad7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213704 1b236bbc45581c8a44c7653d7ef74225\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 213456 cf3e1620175520ec68df43c0561a2e1d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 210744 ae1e3581a81798fc87d6a3e12ed8fe68\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 210738 c139802d773a9edf9f548f6a411d38bc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 210746 2b4741a7b048c9cc2f2fdba21848931c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 688402 4d8ba23ea3ccd23b502208203ac8fbb5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 688390 cd35997285931206e6edaf9d1c7a48b5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 686902 1c07f36b031d25333df2203e27bd2bc8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 780756 809f17eac747631ee615564a5220e368\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 780760 10241efc871efe6c693008d806012a3f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 780754 728bb28daa6c1e28b3db25ba498835b5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 511224 a69435af26ba591e456ae346043ed409\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 511208 4ebaad08d54181a924c275743a33182d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 510820 fdb5ceb1fa2455eea15e2f284a0184c2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 257728 41aeb60fee29134ecc400924b9450077\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 257740 e10ecec651e3769346346672a4b77f74\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 256836 6e57d0e84467c3acf6539501720d89dc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 84380 b22a548620e355c07e5a3c8f2591bd78\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 84376 a8585fd6f9857f27f2f91f15bce13279\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 84348 15c2f42f7ef574dfedb693bec36c711a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 60978 054ca4f16b23dff4177f2833d8fb9ea7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 60978 108192a0f49156783ed62a55acccde3a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 60988 7bd3fa858adcdf474a1bc60910e92d35\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 64992 31ae64714539561096ab9a75095de30b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 64982 355505547976c14bbe139ca789e92873\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 64986 e70294d49e5c0d10cbbe0515060cbc0d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 5382 c4e5f79a8b43b58b9a3146289c0b1d82\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 5370 5fd0a5c57471a590421c623262bade18\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 5372 ed68cb495810074bbc2a521c33bf8c7d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63274 f2cba33f50a346ad93077daf585768a4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63278 6dce997e84418d3788b6690ee8194060\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63236 72b78c7fb5387e3161cf77b5af58afa9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 131650 a56e73735c1704020a2ee1fe501e79ba\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 131656 2dc16c18005bb067d91580778dbae86b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 131658 7a603fd568409f78b819314afefbf422\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 70972 f3531083b555d16dd21c2ffb93ff04bc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 70966 17be0d275f722064e30435c2bded8b99\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 70954 d687ecc45c59809e129f792deb69e1b4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 357314 c87339fdacfb0480e8443fbaf4f139f8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 357314 d7acafdee379e58485fbca448221ecbb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 357316 2993896bd530953dd16bb770bcdd1ff3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 80736 2e84feb28afa95eabb5617f2597a061a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 80728 faabb575292c21b835a54de5375c3fa2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 80730 b0759874f1d0c1294419cf0915f2b796\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 