{"cve": [{"lastseen": "2020-12-09T19:28:23", "description": "Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.", "edition": 7, "cvss3": {}, "published": "2008-07-02T16:41:00", "title": "CVE-2008-2826", "type": "cve", "cwe": ["CWE-190"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-2826"], "modified": "2020-08-25T20:28:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:7.10", "cpe:/o:debian:debian_linux:4.0", "cpe:/o:canonical:ubuntu_linux:6.06", "cpe:/o:opensuse:opensuse:11.0", "cpe:/o:canonical:ubuntu_linux:8.04", "cpe:/o:opensuse:opensuse:10.3", "cpe:/o:canonical:ubuntu_linux:7.04"], "id": "CVE-2008-2826", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2826", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:28:21", "description": "Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.", "edition": 5, "cvss3": {}, "published": "2008-05-02T16:05:00", "title": "CVE-2008-1294", "type": "cve", "cwe": ["CWE-399", "CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-1294"], "modified": "2018-10-30T16:25:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.20.9", "cpe:/o:linux:linux_kernel:2.6.18.1", "cpe:/o:linux:linux_kernel:2.6.16.49", "cpe:/o:linux:linux_kernel:2.6.19.1", "cpe:/o:linux:linux_kernel:2.6.16.4", "cpe:/o:linux:linux_kernel:2.6.16.15", "cpe:/o:linux:linux_kernel:2.6.16.3", "cpe:/o:linux:linux_kernel:2.6.21", "cpe:/o:linux:linux_kernel:2.6.16.20", "cpe:/o:linux:linux_kernel:2.6.16.9", "cpe:/o:linux:linux_kernel:2.6.16.10", "cpe:/o:linux:linux_kernel:2.6.16_rc7", "cpe:/o:linux:linux_kernel:2.6.16.50", "cpe:/o:linux:linux_kernel:2.6.16.40", "cpe:/o:linux:linux_kernel:2.6.16.22", "cpe:/o:linux:linux_kernel:2.6.16.5", "cpe:/o:linux:linux_kernel:2.6.21.1", "cpe:/o:linux:linux_kernel:2.6.16.44", "cpe:/o:linux:linux_kernel:2.6.16.18", "cpe:/o:linux:linux_kernel:2.6.17.11", "cpe:/o:linux:linux_kernel:2.6.16.29", "cpe:/o:linux:linux_kernel:2.6.16.27", "cpe:/o:linux:linux_kernel:2.6.17.2", "cpe:/o:linux:linux_kernel:2.6.16.21", "cpe:/o:linux:linux_kernel:2.6.19", "cpe:/o:linux:linux_kernel:2.6.16.51", "cpe:/o:linux:linux_kernel:2.6.17.1", "cpe:/o:linux:linux_kernel:2.6.16.30", "cpe:/o:linux:linux_kernel:2.6.20.15", "cpe:/o:linux:linux_kernel:2.6.16.53", "cpe:/o:linux:linux_kernel:2.6.20.11", "cpe:/o:linux:linux_kernel:2.6.19.2", "cpe:/o:linux:linux_kernel:2.6.17.10", "cpe:/o:linux:linux_kernel:2.6.16.19", "cpe:/o:linux:linux_kernel:2.6.20", "cpe:/o:linux:linux_kernel:2.6.16.34", "cpe:/o:linux:linux_kernel:2.6.16.14", "cpe:/o:linux:linux_kernel:2.6.18", "cpe:/o:linux:linux_kernel:2.6.20.8", "cpe:/o:linux:linux_kernel:2.6.16.48", "cpe:/o:linux:linux_kernel:2.6.16.12", "cpe:/o:linux:linux_kernel:2.6.20.14", "cpe:/o:linux:linux_kernel:2.6.17.13", "cpe:/o:linux:linux_kernel:2.6.20.12", "cpe:/o:linux:linux_kernel:2.6.16.39", "cpe:/o:linux:linux_kernel:2.6.20.3", "cpe:/o:linux:linux_kernel:2.6.16.8", "cpe:/o:linux:linux_kernel:2.6.16.25", "cpe:/o:linux:linux_kernel:2.6.18.5", "cpe:/o:linux:linux_kernel:2.6.16.17", "cpe:/o:linux:linux_kernel:2.6.16.26", "cpe:/o:linux:linux_kernel:2.6.16.32", "cpe:/o:linux:linux_kernel:2.6.16.1", "cpe:/o:linux:linux_kernel:2.6.17.3", "cpe:/o:linux:linux_kernel:2.6.16.33", "cpe:/o:linux:linux_kernel:2.6.21.4", "cpe:/o:linux:linux_kernel:2.6.19.3", "cpe:/o:linux:linux_kernel:2.6.18.3", "cpe:/o:linux:linux_kernel:2.6.18.6", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.16.36", "cpe:/o:linux:linux_kernel:2.6.16.37", "cpe:/o:linux:linux_kernel:2.6.17.9", "cpe:/o:linux:linux_kernel:2.6.18.2", "cpe:/o:linux:linux_kernel:2.6.20.6", "cpe:/o:linux:linux_kernel:2.6.20.2", "cpe:/o:linux:linux_kernel:2.6.17.8", "cpe:/o:linux:linux_kernel:2.6.17.14", "cpe:/o:linux:linux_kernel:2.6.16.7", "cpe:/o:linux:linux_kernel:2.6.18.7", "cpe:/o:linux:linux_kernel:2.6.16.47", "cpe:/o:linux:linux_kernel:2.6.20.5", "cpe:/o:linux:linux_kernel:2.6.16.38", "cpe:/o:linux:linux_kernel:2.6.17.12", "cpe:/o:linux:linux_kernel:2.6.16.16", "cpe:/o:linux:linux_kernel:2.6.16.2", "cpe:/o:linux:linux_kernel:2.6.20.7", "cpe:/o:linux:linux_kernel:2.6.17", "cpe:/o:linux:linux_kernel:2.6.16.31", "cpe:/o:linux:linux_kernel:2.6.20.4", "cpe:/o:linux:linux_kernel:2.6.16.52", "cpe:/o:linux:linux_kernel:2.6.16", "cpe:/o:linux:linux_kernel:2.6.16.46", "cpe:/o:linux:linux_kernel:2.6.16.41", "cpe:/o:linux:linux_kernel:2.6.16.45", "cpe:/o:linux:linux_kernel:2.6.17.7", "cpe:/o:linux:linux_kernel:2.6.16.28", "cpe:/o:linux:linux_kernel:2.6.18.4", "cpe:/o:linux:linux_kernel:2.6.21.3", "cpe:/o:linux:linux_kernel:2.6.16.24", "cpe:/o:linux:linux_kernel:2.6.17.6", "cpe:/o:linux:linux_kernel:2.6.20.1", "cpe:/o:linux:linux_kernel:2.6.17.4", "cpe:/o:linux:linux_kernel:2.6.16.6", "cpe:/o:linux:linux_kernel:2.6.18.8", "cpe:/o:linux:linux_kernel:2.6.16.35", "cpe:/o:linux:linux_kernel:2.6.20.13", "cpe:/o:linux:linux_kernel:2.6.16.11", "cpe:/o:linux:linux_kernel:2.6.20.10", "cpe:/o:linux:linux_kernel:2.6.17.5", "cpe:/o:linux:linux_kernel:2.6.16.23", "cpe:/o:linux:linux_kernel:2.6.21.2", "cpe:/o:linux:linux_kernel:2.6.16.13", "cpe:/o:linux:linux_kernel:2.6.16.43"], "id": "CVE-2008-1294", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1294", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T19:28:22", "description": "Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.", "edition": 5, "cvss3": {}, "published": "2008-05-16T12:54:00", "title": "CVE-2008-2136", "type": "cve", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-2136"], "modified": "2018-10-31T18:55:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:7.10", "cpe:/o:debian:debian_linux:4.0", "cpe:/o:canonical:ubuntu_linux:6.06", "cpe:/o:canonical:ubuntu_linux:8.04", "cpe:/o:canonical:ubuntu_linux:7.04"], "id": "CVE-2008-2136", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2136", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"]}, {"lastseen": "2020-12-09T19:28:23", "description": "The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.", "edition": 7, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2008-07-09T00:41:00", "title": "CVE-2008-2812", "type": "cve", "cwe": ["CWE-476"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-2812"], "modified": "2020-08-14T15:35:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:7.10", "cpe:/a:avaya:expanded_meet-me_conferencing:*", "cpe:/a:avaya:sip_enablement_services:-", "cpe:/o:debian:debian_linux:4.0", "cpe:/a:avaya:communication_manager:*", "cpe:/o:canonical:ubuntu_linux:6.06", "cpe:/o:suse:suse_linux_enterprise_desktop:10", "cpe:/a:avaya:sip_enablement_services:4.0", "cpe:/o:novell:linux_desktop:9", "cpe:/o:opensuse:opensuse:11.0", "cpe:/a:avaya:messaging_storage_server:4.0", "cpe:/o:canonical:ubuntu_linux:8.04", "cpe:/a:avaya:intuity_audix_lx:2.0", "cpe:/a:avaya:meeting_exchange:5.0", "cpe:/a:avaya:proactive_contact:4.0", "cpe:/o:opensuse:opensuse:10.3", "cpe:/o:suse:suse_linux_enterprise_server:10", "cpe:/a:avaya:message_networking:3.1", "cpe:/o:canonical:ubuntu_linux:7.04"], "id": "CVE-2008-2812", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2812", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:avaya:communication_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:messaging_storage_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:meeting_exchange:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", "cpe:2.3:a:avaya:intuity_audix_lx:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:sip_enablement_services:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*", "cpe:2.3:a:avaya:proactive_contact:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:sip_enablement_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:avaya:expanded_meet-me_conferencing:*:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2018-04-09T11:41:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-1294", "CVE-2008-2826", "CVE-2008-2812"], "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:1361412562310870017", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870017", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0612-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0612-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * a possible kernel memory leak was found in the Linux kernel Simple\n Internet Transition (SIT) INET6 implementation. This could allow a local\n unprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n \n * a flaw was found in the Linux kernel setrlimit system call, when setting\n RLIMIT_CPU to a certain value. This could allow a local unprivileged user\n to bypass the CPU time limit. (CVE-2008-1294, Moderate)\n \n * multiple NULL pointer dereferences were found in various Linux kernel\n network drivers. These drivers were missing checks for terminal validity,\n which could allow privilege escalation. (CVE-2008-2812, Moderate)\n \n These updated packages fix the following bugs:\n \n * the GNU libc stub resolver is a minimal resolver that works with Domain\n Name System (DNS) servers to satisfy requests from applications for names.\n The GNU libc stub resolver did not specify a source UDP port, and therefore\n used predictable port numbers. This could have made DNS spoofing attacks\n easier.\n \n The Linux kernel has been updated to implement random UDP source ports\n where none are specified by an application. This allows applications, such\n as those using the GNU libc stub resolver, to use random UDP source ports,\n helping to make DNS spoofing attacks harder.\n \n * when using certain hardware, a bug in UART_BUG_TXEN may have caused\n incorrect hardware detection, causing data flow to "/dev/ttyS1" to hang.\n \n * a 50-75% drop in NFS server rewrite performance, compared to Red Hat\n Enterprise Linux 4.6, has been resolved.\n \n * due a bug in the fast userspace mutex code, while one thread fetched a\n pointer, another thread may have removed it, causing the first thread to\n fetch the wrong pointer, possibly causing a system crash.\n \n * on certain Hitachi hardware, removing the "uhci_hcd" module caused a\n kernel oops, and the following error:\n \n BUG: warning at arch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n \n Even after the "uhci_hcd" module was reloaded, there was no access to USB\n devices. As well, on systems that have legacy interrupts,\n "acpi_unregister_gsi" incorrectly called "iosapci_unregister_intr()",\n causing warning messages to be logged.\n \n * when a page was mapped with mmap(), and "PROT_WRITE" was the only\n "prot" argument, the first read of that page caused a segmentation fault.\n If ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-August/msg00000.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870017\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0612-01\");\n script_cve_id(\"CVE-2008-2136\", \"CVE-2008-1294\", \"CVE-2008-2812\", \"CVE-2008-2826\");\n script_name( \"RedHat Update for kernel RHSA-2008:0612-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:56:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-1294", "CVE-2008-2826", "CVE-2008-2812"], "description": "Check for the Version of kernel", "modified": "2017-07-12T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:870017", "href": "http://plugins.openvas.org/nasl.php?oid=870017", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0612-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0612-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issues:\n \n * a possible kernel memory leak was found in the Linux kernel Simple\n Internet Transition (SIT) INET6 implementation. This could allow a local\n unprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n \n * a flaw was found in the Linux kernel setrlimit system call, when setting\n RLIMIT_CPU to a certain value. This could allow a local unprivileged user\n to bypass the CPU time limit. (CVE-2008-1294, Moderate)\n \n * multiple NULL pointer dereferences were found in various Linux kernel\n network drivers. These drivers were missing checks for terminal validity,\n which could allow privilege escalation. (CVE-2008-2812, Moderate)\n \n These updated packages fix the following bugs:\n \n * the GNU libc stub resolver is a minimal resolver that works with Domain\n Name System (DNS) servers to satisfy requests from applications for names.\n The GNU libc stub resolver did not specify a source UDP port, and therefore\n used predictable port numbers. This could have made DNS spoofing attacks\n easier.\n \n The Linux kernel has been updated to implement random UDP source ports\n where none are specified by an application. This allows applications, such\n as those using the GNU libc stub resolver, to use random UDP source ports,\n helping to make DNS spoofing attacks harder.\n \n * when using certain hardware, a bug in UART_BUG_TXEN may have caused\n incorrect hardware detection, causing data flow to "/dev/ttyS1" to hang.\n \n * a 50-75% drop in NFS server rewrite performance, compared to Red Hat\n Enterprise Linux 4.6, has been resolved.\n \n * due a bug in the fast userspace mutex code, while one thread fetched a\n pointer, another thread may have removed it, causing the first thread to\n fetch the wrong pointer, possibly causing a system crash.\n \n * on certain Hitachi hardware, removing the "uhci_hcd" module caused a\n kernel oops, and the following error:\n \n BUG: warning at arch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n \n Even after the "uhci_hcd" module was reloaded, there was no access to USB\n devices. As well, on systems that have legacy interrupts,\n "acpi_unregister_gsi" incorrectly called "iosapci_unregister_intr()",\n causing warning messages to be logged.\n \n * when a page was mapped with mmap(), and "PROT_WRITE" was the only\n "prot" argument, the first read of that page caused a segmentation fault.\n If ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-August/msg00000.html\");\n script_id(870017);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0612-01\");\n script_cve_id(\"CVE-2008-2136\", \"CVE-2008-1294\", \"CVE-2008-2812\", \"CVE-2008-2826\");\n script_name( \"RedHat Update for kernel RHSA-2008:0612-01\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.10.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-1294", "CVE-2008-2812"], "description": "Oracle Linux Local Security Checks ELSA-2008-0612", "modified": "2018-09-28T00:00:00", "published": "2015-10-08T00:00:00", "id": "OPENVAS:1361412562310122564", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122564", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2008-0612", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2008-0612.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122564\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:48:03 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2008-0612\");\n script_tag(name:\"insight\", value:\"ELSA-2008-0612 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2008-0612\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2008-0612.html\");\n script_cve_id(\"CVE-2008-1294\", \"CVE-2008-2136\", \"CVE-2008-2812\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.10.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.10.0.1.el5~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.10.0.1.el5PAE~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.10.0.1.el5debug~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.10.0.1.el5xen~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.10.0.1.el5~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.10.0.1.el5PAE~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.10.0.1.el5debug~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.10.0.1.el5xen~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-12-12T11:20:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2826", "CVE-2008-3247", "CVE-2008-2372", "CVE-2008-2750", "CVE-2008-2812"], "description": "Check for the Version of kernel", "modified": "2017-12-08T00:00:00", "published": "2009-01-23T00:00:00", "id": "OPENVAS:850021", "href": "http://plugins.openvas.org/nasl.php?oid=850021", "type": "openvas", "title": "SuSE Update for kernel SUSE-SA:2008:037", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2008_037.nasl 8050 2017-12-08 09:34:29Z santu $\n#\n# SuSE Update for kernel SUSE-SA:2008:037\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The openSUSE 11.0 kernel was updated to 2.6.25.11-0.1.\n\n It fixes following security problems:\n CVE-2008-2812: Various tty / serial devices did not check\n function pointers for NULL before calling them, leading to potential\n crashes or code execution. The devices affected are usually only\n accessible by the root user though.\n\n CVE-2008-2750: The pppol2tp_recvmsg function in drivers/net/pppol2tp.c\n in the Linux kernel allows remote attackers to cause a denial of\n service (kernel heap memory corruption and system crash) and possibly\n have unspecified other impact via a crafted PPPOL2TP packet that\n results in a large value for a certain length variable.\n\n CVE-2008-3247: On x86_64 systems, a incorrect buffer size in LDT\n handling might lead to local untrusted attackers causing a crash\n of the machine or potentially execute code with kernel privileges.\n This problem only affects the openSUSE 11.0 kernel, since the problem\n was introduced in the 2.6.25 kernel.\n\n The update also has lots of other bugfixes that are listed in the\n RPM changelog.\n\n We previously also released a 2.6.25.9-0.2 kernel but did not\n separately announce it. That update fixed the following security\n problems:\n\n CVE-2008-2372: A resource starvation issue within mmap was fixed,\n which could have been used by local attackers to hang the machine.\n\n CVE-2008-2826: A integer overflow in SCTP was fixed, which might have\n been used by remote attackers to crash the machine or potentially\n execute code.\";\n\ntag_impact = \"local privilege escalation\";\ntag_affected = \"kernel on openSUSE 11.0\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_id(850021);\n script_version(\"$Revision: 8050 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-08 10:34:29 +0100 (Fri, 08 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-23 16:44:26 +0100 (Fri, 23 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"SUSE-SA\", value: \"2008-037\");\n script_cve_id(\"CVE-2008-2372\", \"CVE-2008-2750\", \"CVE-2008-2812\", \"CVE-2008-2826\", \"CVE-2008-3247\");\n script_name( \"SuSE Update for kernel SUSE-SA:2008:037\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"openSUSE11.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.25.11~0.1\", rls:\"openSUSE11.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.25.11~0.1\", rls:\"openSUSE11.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-pae\", rpm:\"kernel-pae~2.6.25.11~0.1\", rls:\"openSUSE11.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-rt\", rpm:\"kernel-rt~2.6.25.11~0.1\", rls:\"openSUSE11.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.25.11~0.1\", rls:\"openSUSE11.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.25.11~0.1\", rls:\"openSUSE11.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~2.6.25.11~0.1\", rls:\"openSUSE11.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.25.11~0.1\", rls:\"openSUSE11.