510996 b81d9bf2579b8fcca23b0aab66d4d28a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 510960 e5b50081348bc3af756216675a891996\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 510768 1ad843acc177777866d32791c4a69ea2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 389138 2dfe82992d82f2b15afb4ebbe5cedc21\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 389106 4d1230c31370601a32295eb387e2bc36\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 389008 cc4035e395b40d79fa97e7f865dd61b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63152 bfb4a55b3affd9c4ea770c62133e80c8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63156 2de449953957fdd1b34a3186a54b14c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 63036 3e95675cd14231f7768726a93d804160\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 23352 e9ccec94846d519150a4e47be2beb0cd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 23342 dc6cbc746043ac814b01101bb36681a9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 23106 55dc74da748e726a127836501b681b93\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35380 4267ca2d2e8477e2479a0802f1d4765f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35384 9cb4434b76aca13bc2c509d370d18358\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 35372 a3377e7a166ee10d093914c04230b068\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 135020 41efac30647f0d5159d9e9fdaa15e695\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 135002 6171459fc37d36c95f4f151c9f9ae00e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 134994 7b7c9557b7b55ee6f31236776b3d9b11\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 42402 f1c63319e3bb1b2d3a0ad1cdcf5920f7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 42396 e403ab194ff512d4b9f8d3d0207803b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 42398 27603e03819ba38ab5fd4620a5993be4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power3-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 294748 3947fda076c41887667e552f6c95b671\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power4-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 294752 4d38b285cc09b059d09a585ed7a3644a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-powerpc-di_2.6.10-34.4_powerpc.udeb\r\n Size/MD5: 294744 49b5f5c12fe75167a0f572b55336ae6b", "edition": 1, "modified": "2005-08-22T00:00:00", "published": "2005-08-22T00:00:00", "id": "SECURITYVULNS:DOC:9541", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:9541", "title": "[USN-169-1] Linux kernel vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "cvelist": ["CVE-2005-2457", "CVE-2005-3181", "CVE-2005-2872", "CVE-2005-3273", "CVE-2005-2099", "CVE-2005-2873", "CVE-2005-2490", "CVE-2005-2098", "CVE-2005-3179", "CVE-2005-3275", "CVE-2005-3274", "CVE-2005-3053", "CVE-2005-3044", "CVE-2005-3257", "CVE-2005-2800", "CVE-2005-1764", "CVE-2005-3180", "CVE-2005-2492", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-3055", "CVE-2005-3271", "CVE-2005-2458", "CVE-2005-3276"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:220\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : November 30, 2005\r\n Affected: 10.2\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n The kernel on x86_64 platforms does not use a guard page for the 47-bit\r\n address page to protect against an AMD K8 bug which allows a local user\r\n to cause a DoS (CVE-2005-1764).\r\n \r\n The KEYCTL_JOIN_SESSION_KEYRING operation in versions prior to 2.6.12.5\r\n contains an error path that does not properly release the session\r\n management semaphore, which allows local users or remote attackers to\r\n cause a DoS (semaphore hang) via a new session keyring with an empty\r\n name string, a long name string, the key quota reached, or ENOMEM\r\n (CVE-2005-2098).\r\n \r\n Kernels prior to 2.6.12.5 do not properly destroy a keyring that is not\r\n instantiated properly, allowing a local user or remote attacker to\r\n cause a DoS (oops) via a keyring with a payload that is not empty\r\n (CVE-2005-2099).\r\n \r\n An array index overflow in the xfrm_sk_policy_insert function in\r\n xfrm_user.c allows local users to cause a DoS (oops or deadlock) and\r\n possibly execute arbitrary code (CVE-2005-2456).\r\n \r\n The zisofs driver in versions prior to 2.6.12.5 allows local users and\r\n remove attackers to cause a DoS (crash) via a crafted compressed ISO\r\n filesystem (CVE-2005-2457).\r\n \r\n inflate.c in the zlib routines in versions prior to 2.6.12.5 allow\r\n remove attackers to cause a DoS (crash) via a compressed file with\r\n "improper tables" (CVE-2005-2458).\r\n \r\n The huft_build function in inflate.c in the zlib routines in versions\r\n prior to 2.6.12.5 returns the wrong value, allowing remote attackers to\r\n cause a DoS (crash) via a certain compressed file that leads to a null\r\n pointer dereference (CVE-2005-2459).\r\n \r\n A stack-based buffer overflow in the sendmsg function call in versions\r\n prior to 2.6.13.1 allow local users to execute arbitrary code by\r\n calling sendmsg and modifying the message contents in another thread\r\n (CVE-2005-2490).\r\n \r\n The raw_sendmsg function in versions prior to 2.6.13.1 allow local\r\n users to cause a DoS (change hardware state) or read from arbitrary\r\n memory via crafted input (CVE-2005-2492).\r\n \r\n A memory leak in the seq_file implementation in the SCSI procfs\r\n interface (sg.c) in 2.6.13 and earlier allows a local user to cause a\r\n DoS (memory consumption) via certain repeated reads from\r\n /proc/scsi/gs/devices file which is not properly handled when the\r\n next() interator returns NULL or an error (CVE-2005-2800).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 when running on 64bit\r\n processors allows remote attackers to cause a DoS (kernel panic) via\r\n certain attacks such as SSH brute force (CVE-2005-2872).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 does not properly\r\n perform certain tests when the jiffies value is greater than LONG_MAX,\r\n which can cause ipt_recent netfilter rules to block too early\r\n (CVE-2005-2873).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n The sys_set_mempolicy function in mempolicy.c allows local users to\r\n cause a DoS via a negative first argument (CVE-2005-3053).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n drm.c in version 2.6.13 and earlier creates a debug file in sysfs with\r\n world-readable and world-writable permissions, allowing local users to\r\n enable DRM debugging and obtain sensitive information (CVE-2005-3179).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n Exec does not properly clear posix-timers in multi-threaded\r\n environments, which result in a resource leak and could allow a large\r\n number of multiple local users to cause a DoS by using more posix-\r\n timers than specified by the quota for a single user (CVE-2005-3271).\r\n \r\n The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\r\n does not properly verify the ndigis argument for a new route, allowing\r\n an attacker to trigger array out-of-bounds errors with a large number\r\n of digipeats (CVE-2005-3273).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The NAT code in versions prior to 2.6.13 incorrectly declares a\r\n variable to be static, allowing remote attackers to cause a DoS (memory\r\n corruption) by causing two packets for the same protocol to be NATed at\r\n the same time (CVE-2005-3275).\r\n \r\n The sys_get_thread_area function in process.c in versions prior to\r\n 2.6.12.4 and 2.6.13 does not clear a data structure before copying it\r\n to userspace, which may allow a user process to obtain sensitive\r\n information (CVE-2005-3276).