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:41:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:1361412562310870159", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870159", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0607-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0607-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issue:\n \n * a possible kernel memory leak was found in the Linux kernel Simple\n Internet Transition (SIT) INET6 implementation. This could allow a local\n unprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n \n As well, these updated packages fix the following bugs:\n \n * a possible kernel hang on hugemem systems, due to a bug in NFS, which may\n have caused systems to become unresponsive, has been resolved.\n \n * an inappropriate exit condition occurred in the architecture-specific\n "mmap()" realization, which fell into an infinite loop under certain\n conditions. On 64-bit systems, this issue may have manifested itself to\n users as a soft lockup, or process hangs.\n \n * due to a bug in hardware initialization in the "ohci_hcd" kernel module,\n the kernel may have failed with a NULL pointer dereference. On 64-bit\n PowerPC systems, this may have caused booting to fail, and drop to xmon. On\n other platforms, a kernel oops occurred.\n \n * due to insufficient locks in task termination code, a panic may have\n occurred in the "sys_times()" system call on SMP machines.\n \n Red Hat Enterprise Linux 4 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-July/msg00025.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870159\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0607-01\");\n script_cve_id(\"CVE-2008-2136\");\n script_name( \"RedHat Update for kernel RHSA-2008:0607-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:40:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-13T00:00:00", "id": "OPENVAS:136141256231065804", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065804", "type": "openvas", "title": "SLES10: Security update for Linux kernel", "sourceData": "#\n#VID slesp2-kernel-5235\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65804\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2008-2136\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"SLES10: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump\", rpm:\"kernel-kdump~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmi\", rpm:\"kernel-vmi~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmipae\", rpm:\"kernel-vmipae~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:56:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "description": "Check for the Version of kernel", "modified": "2017-07-12T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:870159", "href": "http://plugins.openvas.org/nasl.php?oid=870159", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0607-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0607-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n These updated packages fix the following security issue:\n \n * a possible kernel memory leak was found in the Linux kernel Simple\n Internet Transition (SIT) INET6 implementation. This could allow a local\n unprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n \n As well, these updated packages fix the following bugs:\n \n * a possible kernel hang on hugemem systems, due to a bug in NFS, which may\n have caused systems to become unresponsive, has been resolved.\n \n * an inappropriate exit condition occurred in the architecture-specific\n "mmap()" realization, which fell into an infinite loop under certain\n conditions. On 64-bit systems, this issue may have manifested itself to\n users as a soft lockup, or process hangs.\n \n * due to a bug in hardware initialization in the "ohci_hcd" kernel module,\n the kernel may have failed with a NULL pointer dereference. On 64-bit\n PowerPC systems, this may have caused booting to fail, and drop to xmon. On\n other platforms, a kernel oops occurred.\n \n * due to insufficient locks in task termination code, a panic may have\n occurred in the "sys_times()" system call on SMP machines.\n \n Red Hat Enterprise Linux 4 users are advised to upgrade to these updated\n packages, which contain backported patches to resolve these issues.\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-July/msg00025.html\");\n script_id(870159);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0607-01\");\n script_cve_id(\"CVE-2008-2136\");\n script_name( \"RedHat Update for kernel RHSA-2008:0607-01\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-devel\", rpm:\"kernel-hugemem-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-devel\", rpm:\"kernel-smp-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU\", rpm:\"kernel-xenU~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenU-devel\", rpm:\"kernel-xenU-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp\", rpm:\"kernel-largesmp~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-largesmp-devel\", rpm:\"kernel-largesmp-devel~2.6.9~67.0.22.EL\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:56:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-13T00:00:00", "id": "OPENVAS:65804", "href": "http://plugins.openvas.org/nasl.php?oid=65804", "type": "openvas", "title": "SLES10: Security update for Linux kernel", "sourceData": "#\n#VID slesp2-kernel-5235\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_id(65804);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2008-2136\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"SLES10: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump\", rpm:\"kernel-kdump~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmi\", rpm:\"kernel-vmi~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmipae\", rpm:\"kernel-vmipae~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.16.60~0.23\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:41:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-0598", "CVE-2008-3525", "CVE-2008-4210", "CVE-2008-3275", "CVE-2007-6063", "CVE-2008-2812"], "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-02-27T00:00:00", "id": "OPENVAS:1361412562310880079", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880079", "type": "openvas", "title": "CentOS Update for kernel CESA-2008:0973 centos3 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for kernel CESA-2008:0973 centos3 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update addresses the following security issues:\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local, unprivileged user to prepare\n and run a specially-crafted binary which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * a possible kernel memory leak was found in the Linux kernel Simple\n Internet Transition (SIT) INET6 implementation. This could allow a local,\n unprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n \n * missing capability checks were found in the SBNI WAN driver which could\n allow a local user to bypass intended capability restrictions.\n (CVE-2008-3525, Important)\n \n * the do_truncate() and generic_file_splice_write() functions did not clear\n the setuid and setgid bits. This could allow a local, unprivileged user to\n obtain access to privileged information. (CVE-2008-4210, Important)\n \n * a buffer overflow flaw was found in Integrated Services Digital Network\n (ISDN) subsystem. A local, unprivileged user could use this flaw to cause a\n denial of service. (CVE-2007-6063, Moderate)\n \n * multiple NULL pointer dereferences were found in various Linux kernel\n network drivers. These drivers were missing checks for terminal validity,\n which could allow privilege escalation. (CVE-2008-2812, Moderate)\n \n * a deficiency was found in the Linux kernel virtual filesystem (VFS)\n implementation. This could allow a local, unprivileged user to attempt file\n creation within deleted directories, possibly causing a denial of service.\n (CVE-2008-3275, Moderate)\n \n This update also fixes the following bugs:\n \n * the incorrect kunmap function was used in nfs_xdr_readlinkres. kunmap()\n was used where kunmap_atomic() should have been. As a consequence, if an\n NFSv2 or NFSv3 server exported a volume containing a symlink which included\n a path equal to or longer than the local system's PATH_MAX, accessing the\n link caused a kernel oops. This has been corrected in this update.\n \n * mptctl_gettargetinfo did not check if pIoc3 was NULL before using it as a\n pointer. This caused a kernel panic in mptctl_gettargetinfo in some\n circumstances. A check has been added which prevents this.\n \n * lost tick compensation code in the timer interrupt routine triggered\n without apparent cause. When running as a fully-virtualized client, this\n spurious triggering caused the 64-bit version of Red Hat Enterprise Linux 3\n to present hig ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on CentOS 3\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-December/015501.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880079\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0973\");\n script_cve_id(\"CVE-2008-4210\", \"CVE-2008-3275\", \"CVE-2008-0598\", \"CVE-2008-2136\", \"CVE-2008-2812\", \"CVE-2007-6063\", \"CVE-2008-3525\");\n script_name( \"CentOS Update for kernel CESA-2008:0973 centos3 i386\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-BOOT\", rpm:\"kernel-BOOT~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-unsupported\", rpm:\"kernel-hugemem-unsupported~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-unsupported\", rpm:\"kernel-smp-unsupported~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-unsupported\", rpm:\"kernel-unsupported~2.4.21~58.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:41:35", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-0598", "CVE-2008-3525", "CVE-2008-4210", "CVE-2008-3275", "CVE-2007-6063", "CVE-2008-2812"], "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-03-06T00:00:00", "id": "OPENVAS:1361412562310870022", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870022", "type": "openvas", "title": "RedHat Update for kernel RHSA-2008:0973-03", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0973-03\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n This update addresses the following security issues:\n \n * Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n 64-bit emulation. This could allow a local, unprivileged user to prepare\n and run a specially-crafted binary which would use this deficiency to leak\n uninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n \n * a possible kernel memory leak was found in the Linux kernel Simple\n Internet Transition (SIT) INET6 implementation. This could allow a local,\n unprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n \n * missing capability checks were found in the SBNI WAN driver which could\n allow a local user to bypass intended capability restrictions.\n (CVE-2008-3525, Important)\n \n * the do_truncate() and generic_file_splice_write() functions did not clear\n the setuid and setgid bits. This could allow a local, unprivileged user to\n obtain access to privileged information. (CVE-2008-4210, Important)\n \n * a buffer overflow flaw was found in Integrated Services Digital Network\n (ISDN) subsystem. A local, unprivileged user could use this flaw to cause a\n denial of service. (CVE-2007-6063, Moderate)\n \n * multiple NULL pointer dereferences were found in various Linux kernel\n network drivers. These drivers were missing checks for terminal validity,\n which could allow privilege escalation. (CVE-2008-2812, Moderate)\n \n * a deficiency was found in the Linux kernel virtual filesystem (VFS)\n implementation. This could allow a local, unprivileged user to attempt file\n creation within deleted directories, possibly causing a denial of service.\n (CVE-2008-3275, Moderate)\n \n This update also fixes the following bugs:\n \n * the incorrect kunmap function was used in nfs_xdr_readlinkres. kunmap()\n was used where kunmap_atomic() should have been. As a consequence, if an\n NFSv2 or NFSv3 server exported a volume containing a symlink which included\n a path equal to or longer than the local system's PATH_MAX, accessing the\n link caused a kernel oops. This has been corrected in this update.\n \n * mptctl_gettargetinfo did not check if pIoc3 was NULL before using it as a\n pointer. This caused a kernel panic in mptctl_gettargetinfo in some\n circumstances. A check has been added which prevents this.\n \n * lost tick compensation code in the timer interrupt routine triggered\n without apparent cause. When running as a fully-virtuali ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux AS version 3,\n Red Hat Enterprise Linux ES version 3,\n Red Hat Enterprise Linux WS version 3\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-December/msg00013.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870022\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0973-03\");\n script_cve_id(\"CVE-2008-4210\", \"CVE-2008-3275\", \"CVE-2008-0598\", \"CVE-2008-2136\", \"CVE-2008-2812\", \"CVE-2007-6063\", \"CVE-2008-3525\");\n script_name( \"RedHat Update for kernel RHSA-2008:0973-03\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_3\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-BOOT\", rpm:\"kernel-BOOT~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem\", rpm:\"kernel-hugemem~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-hugemem-unsupported\", rpm:\"kernel-hugemem-unsupported~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp-unsupported\", rpm:\"kernel-smp-unsupported~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-unsupported\", rpm:\"kernel-unsupported~2.4.21~58.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "centos": [{"lastseen": "2019-12-20T18:24:06", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2008-1294", "CVE-2008-2812"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0612\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\n* a flaw was found in the Linux kernel setrlimit system call, when setting\nRLIMIT_CPU to a certain value. This could allow a local unprivileged user\nto bypass the CPU time limit. (CVE-2008-1294, Moderate)\n\n* multiple NULL pointer dereferences were found in various Linux kernel\nnetwork drivers. These drivers were missing checks for terminal validity,\nwhich could allow privilege escalation. (CVE-2008-2812, Moderate)\n\nThese updated packages fix the following bugs:\n\n* the GNU libc stub resolver is a minimal resolver that works with Domain\nName System (DNS) servers to satisfy requests from applications for names.\nThe GNU libc stub resolver did not specify a source UDP port, and therefore\nused predictable port numbers. This could have made DNS spoofing attacks\neasier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications, such\nas those using the GNU libc stub resolver, to use random UDP source ports,\nhelping to make DNS spoofing attacks harder.\n\n* when using certain hardware, a bug in UART_BUG_TXEN may have caused\nincorrect hardware detection, causing data flow to \"/dev/ttyS1\" to hang.\n\n* a 50-75% drop in NFS server rewrite performance, compared to Red Hat\nEnterprise Linux 4.6, has been resolved.\n\n* due a bug in the fast userspace mutex code, while one thread fetched a\npointer, another thread may have removed it, causing the first thread to\nfetch the wrong pointer, possibly causing a system crash.\n\n* on certain Hitachi hardware, removing the \"uhci_hcd\" module caused a\nkernel oops, and the following error:\n\nBUG: warning at arch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the \"uhci_hcd\" module was reloaded, there was no access to USB\ndevices. As well, on systems that have legacy interrupts,\n\"acpi_unregister_gsi\" incorrectly called \"iosapci_unregister_intr()\",\ncausing warning messages to be logged.\n\n* when a page was mapped with mmap(), and \"PROT_WRITE\" was the only\n\"prot\" argument, the first read of that page caused a segmentation fault.\nIf the page was read after it was written to, no fault occurred. This was\nincompatible with the Red Hat Enterprise Linux 4 behavior.\n\n* due to a NULL pointer dereference in powernowk8_init(), a panic may\nhave occurred.\n\n* certain error conditions handled by the bonding sysfs interface could\nhave left rtnl_lock() unbalanced, either by locking and returning without\nunlocking, or by unlocking when it did not lock, possibly causing a\n\"kernel: RTNL: assertion failed at net/core/fib_rules.c\" error.\n\n* the kernel currently expects a maximum of six Machine Check Exception\n(MCE) banks to be exposed by a CPU. Certain CPUs have 7 or more, which may\nhave caused the MCE to be incorrectly reported.\n\n* a race condition in UNIX domain sockets may have caused recv() to return\nzero. For clusters, this may have caused unexpected failovers.\n\n* msgrcv() frequently returned an incorrect \"ERESTARTNOHAND (514)\" error\nnumber.\n\n* on certain Intel Itanium-based systems, when kdump was configured to halt\nthe system after a dump operation, after the \"System halted.\" output, the\nkernel continued to output endless \"soft lockup\" messages.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-August/027219.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-August/027220.html\n\n**Affected packages:**\nkernel\nkernel-PAE\nkernel-PAE-devel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-xen\nkernel-xen-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0612.html", "edition": 3, "modified": "2008-08-06T09:53:21", "published": "2008-08-06T09:53:20", "href": "http://lists.centos.org/pipermail/centos-announce/2008-August/027219.html", "id": "CESA-2008:0612", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:24:25", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0607\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issue:\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\nAs well, these updated packages fix the following bugs:\n\n* a possible kernel hang on hugemem systems, due to a bug in NFS, which may\nhave caused systems to become unresponsive, has been resolved.\n\n* an inappropriate exit condition occurred in the architecture-specific\n\"mmap()\" realization, which fell into an infinite loop under certain\nconditions. On 64-bit systems, this issue may have manifested itself to\nusers as a soft lockup, or process hangs.\n\n* due to a bug in hardware initialization in the \"ohci_hcd\" kernel module,\nthe kernel may have failed with a NULL pointer dereference. On 64-bit\nPowerPC systems, this may have caused booting to fail, and drop to xmon. On\nother platforms, a kernel oops occurred.\n\n* due to insufficient locks in task termination code, a panic may have\noccurred in the \"sys_times()\" system call on SMP machines.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/027193.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/027194.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/027209.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-July/027210.