\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1764\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2098\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2099\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3053\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3179\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 10.2:\r\n 2c46bb090164d04e6c45a0abef9d5756 10.2/RPMS/kernel-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 1f527287a66e776825c6a665a9b62ccf 10.2/RPMS/kernel-i586-up-1GB-2.6.11.13mdk-1-1mdk.i586.rpm\r\n df151a56daf78664f6ac4dcf99ffbf4a 10.2/RPMS/kernel-i686-up-4GB-2.6.11.13mdk-1-1mdk.i586.rpm\r\n b531e97efe37e4cc41fba8fea177317b 10.2/RPMS/kernel-smp-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 243fc4fbd27117ecf95a8c9d856a22cb 10.2/RPMS/kernel-source-2.6-2.6.11-13mdk.i586.rpm\r\n 841f4b9e8f333ae07af81fbb295e7b89 10.2/RPMS/kernel-source-stripped-2.6-2.6.11-13mdk.i586.rpm\r\n dafc4f7aa34f21434ce2d1ec76b8b80f 10.2/RPMS/kernel-xbox-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 7369eb7eaf212a81d56f3d3df895f909 10.2/SRPMS/kernel-2.6.11.13mdk-1-1mdk.src.rpm\r\n\r\n Mandriva Linux 10.2/X86_64:\r\n d82156477b51547a270c7cda5a8ac5a1 x86_64/10.2/RPMS/kernel-2.6.11.13mdk-1-1mdk.x86_64.rpm\r\n f7e6d8f44813da237726c757cf4a4958 x86_64/10.2/RPMS/kernel-smp-2.6.11.13mdk-1-1mdk.x86_64.rpm\r\n b0b6f0422937ce40d421cf607dd5c57b x86_64/10.2/RPMS/kernel-source-2.6-2.6.11-13mdk.x86_64.rpm\r\n 42f78955e8bc151d36ae5bb3e1493c25 x86_64/10.2/RPMS/kernel-source-stripped-2.6-2.6.11-13mdk.x86_64.rpm\r\n 7369eb7eaf212a81d56f3d3df895f909 x86_64/10.2/SRPMS/kernel-2.6.11.13mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDjfmdmqjQ0CJFipgRAq87AKCc30fj1YTM9/J6R1uwqUZ5bUGx5QCgiUMa\r\n9yaj33KlDIs4ThWlTKKwFJ0=\r\n=Etvq\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2005-12-01T00:00:00", "published": "2005-12-01T00:00:00", "id": "SECURITYVULNS:DOC:10475", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10475", "title": "MDKSA-2005:220 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "cvelist": ["CVE-2004-2302", "CVE-2005-2457", "CVE-2005-3181", "CVE-2004-1333", "CVE-2005-3273", "CVE-2005-0180", "CVE-2005-3275", "CVE-2005-3274", "CVE-2005-3044", "CVE-2005-3257", "CVE-2005-0210", "CVE-2005-2800", "CVE-2005-3180", "CVE-2005-0449", "CVE-2005-3055", "CVE-2005-3271", "CVE-2005-2555", "CVE-2005-3276"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:218\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : November 30, 2005\r\n Affected: Corporate 3.0, Multi Network Firewall 2.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n An integer overflow in vc_resize (CAN-2004-1333).\r\n \r\n A race condition in the sysfs_read_file and sysfs_write_file functions\r\n in 2.6.10 and earlier allows local users to read kernel memory and\r\n cause a DoS (crash) via large offsets in sysfs files (CAN-2004-2302).\r\n \r\n An integer signedness error in scsi_ioctl.c (CVE-2005-0180).\r\n \r\n Netfilter allows a local user to cause a DoS (memory consumption) via\r\n certain packet fragments that are reassembled twice, which causes a\r\n data structure to be allocated twice (CVE-2005-0210).\r\n \r\n The netfilter/iptables module in versions prior to 2.6.8.1 allow remote\r\n attackers to cause a DoS (crash) or bypass firewall rules via crafted\r\n packets, which are not properly handled by skb_checksum_help function\r\n (CVE-2005-0449).\r\n \r\n The zisofs driver in versions prior to 2.6.12.5 allows local users and\r\n remove attackers to cause a DoS (crash) via a crafted compressed ISO\r\n filesystem (CVE-2005-2457).\r\n \r\n The kernel does not properly restrict socket policy access to users\r\n with the CAP_NET_ADMIN capability, which could allow local users to\r\n conduct unauthorized activities via ipv4/ip_sockglue.c and\r\n ipv6/ipv6_sockglue.c (CVE-2005-2555).\r\n \r\n A memory leak in the seq_file implementation in the SCSI procfs\r\n interface (sg.c) in 2.6.13 and earlier allows a local user to cause a\r\n DoS (memory consumption) via certain repeated reads from\r\n /proc/scsi/gs/devices file which is not properly handled when the\r\n next() interator returns NULL or an error (CVE-2005-2800).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n Exec does not properly clear posix-timers in multi-threaded\r\n environments, which result in a resource leak and could allow a large\r\n number of multiple local users to cause a DoS by using more posix-\r\n timers than specified by the quota for a single user (CVE-2005-3271).\r\n \r\n The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\r\n does not properly verify the ndigis argument for a new route, allowing\r\n an attacker to trigger array out-of-bounds errors with a large number\r\n of digipeats (CVE-2005-3273).