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-largesmp\nkernel-largesmp-devel\nkernel-smp\nkernel-smp-devel\nkernel-xenU\nkernel-xenU-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0607.html", "edition": 4, "modified": "2008-07-26T19:48:52", "published": "2008-07-24T18:44:27", "href": "http://lists.centos.org/pipermail/centos-announce/2008-July/027193.html", "id": "CESA-2008:0607", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-17T03:27:50", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2008-0598", "CVE-2008-3525", "CVE-2008-4210", "CVE-2008-3275", "CVE-2007-6063", "CVE-2008-2812"], "description": "**CentOS Errata and Security Advisory** CESA-2008:0973\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update addresses the following security issues:\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local, unprivileged user to prepare\nand run a specially-crafted binary which would use this deficiency to leak\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local,\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\n* missing capability checks were found in the SBNI WAN driver which could\nallow a local user to bypass intended capability restrictions.\n(CVE-2008-3525, Important)\n\n* the do_truncate() and generic_file_splice_write() functions did not clear\nthe setuid and setgid bits. This could allow a local, unprivileged user to\nobtain access to privileged information. (CVE-2008-4210, Important)\n\n* a buffer overflow flaw was found in Integrated Services Digital Network\n(ISDN) subsystem. A local, unprivileged user could use this flaw to cause a\ndenial of service. (CVE-2007-6063, Moderate)\n\n* multiple NULL pointer dereferences were found in various Linux kernel\nnetwork drivers. These drivers were missing checks for terminal validity,\nwhich could allow privilege escalation. (CVE-2008-2812, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local, unprivileged user to attempt file\ncreation within deleted directories, possibly causing a denial of service.\n(CVE-2008-3275, Moderate)\n\nThis update also fixes the following bugs:\n\n* the incorrect kunmap function was used in nfs_xdr_readlinkres. kunmap()\nwas used where kunmap_atomic() should have been. As a consequence, if an\nNFSv2 or NFSv3 server exported a volume containing a symlink which included\na path equal to or longer than the local system's PATH_MAX, accessing the\nlink caused a kernel oops. This has been corrected in this update.\n\n* mptctl_gettargetinfo did not check if pIoc3 was NULL before using it as a\npointer. This caused a kernel panic in mptctl_gettargetinfo in some\ncircumstances. A check has been added which prevents this.\n\n* lost tick compensation code in the timer interrupt routine triggered\nwithout apparent cause. When running as a fully-virtualized client, this\nspurious triggering caused the 64-bit version of Red Hat Enterprise Linux 3\nto present highly inaccurate times. With this update the lost tick\ncompensation code is turned off when the operating system is running as a\nfully-virtualized client under Xen or VMWare\u00ae.\n\nAll Red Hat Enterprise Linux 3 users should install this updated kernel\nwhich addresses these vulnerabilities and fixes these bugs.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/027539.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/027540.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027616.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027617.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-doc\nkernel-hugemem\nkernel-hugemem-unsupported\nkernel-smp\nkernel-smp-unsupported\nkernel-source\nkernel-unsupported\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0973.html", "edition": 6, "modified": "2009-02-04T15:09:01", "published": "2008-12-17T15:30:17", "href": "http://lists.centos.org/pipermail/centos-announce/2008-December/027539.html", "id": "CESA-2008:0973", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:46:13", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1294", "CVE-2008-2136", "CVE-2008-2812"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\n* a flaw was found in the Linux kernel setrlimit system call, when setting\nRLIMIT_CPU to a certain value. This could allow a local unprivileged user\nto bypass the CPU time limit. (CVE-2008-1294, Moderate)\n\n* multiple NULL pointer dereferences were found in various Linux kernel\nnetwork drivers. These drivers were missing checks for terminal validity,\nwhich could allow privilege escalation. (CVE-2008-2812, Moderate)\n\nThese updated packages fix the following bugs:\n\n* the GNU libc stub resolver is a minimal resolver that works with Domain\nName System (DNS) servers to satisfy requests from applications for names.\nThe GNU libc stub resolver did not specify a source UDP port, and therefore\nused predictable port numbers. This could have made DNS spoofing attacks\neasier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications, such\nas those using the GNU libc stub resolver, to use random UDP source ports,\nhelping to make DNS spoofing attacks harder.\n\n* when using certain hardware, a bug in UART_BUG_TXEN may have caused\nincorrect hardware detection, causing data flow to \"/dev/ttyS1\" to hang.\n\n* a 50-75% drop in NFS server rewrite performance, compared to Red Hat\nEnterprise Linux 4.6, has been resolved.\n\n* due a bug in the fast userspace mutex code, while one thread fetched a\npointer, another thread may have removed it, causing the first thread to\nfetch the wrong pointer, possibly causing a system crash.\n\n* on certain Hitachi hardware, removing the \"uhci_hcd\" module caused a\nkernel oops, and the following error:\n\nBUG: warning at arch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the \"uhci_hcd\" module was reloaded, there was no access to USB\ndevices. As well, on systems that have legacy interrupts,\n\"acpi_unregister_gsi\" incorrectly called \"iosapci_unregister_intr()\",\ncausing warning messages to be logged.\n\n* when a page was mapped with mmap(), and \"PROT_WRITE\" was the only\n\"prot\" argument, the first read of that page caused a segmentation fault.\nIf the page was read after it was written to, no fault occurred. This was\nincompatible with the Red Hat Enterprise Linux 4 behavior.\n\n* due to a NULL pointer dereference in powernowk8_init(), a panic may\nhave occurred.\n\n* certain error conditions handled by the bonding sysfs interface could\nhave left rtnl_lock() unbalanced, either by locking and returning without\nunlocking, or by unlocking when it did not lock, possibly causing a\n\"kernel: RTNL: assertion failed at net/core/fib_rules.c\" error.\n\n* the kernel currently expects a maximum of six Machine Check Exception\n(MCE) banks to be exposed by a CPU. Certain CPUs have 7 or more, which may\nhave caused the MCE to be incorrectly reported.\n\n* a race condition in UNIX domain sockets may have caused recv() to return\nzero. For clusters, this may have caused unexpected failovers.\n\n* msgrcv() frequently returned an incorrect \"ERESTARTNOHAND (514)\" error\nnumber.\n\n* on certain Intel Itanium-based systems, when kdump was configured to halt\nthe system after a dump operation, after the \"System halted.\" output, the\nkernel continued to output endless \"soft lockup\" messages.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "modified": "2017-09-08T12:13:45", "published": "2008-08-04T04:00:00", "id": "RHSA-2008:0612", "href": "https://access.redhat.com/errata/RHSA-2008:0612", "type": "redhat", "title": "(RHSA-2008:0612) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:44", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issue:\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\nAs well, these updated packages fix the following bugs:\n\n* a possible kernel hang on hugemem systems, due to a bug in NFS, which may\nhave caused systems to become unresponsive, has been resolved.\n\n* an inappropriate exit condition occurred in the architecture-specific\n\"mmap()\" realization, which fell into an infinite loop under certain\nconditions. On 64-bit systems, this issue may have manifested itself to\nusers as a soft lockup, or process hangs.\n\n* due to a bug in hardware initialization in the \"ohci_hcd\" kernel module,\nthe kernel may have failed with a NULL pointer dereference. On 64-bit\nPowerPC systems, this may have caused booting to fail, and drop to xmon. On\nother platforms, a kernel oops occurred.\n\n* due to insufficient locks in task termination code, a panic may have\noccurred in the \"sys_times()\" system call on SMP machines.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "modified": "2017-09-08T12:16:51", "published": "2008-07-23T04:00:00", "id": "RHSA-2008:0607", "href": "https://access.redhat.com/errata/RHSA-2008:0607", "type": "redhat", "title": "(RHSA-2008:0607) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:31", "bulletinFamily": "unix", "cvelist": ["CVE-2007-6063", "CVE-2008-0598", "CVE-2008-2136", "CVE-2008-2812", "CVE-2008-3275", "CVE-2008-3525", "CVE-2008-4210"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update addresses the following security issues:\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local, unprivileged user to prepare\nand run a specially-crafted binary which would use this deficiency to leak\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local,\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\n* missing capability checks were found in the SBNI WAN driver which could\nallow a local user to bypass intended capability restrictions.