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The NAT code in versions prior to 2.6.13 incorrectly declares a\r\n variable to be static, allowing remote attackers to cause a DoS (memory\r\n corruption) by causing two packets for the same protocol to be NATed at\r\n the same time (CVE-2005-3275).\r\n \r\n The sys_get_thread_area function in process.c in versions prior to\r\n 2.6.12.4 and 2.6.13 does not clear a data structure before copying it\r\n to userspace, which may allow a user process to obtain sensitive\r\n information (CVE-2005-3276).\r\n \r\n The following non-security fixes are also applied:\r\n \r\n Support for the arp_ignore and arp_announce sysctls were added to the\r\n Corporate 3 kernels (bugzilla #16346).\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0449\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3271\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276\r\n http://qa.mandriva.com/show_bug.cgi?id=16346\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Corporate 3.0:\r\n 7e38bcdc8a3900485d17d08e13963700 corporate/3.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.i586.rpm\r\n be4dc943991be67f9f612ac5ca2f6c10 corporate/3.0/RPMS/kernel-enterprise-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 9acc6e90b1a8620be6af552baa8524ab corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 1a171d91312764089f2f0c84a6e9131a corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n e6f42b56669ca4ac5515d728051c4f88 corporate/3.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 5f3e473fae7614433328756156f2b953 corporate/3.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.i586.rpm\r\n c98b0f07cb49a918201d2daa1ac23e7c corporate/3.0/RPMS/kernel-source-2.6.3-29mdk.i586.rpm\r\n e816bcde98728e85a86c565259364f8a corporate/3.0/RPMS/kernel-source-stripped-2.6.3-29mdk.i586.rpm\r\n b2497e007272f38b30e98b4231a77a76 corporate/3.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n\r\n Corporate 3.0/X86_64:\r\n 5261e06d1085ff9c61bf29789f10669f x86_64/corporate/3.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n 3cb631841cf4e9d29e1f667d940d9ab4 x86_64/corporate/3.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n 61024ad1c23dbde624c3cd43c8805f26 x86_64/corporate/3.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.x86_64.rpm\r\n ba1514dcafcc748796bd9b23cd1905e4 x86_64/corporate/3.0/RPMS/kernel-source-2.6.3-29mdk.x86_64.rpm\r\n 48a9eb1de36653665e6d7de333d25cb0 x86_64/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-29mdk.x86_64.rpm\r\n b2497e007272f38b30e98b4231a77a76 x86_64/corporate/3.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n\r\n Multi Network Firewall 2.0:\r\n 7e38bcdc8a3900485d17d08e13963700 mnf/2.0/RPMS/kernel-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 9acc6e90b1a8620be6af552baa8524ab mnf/2.0/RPMS/kernel-i686-up-4GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 1a171d91312764089f2f0c84a6e9131a mnf/2.0/RPMS/kernel-p3-smp-64GB-2.6.3.29mdk-1-1mdk.i586.rpm\r\n e6f42b56669ca4ac5515d728051c4f88 mnf/2.0/RPMS/kernel-secure-2.6.3.29mdk-1-1mdk.i586.rpm\r\n 5f3e473fae7614433328756156f2b953 mnf/2.0/RPMS/kernel-smp-2.6.3.29mdk-1-1mdk.i586.rpm\r\n b2497e007272f38b30e98b4231a77a76 mnf/2.0/SRPMS/kernel-2.6.3.29mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDjfSCmqjQ0CJFipgRAivNAKCf9uIkAEZu5hRDk/tDe6Y89813zQCdEqFD\r\nAr/Lnzyy9a037hb4fBSiHsc=\r\n=Ohmy\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2005-12-01T00:00:00", "published": "2005-12-01T00:00:00", "id": "SECURITYVULNS:DOC:10474", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10474", "title": "MDKSA-2005:218 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-09T17:44:49", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2801", "CVE-2005-2490", "CVE-2005-2800", "CVE-2005-2492", "CVE-2005-2802", "CVE-2005-1913"], "description": "Oleg Nesterov discovered a local Denial of Service vulnerability in \nthe timer handling. When a non group-leader thread called exec() to \nexecute a different program while an itimer was pending, the timer \nexpiry would signal the old group leader task, which did not exist any \nmore. This caused a kernel panic. This vulnerability only affects \nUbuntu 5.04. (CAN-2005-1913)\n\nAl Viro discovered that the sendmsg() function did not sufficiently \nvalidate its input data. By calling sendmsg() and at the same time \nmodifying the passed message in another thread, he could exploit this \nto execute arbitrary commands with kernel privileges. This only \naffects the amd64 bit platform. (CAN-2005-2490)\n\nAl Viro discovered a vulnerability in the raw_sendmsg() function. By \ncalling this function with specially crafted arguments, a local \nattacker could either read kernel memory contents (leading to \ninformation disclosure) or manipulate the hardware state by reading \ncertain IO ports. This vulnerability only affects Ubuntu 5.04. \n(CAN-2005-2492)\n\nJan Blunck discovered a Denial of Service vulnerability in the procfs \ninterface of the SCSI driver. By repeatedly reading \n/proc/scsi/sg/devices, a local attacker could eventually exhaust \nkernel memory. (CAN-2005-2800)\n\nA flaw was discovered in the handling of extended attributes on ext2 \nand ext3 file systems. Under certain condidions, this could prevent \nthe enforcement of Access Control Lists, which eventually could lead \nto information disclosure, unauthorized program execution, or \nunauthorized data modification. This does not affect the standard Unix \npermissions. (CAN-2005-2801)\n\nChad Walstrom discovered a Denial of Service in the ipt_recent module, \nwhich can be used in netfilter (Firewall configuration). A remote \nattacker could exploit this to crash the kernel by sending certain \npackets (such as an SSH brute force attack) to a host which uses the \n\"recent\" module. (CAN-2005-2802)", "edition": 5, "modified": "2005-09-09T00:00:00", "published": "2005-09-09T00:00:00", "id": "USN-178-1", "href": "https://ubuntu.com/security/notices/USN-178-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-07-09T19:46:54", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2457", "CVE-2005-2099", "CVE-2005-2548", "CVE-2005-2098", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "David Howells discovered a local Denial of Service vulnerability in \nthe key session joining function. Under certain user-triggerable \nconditions, a semaphore was not released properly, which caused \nprocesses which also attempted to join a key session to hang forever. \nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2098)\n\nDavid Howells discovered a local Denial of Service vulnerability in \nthe keyring allocator. A local attacker could exploit this to crash \nthe kernel by attempting to add a specially crafted invalid keyring. \nThis only affects Ubuntu 5.04 (Hoary Hedgehog). (CAN-2005-2099)\n\nBalazs Scheidler discovered a local Denial of Service vulnerability in \nthe xfrm_compile_policy() function. By calling setsockopt() with an \ninvalid xfrm_user policy message, a local attacker could cause the \nkernel to write to an array beyond its boundaries, thus causing a \nkernel crash. (CAN-2005-2456)\n\nTim Yamin discovered that the driver for compressed ISO file systems \ndid not sufficiently validate the iput data. By tricking an user into \nmounting a malicious CD-ROM with a specially crafted compressed ISO \nfile system, he could cause a kernel crash. (CAN-2005-2457)\n\nIt was discovered that the kernel's embedded zlib compression library \nwas still vulnerable to two old vulnerabilities of the standalone zlib \nlibrary. This library is used by various drivers and can also be used \nby third party modules, so the impact varies. (CAN-2005-2458, \nCAN-2005-2459)\n\nPeter Sandstrom discovered a remote Denial of Service vulnerability in \nthe SNMP handler. Certain UDP packages lead to a function call with \nthe wrong argument, which resulted in a crash of the network stack. \nThis only affects Ubuntu 4.10 (Warty Warthog). (CAN-2005-2548)\n\nHerbert Xu discovered that the setsockopt() function was not \nrestricted to privileged users. This allowed a local attacker