\n(CVE-2008-3525, Important)\n\n* the do_truncate() and generic_file_splice_write() functions did not clear\nthe setuid and setgid bits. This could allow a local, unprivileged user to\nobtain access to privileged information. (CVE-2008-4210, Important)\n\n* a buffer overflow flaw was found in Integrated Services Digital Network\n(ISDN) subsystem. A local, unprivileged user could use this flaw to cause a\ndenial of service. (CVE-2007-6063, Moderate)\n\n* multiple NULL pointer dereferences were found in various Linux kernel\nnetwork drivers. These drivers were missing checks for terminal validity,\nwhich could allow privilege escalation. (CVE-2008-2812, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local, unprivileged user to attempt file\ncreation within deleted directories, possibly causing a denial of service.\n(CVE-2008-3275, Moderate)\n\nThis update also fixes the following bugs:\n\n* the incorrect kunmap function was used in nfs_xdr_readlinkres. kunmap()\nwas used where kunmap_atomic() should have been. As a consequence, if an\nNFSv2 or NFSv3 server exported a volume containing a symlink which included\na path equal to or longer than the local system's PATH_MAX, accessing the\nlink caused a kernel oops. This has been corrected in this update.\n\n* mptctl_gettargetinfo did not check if pIoc3 was NULL before using it as a\npointer. This caused a kernel panic in mptctl_gettargetinfo in some\ncircumstances. A check has been added which prevents this.\n\n* lost tick compensation code in the timer interrupt routine triggered\nwithout apparent cause. When running as a fully-virtualized client, this\nspurious triggering caused the 64-bit version of Red Hat Enterprise Linux 3\nto present highly inaccurate times. With this update the lost tick\ncompensation code is turned off when the operating system is running as a\nfully-virtualized client under Xen or VMWare\u00ae.\n\nAll Red Hat Enterprise Linux 3 users should install this updated kernel\nwhich addresses these vulnerabilities and fixes these bugs.", "modified": "2017-07-28T18:43:49", "published": "2008-12-16T05:00:00", "id": "RHSA-2008:0973", "href": "https://access.redhat.com/errata/RHSA-2008:0973", "type": "redhat", "title": "(RHSA-2008:0973) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:47:03", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5966", "CVE-2007-6282", "CVE-2007-6712", "CVE-2008-1615", "CVE-2008-2136", "CVE-2008-2148", "CVE-2008-2372", "CVE-2008-2729", "CVE-2008-2826"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimer. This could allow a local\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* the possibility of a kernel crash was found in the Linux kernel IPsec\nprotocol implementation, due to improper handling of fragmented ESP\npackets. When an attacker controlling an intermediate router fragmented\nthese packets into very small pieces, it would cause a kernel crash on the\nreceiving node during packet reassembly. (CVE-2007-6282, Important)\n\n* on 64-bit architectures, the possibility of a timer-expiration value\noverflow was found in the Linux kernel high-resolution timers\nfunctionality, hrtimer. This could allow a local unprivileged user to set\nup a large interval value, forcing the timer expiry value to become\nnegative, causing a denial of service (kernel hang). \n(CVE-2007-6712, Important)\n\n* on AMD64 architectures, the possibility of a kernel crash was discovered\nby testing the Linux kernel process-trace ability. This could allow a local\nunprivileged user to cause a denial of service (kernel crash).\n(CVE-2008-1615, Important)\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\n* a flaw was found in the Linux kernel utimensat system call. File\npermissions were not checked when UTIME_NOW and UTIME_OMIT combinations\nwere used. This could allow a local unprivileged user to modify file times\nof arbitrary files, possibly leading to a denial of service.\n(CVE-2008-2148, Important)\n\n* a security flaw was found in the Linux kernel memory copy routines, when\nrunning on certain AMD64 architectures. If an unsuccessful attempt to copy\nkernel memory from source to destination memory locations occurred, the\ncopy routines did not zero the content at the destination memory location.\nThis could allow a local unprivileged user to view potentially sensitive\ndata. (CVE-2008-2729, Important)\n\n* Gabriel Campana discovered a possible integer overflow flaw in the Linux \nkernel Stream Control Transmission Protocol (SCTP) implementation. This\ndeficiency could lead to privilege escalation. (CVE-2008-2826, Important)\n\n* a deficiency was found in the Linux kernel virtual memory implementation.\nThis could allow a local unprivileged user to make a large number of calls\nto the get_user_pages function, possibly causing a denial of service.\n(CVE-2008-2372, Low)\n\nAlso, these updated packages fix the following bugs:\n\n* gdb set orig_rax to 0x00000000ffffffff, which is recognized by the\nupstream kernel as \"-1\", but not by the Red Hat Enterprise MRG kernel.\n\n* if the POSIX timer was programmed to fire immediately, the timer's\nsignal was sometimes not delivered (timer does not fire).\n\n* rwlock caused crashes and application hangs.\n\n* running oprofile caused system panics.\n\n* threads releasing a mutex may have received an EPERM error.\n\n* booting the RT kernel with the \"nmi_watchdog=2\" kernel option caused a\nkernel panic, and an \"Unable to handle kernel paging request\" error.\n\n* \"echo 0 > /sys/devices/system/cpu/cpu1/online\" caused crashes.\n\n* a crash on a JTC machine.\n\n* added a new \"FUTEX_WAIT_BITSET\" system call, identical to FUTEX_WAIT,\nthat accepts absolute time as a timeout.\n\nRed Hat Enterprise MRG 1.0 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "modified": "2019-03-22T23:44:15", "published": "2008-08-26T04:00:00", "id": "RHSA-2008:0585", "href": "https://access.redhat.com/errata/RHSA-2008:0585", "type": "redhat", "title": "(RHSA-2008:0585) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:44:58", "bulletinFamily": "unix", "cvelist": ["CVE-2006-4145", "CVE-2008-2812"], "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nKernel Feature Support: \n* iostat displays I/O performance for partitions\n* I/O task accounting added to getrusage(), allowing comprehensive core\nstatistics\n* page cache pages count added to show_mem() output\n* tux O_ATOMICLOOKUP flag removed from the open() system call: replaced\nwith O_CLOEXEC\n* the kernel now exports process limit information to /proc/[PID]/limits\n* implement udp_poll() to reduce likelihood of false positives returned\nfrom select()\n* the TCP_RTO_MIN parameter can now be configured to a maximum of 3000\nmilliseconds. This is configured using \"ip route\"\n* update CIFS to version 1.50\n\nAdded Features:\n* nfs.enable_ino64 boot command line parameter: enable and disable 32-bit\ninode numbers when using NFS\n* tick \"divider\" kernel boot parameter: reduce CPU overhead, and increase\nefficiency at the cost of lowering timing accuracy\n* /proc/sys/vm/nfs-writeback-lowmem-only tunable parameter: resolve NFS\nread performance\n* /proc/sys/vm/write-mapped tunable option, allowing the option of faster\nNFS reads\n* support for Large Receive Offload as a networking module\n* core dump masking, allowing a core dump process to skip the shared memory\nsegments of a process\n\nVirtualization:\n* para-virtualized network and block device drivers, to increase\nfully-virtualized guest performance\n* support for more than three VNIF numbers per guest domain\n\nPlatform Support:\n* AMD ATI SB800 SATA controller, AMD ATI SB600 and SB700 40-pin IDE cable\n* 64-bit DMA support on AMD ATI SB700\n* PCI device IDs to support Intel ICH10\n* /dev/msr[0-n] device files\n* powernow-k8 as a module\n* SLB shadow buffer support for IBM POWER6 systems\n* support for CPU frequencies greater than 32-bit on IBM POWER5, IBM POWER6\n* floating point load and store handler for IBM POWER6\n\nAdded Drivers and Updates:\n* ixgbe 1.1.18, for the Intel 82598 10GB ethernet controller\n* bnx2x 1.40.22, for network adapters on the Broadcom 5710 chipset\n* dm-hp-sw 1.0.0, for HP Active/Standby\n* zfcp version and bug fixes\n* qdio to fix FCP/SCSI write I/O expiring on LPARs\n* cio bug fixes\n* eHEA latest upstream, and netdump and netconsole support\n* ipr driver support for dual SAS RAID controllers\n* correct CPU cache info and SATA support for Intel Tolapai\n* i5000_edac support for Intel 5000 chipsets\n* i3000_edac support for Intel 3000 and 3010 chipsets\n* add i2c_piix4 module on 64-bit systems to support AMD ATI SB600, 700\nand 800\n* i2c-i801 support for Intel Tolapai\n* qla4xxx: 5.01.01-d2 to 5.01.02-d4-rhel4.7-00\n* qla2xxx: 8.01.07-d4 to 8.01.07-d4-rhel4.7-02\n* cciss: 2.6.16 to 2.6.20\n* mptfusion: 3.02.99.00rh to 3.12.19.00rh\n* lpfc:0: 8.0.16.34 to 8.0.16.40\n* megaraid_sas: 00.00.03.13 to 00.00.03.18-rh1\n* stex: 3.0.0.1 to 3.6.0101.2\n* arcmsr: 1.20.00.13 to 1.20.00.15.rh4u7\n* aacraid: 1.1-5[2441] to 1.1.5[2455]\n\nMiscellaneous Updates:\n* OFED 1.3 support\n* wacom driver to add support for Cintiq 20WSX, Wacom Intuos3 12x19, 12x12\nand 4x6 tablets\n* sata_svw driver to support Broadcom HT-1100 chipsets\n* libata to un-blacklist Hitachi drives to enable NCQ\n* ide driver allows command line option to disable ide drivers\n* psmouse support for cortps protocol\n\nThese updated packages fix the following security issues:\n\n* NULL pointer access due to missing checks for terminal validity.