to \nbypass intended IPSec policies, set invalid policies to exploit flaws \nlike CAN-2005-2456, or cause a Denial of Service by adding policies \nuntil kernel memory is exhausted. Now the call is restricted to \nprocesses with the CAP_NET_ADMIN capability. (CAN-2005-2555)\n\nThe Ubuntu 5.04 kernel update also fixes a memory leak in the \"md\" \n(Software RAID) driver which eventually lead to kernel memory \nexhaustion. Ubuntu 4.10 is not affected by this. \n(<http://bugs.debian.org/317787>)", "edition": 5, "modified": "2005-08-19T00:00:00", "published": "2005-08-19T00:00:00", "id": "USN-169-1", "href": "https://ubuntu.com/security/notices/USN-169-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-07-09T17:34:11", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3272", "CVE-2005-3273", "CVE-2005-3275", "CVE-2005-3274", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3055", "CVE-2005-3271", "CVE-2005-3276"], "description": "", "edition": 5, "modified": "2005-11-22T00:00:00", "published": "2005-11-22T00:00:00", "id": "USN-219-1", "href": "https://ubuntu.com/security/notices/USN-219-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "suse": [{"lastseen": "2016-09-04T12:19:39", "bulletinFamily": "unix", "cvelist": ["CVE-2005-2457", "CVE-2005-0916", "CVE-2005-1765", "CVE-2005-2459", "CVE-2005-2456", "CVE-2005-2458", "CVE-2005-2555"], "description": "The Linux kernel was updated to fix the following security issues: - CAN-2005-2457: A problem in decompression of files on \"zisofs\" filesystem was fixed.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2005-09-01T14:31:41", "published": "2005-09-01T14:31:41", "id": "SUSE-SA:2005:050", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-09/msg00012.html", "title": "denial of service, local privilege escalation in kernel", "type": "suse", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2016-09-04T11:24:48", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0003", "CVE-2005-2801", "CVE-2004-1333", "CVE-2005-0529", "CVE-2005-0504", "CVE-2005-0736", "CVE-2005-0384", "CVE-2005-0530", "CVE-2005-0209", "CVE-2005-0210", "CVE-2005-0532", "CVE-2005-0867", "CVE-2005-0449", "CVE-2004-0814"], "description": "The Linux kernel is the core component of the Linux system.\n#### Solution\nNone. Please install the updated packages.", "edition": 1, "modified": "2005-03-24T16:30:19", "published": "2005-03-24T16:30:19", "id": "SUSE-SA:2005:018", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-03/msg00020.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:32:29", "bulletinFamily": "unix", "cvelist": ["CVE-2006-1056", "CVE-2006-0742", "CVE-2006-0457", "CVE-2006-1527", "CVE-2006-2271", "CVE-2005-4798", "CVE-2006-1242", "CVE-2006-1055", "CVE-2006-1863", "CVE-2006-0741", "CVE-2006-1524", "CVE-2006-0744", "CVE-2006-1523", "CVE-2006-0555", "CVE-2006-0095", "CVE-2006-1864", "CVE-2006-1342", "CVE-2006-0557", "CVE-2006-2272", "CVE-2006-0554", "CVE-2006-1525", "CVE-2006-2274"], "description": "The Linux kernel has been updated to fix various security problems, listed below.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2006-05-31T15:47:21", "published": "2006-05-31T15:47:21", "id": "SUSE-SA:2006:028", "href": "http://lists.opensuse.org/opensuse-security-announce/2006-05/msg00018.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:50:28", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-2872", "CVE-2005-3805", "CVE-2005-2490", "CVE-2005-1041", "CVE-2005-3275", "CVE-2005-3110", "CVE-2005-3807", "CVE-2005-3527", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-2800", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-2492", "CVE-2005-2459", "CVE-2005-3055", "CVE-2005-2458"], "description": "The Linux kernel was updated to fix several security problems and several bugs, listed below:\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2005-12-14T15:10:59", "published": "2005-12-14T15:10:59", "id": "SUSE-SA:2005:068", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-12/msg00011.html", "type": "suse", "title": "denial of service in kernel", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}]}