\n(CVE-2008-2812, Moderate)\n\n* a security flaw was found in the Linux kernel Universal Disk Format file\nsystem. (CVE-2006-4145, Low)\n\nFor further details, refer to the latest Red Hat Enterprise Linux 4.7\nrelease notes: redhat.com/docs/manuals/enterprise", "modified": "2017-09-08T11:53:26", "published": "2008-07-24T04:00:00", "id": "RHSA-2008:0665", "href": "https://access.redhat.com/errata/RHSA-2008:0665", "type": "redhat", "title": "(RHSA-2008:0665) Moderate: Updated kernel packages for Red Hat Enterprise Linux 4.7", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-17T13:06:13", "description": "Updated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\n* a flaw was found in the Linux kernel setrlimit system call, when\nsetting RLIMIT_CPU to a certain value. This could allow a local\nunprivileged user to bypass the CPU time limit. (CVE-2008-1294,\nModerate)\n\n* multiple NULL pointer dereferences were found in various Linux\nkernel network drivers. These drivers were missing checks for terminal\nvalidity, which could allow privilege escalation. (CVE-2008-2812,\nModerate)\n\nThese updated packages fix the following bugs :\n\n* the GNU libc stub resolver is a minimal resolver that works with\nDomain Name System (DNS) servers to satisfy requests from applications\nfor names. The GNU libc stub resolver did not specify a source UDP\nport, and therefore used predictable port numbers. This could have\nmade DNS spoofing attacks easier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications,\nsuch as those using the GNU libc stub resolver, to use random UDP\nsource ports, helping to make DNS spoofing attacks harder.\n\n* when using certain hardware, a bug in UART_BUG_TXEN may have caused\nincorrect hardware detection, causing data flow to '/dev/ttyS1' to\nhang.\n\n* a 50-75% drop in NFS server rewrite performance, compared to Red Hat\nEnterprise Linux 4.6, has been resolved.\n\n* due a bug in the fast userspace mutex code, while one thread fetched\na pointer, another thread may have removed it, causing the first\nthread to fetch the wrong pointer, possibly causing a system crash.\n\n* on certain Hitachi hardware, removing the 'uhci_hcd' module caused a\nkernel oops, and the following error :\n\nBUG: warning at\narch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the 'uhci_hcd' module was reloaded, there was no access to\nUSB devices. As well, on systems that have legacy interrupts,\n'acpi_unregister_gsi' incorrectly called 'iosapci_unregister_intr()',\ncausing warning messages to be logged.\n\n* when a page was mapped with mmap(), and 'PROT_WRITE' was the only\n'prot' argument, the first read of that page caused a segmentation\nfault. If the page was read after it was written to, no fault\noccurred. This was incompatible with the Red Hat Enterprise Linux 4\nbehavior.\n\n* due to a NULL pointer dereference in powernowk8_init(), a panic may\nhave occurred.\n\n* certain error conditions handled by the bonding sysfs interface\ncould have left rtnl_lock() unbalanced, either by locking and\nreturning without unlocking, or by unlocking when it did not lock,\npossibly causing a 'kernel: RTNL: assertion failed at\nnet/core/fib_rules.c' error.\n\n* the kernel currently expects a maximum of six Machine Check\nException (MCE) banks to be exposed by a CPU. Certain CPUs have 7 or\nmore, which may have caused the MCE to be incorrectly reported.\n\n* a race condition in UNIX domain sockets may have caused recv() to\nreturn zero. For clusters, this may have caused unexpected failovers.\n\n* msgrcv() frequently returned an incorrect 'ERESTARTNOHAND (514)'\nerror number.\n\n* on certain Intel Itanium-based systems, when kdump was configured to\nhalt the system after a dump operation, after the 'System halted.'\noutput, the kernel continued to output endless 'soft lockup' messages.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 28, "published": "2008-08-05T00:00:00", "title": "RHEL 5 : kernel (RHSA-2008:0612)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-1294", "CVE-2008-2812"], "modified": "2008-08-05T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel", "cpe:/o:redhat:enterprise_linux:5.2", "p-cpe:/a:redhat:enterprise_linux:kernel-xen", "p-cpe:/a:redhat:enterprise_linux:kernel-PAE", "p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2008-0612.NASL", "href": "https://www.tenable.com/plugins/nessus/33830", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0612. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(33830);\n script_version(\"1.28\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-1294\", \"CVE-2008-2136\", \"CVE-2008-2812\");\n script_bugtraq_id(29235, 30076);\n script_xref(name:\"RHSA\", value:\"2008:0612\");\n\n script_name(english:\"RHEL 5 : kernel (RHSA-2008:0612)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\n* a flaw was found in the Linux kernel setrlimit system call, when\nsetting RLIMIT_CPU to a certain value. This could allow a local\nunprivileged user to bypass the CPU time limit. (CVE-2008-1294,\nModerate)\n\n* multiple NULL pointer dereferences were found in various Linux\nkernel network drivers. These drivers were missing checks for terminal\nvalidity, which could allow privilege escalation. (CVE-2008-2812,\nModerate)\n\nThese updated packages fix the following bugs :\n\n* the GNU libc stub resolver is a minimal resolver that works with\nDomain Name System (DNS) servers to satisfy requests from applications\nfor names. The GNU libc stub resolver did not specify a source UDP\nport, and therefore used predictable port numbers. This could have\nmade DNS spoofing attacks easier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications,\nsuch as those using the GNU libc stub resolver, to use random UDP\nsource ports, helping to make DNS spoofing attacks harder.\n\n* when using certain hardware, a bug in UART_BUG_TXEN may have caused\nincorrect hardware detection, causing data flow to '/dev/ttyS1' to\nhang.\n\n* a 50-75% drop in NFS server rewrite performance, compared to Red Hat\nEnterprise Linux 4.6, has been resolved.\n\n* due a bug in the fast userspace mutex code, while one thread fetched\na pointer, another thread may have removed it, causing the first\nthread to fetch the wrong pointer, possibly causing a system crash.\n\n* on certain Hitachi hardware, removing the 'uhci_hcd' module caused a\nkernel oops, and the following error :\n\nBUG: warning at\narch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the 'uhci_hcd' module was reloaded, there was no access to\nUSB devices. As well, on systems that have legacy interrupts,\n'acpi_unregister_gsi' incorrectly called 'iosapci_unregister_intr()',\ncausing warning messages to be logged.\n\n* when a page was mapped with mmap(), and 'PROT_WRITE' was the only\n'prot' argument, the first read of that page caused a segmentation\nfault. If the page was read after it was written to, no fault\noccurred. This was incompatible with the Red Hat Enterprise Linux 4\nbehavior.\n\n* due to a NULL pointer dereference in powernowk8_init(), a panic may\nhave occurred.\n\n* certain error conditions handled by the bonding sysfs interface\ncould have left rtnl_lock() unbalanced, either by locking and\nreturning without unlocking, or by unlocking when it did not lock,\npossibly causing a 'kernel: RTNL: assertion failed at\nnet/core/fib_rules.c' error.\n\n* the kernel currently expects a maximum of six Machine Check\nException (MCE) banks to be exposed by a CPU. Certain CPUs have 7 or\nmore, which may have caused the MCE to be incorrectly reported.\n\n* a race condition in UNIX domain sockets may have caused recv() to\nreturn zero. For clusters, this may have caused unexpected failovers.\n\n* msgrcv() frequently returned an incorrect 'ERESTARTNOHAND (514)'\nerror number.\n\n* on certain Intel Itanium-based systems, when kdump was configured to\nhalt the system after a dump operation, after the 'System halted.'\noutput, the kernel continued to output endless 'soft lockup' messages.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-1294\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-2136\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-2812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2008:0612\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/08/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-1294\", \"CVE-2008-2136\", \"CVE-2008-2812\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2008:0612\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2008:0612\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"kernel-doc-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"kernel-headers-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-headers-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-devel-2.6.18-92.1.10.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-devel-2.6.18-92.1.10.el5\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:44:12", "description": "From Red Hat Security Advisory 2008:0612 :\n\nUpdated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\n* a flaw was found in the Linux kernel setrlimit system call, when\nsetting RLIMIT_CPU to a certain value. This could allow a local\nunprivileged user to bypass the CPU time limit. (CVE-2008-1294,\nModerate)\n\n* multiple NULL pointer dereferences were found in various Linux\nkernel network drivers. These drivers were missing checks for terminal\nvalidity, which could allow privilege escalation. (CVE-2008-2812,\nModerate)\n\nThese updated packages fix the following bugs :\n\n* the GNU libc stub resolver is a minimal resolver that works with\nDomain Name System (DNS) servers to satisfy requests from applications\nfor names. The GNU libc stub resolver did not specify a source UDP\nport, and therefore used predictable port numbers. This could have\nmade DNS spoofing attacks easier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications,\nsuch as those using the GNU libc stub resolver, to use random UDP\nsource ports, helping to make DNS spoofing attacks harder.\n\n* when using certain hardware, a bug in UART_BUG_TXEN may have caused\nincorrect hardware detection, causing data flow to '/dev/ttyS1' to\nhang.\n\n* a 50-75% drop in NFS server rewrite performance, compared to Red Hat\nEnterprise Linux 4.6, has been resolved.\n\n* due a bug in the fast userspace mutex code, while one thread fetched\na pointer, another thread may have removed it, causing the first\nthread to fetch the wrong pointer, possibly causing a system crash.\n\n* on certain Hitachi hardware, removing the 'uhci_hcd' module caused a\nkernel oops, and the following error :\n\nBUG: warning at\narch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the 'uhci_hcd' module was reloaded, there was no access to\nUSB devices. As well, on systems that have legacy interrupts,\n'acpi_unregister_gsi' incorrectly called 'iosapci_unregister_intr()',\ncausing warning messages to be logged.\n\n* when a page was mapped with mmap(), and 'PROT_WRITE' was the only\n'prot' argument, the first read of that page caused a segmentation\nfault. If the page was read after it was written to, no fault\noccurred. This was incompatible with the Red Hat Enterprise Linux 4\nbehavior.\n\n* due to a NULL pointer dereference in powernowk8_init(), a panic may\nhave occurred.\n\n* certain error conditions handled by the bonding sysfs interface\ncould have left rtnl_lock() unbalanced, either by locking and\nreturning without unlocking, or by unlocking when it did not lock,\npossibly causing a 'kernel: RTNL: assertion failed at\nnet/core/fib_rules.c' error.\n\n* the kernel currently expects a maximum of six Machine Check\nException (MCE) banks to be exposed by a CPU. Certain CPUs have 7 or\nmore, which may have caused the MCE to be incorrectly reported.\n\n* a race condition in UNIX domain sockets may have caused recv() to\nreturn zero. For clusters, this may have caused unexpected failovers.\n\n* msgrcv() frequently returned an incorrect 'ERESTARTNOHAND (514)'\nerror number.\n\n* on certain Intel Itanium-based systems, when kdump was configured to\nhalt the system after a dump operation, after the 'System halted.'\noutput, the kernel continued to output endless 'soft lockup' messages.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 26, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : kernel (ELSA-2008-0612)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-1294", "CVE-2008-2812"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-PAE", "cpe:/o:oracle:linux:5", "p-cpe:/a:oracle:linux:kernel-xen-devel", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-PAE-devel", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-xen"], "id": "ORACLELINUX_ELSA-2008-0612.NASL", "href": "https://www.tenable.com/plugins/nessus/67730", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2008:0612 and \n# Oracle Linux Security Advisory ELSA-2008-0612 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67730);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-1294\", \"CVE-2008-2136\", \"CVE-2008-2812\");\n script_bugtraq_id(29235, 30076);\n script_xref(name:\"RHSA\", value:\"2008:0612\");\n\n script_name(english:\"Oracle Linux 5 : kernel (ELSA-2008-0612)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2008:0612 :\n\nUpdated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\n* a flaw was found in the Linux kernel setrlimit system call, when\nsetting RLIMIT_CPU to a certain value. This could allow a local\nunprivileged user to bypass the CPU time limit. (CVE-2008-1294,\nModerate)\n\n* multiple NULL pointer dereferences were found in various Linux\nkernel network drivers. These drivers were missing checks for terminal\nvalidity, which could allow privilege escalation. (CVE-2008-2812,\nModerate)\n\nThese updated packages fix the following bugs :\n\n* the GNU libc stub resolver is a minimal resolver that works with\nDomain Name System (DNS) servers to satisfy requests from applications\nfor names. The GNU libc stub resolver did not specify a source UDP\nport, and therefore used predictable port numbers. This could have\nmade DNS spoofing attacks easier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications,\nsuch as those using the GNU libc stub resolver, to use random UDP\nsource ports, helping to make DNS spoofing attacks harder.\n\n* when using certain hardware, a bug in UART_BUG_TXEN may have caused\nincorrect hardware detection, causing data flow to '/dev/ttyS1' to\nhang.\n\n* a 50-75% drop in NFS server rewrite performance, compared to Red Hat\nEnterprise Linux 4.6, has been resolved.\n\n* due a bug in the fast userspace mutex code, while one thread fetched\na pointer, another thread may have removed it, causing the first\nthread to fetch the wrong pointer, possibly causing a system crash.\n\n* on certain Hitachi hardware, removing the 'uhci_hcd' module caused a\nkernel oops, and the following error :\n\nBUG: warning at\narch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the 'uhci_hcd' module was reloaded, there was no access to\nUSB devices. As well, on systems that have legacy interrupts,\n'acpi_unregister_gsi' incorrectly called 'iosapci_unregister_intr()',\ncausing warning messages to be logged.\n\n* when a page was mapped with mmap(), and 'PROT_WRITE' was the only\n'prot' argument, the first read of that page caused a segmentation\nfault. If the page was read after it was written to, no fault\noccurred. This was incompatible with the Red Hat Enterprise Linux 4\nbehavior.\n\n* due to a NULL pointer dereference in powernowk8_init(), a panic may\nhave occurred.\n\n* certain error conditions handled by the bonding sysfs interface\ncould have left rtnl_lock() unbalanced, either by locking and\nreturning without unlocking, or by unlocking when it did not lock,\npossibly causing a 'kernel: RTNL: assertion failed at\nnet/core/fib_rules.c' error.\n\n* the kernel currently expects a maximum of six Machine Check\nException (MCE) banks to be exposed by a CPU. Certain CPUs have 7 or\nmore, which may have caused the MCE to be incorrectly reported.\n\n* a race condition in UNIX domain sockets may have caused recv() to\nreturn zero. For clusters, this may have caused unexpected failovers.\n\n* msgrcv() frequently returned an incorrect 'ERESTARTNOHAND (514)'\nerror number.\n\n* on certain Intel Itanium-based systems, when kdump was configured to\nhalt the system after a dump operation, after the 'System halted.'\noutput, the kernel continued to output endless 'soft lockup' messages.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2008-August/000702.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-1294\", \"CVE-2008-2136\", \"CVE-2008-2812\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2008-0612\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-devel-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-devel-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-devel-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-doc-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-doc-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-headers-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-headers-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-2.6.18-92.1.10.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-devel-2.6.18-92.1.10.0.1.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:25:23", "description": "Updated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\n* a flaw was found in the Linux kernel setrlimit system call, when\nsetting RLIMIT_CPU to a certain value. This could allow a local\nunprivileged user to bypass the CPU time limit. (CVE-2008-1294,\nModerate)\n\n* multiple NULL pointer dereferences were found in various Linux\nkernel network drivers. These drivers were missing checks for terminal\nvalidity, which could allow privilege escalation. (CVE-2008-2812,\nModerate)\n\nThese updated packages fix the following bugs :\n\n* the GNU libc stub resolver is a minimal resolver that works with\nDomain Name System (DNS) servers to satisfy requests from applications\nfor names. The GNU libc stub resolver did not specify a source UDP\nport, and therefore used predictable port numbers. This could have\nmade DNS spoofing attacks easier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications,\nsuch as those using the GNU libc stub resolver, to use random UDP\nsource ports, helping to make DNS spoofing attacks harder.\n\n* when using certain hardware, a bug in UART_BUG_TXEN may have caused\nincorrect hardware detection, causing data flow to '/dev/ttyS1' to\nhang.\n\n* a 50-75% drop in NFS server rewrite performance, compared to Red Hat\nEnterprise Linux 4.6, has been resolved.\n\n* due a bug in the fast userspace mutex code, while one thread fetched\na pointer, another thread may have removed it, causing the first\nthread to fetch the wrong pointer, possibly causing a system crash.\n\n* on certain Hitachi hardware, removing the 'uhci_hcd' module caused a\nkernel oops, and the following error :\n\nBUG: warning at\narch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the 'uhci_hcd' module was reloaded, there was no access to\nUSB devices. As well, on systems that have legacy interrupts,\n'acpi_unregister_gsi' incorrectly called 'iosapci_unregister_intr()',\ncausing warning messages to be logged.\n\n* when a page was mapped with mmap(), and 'PROT_WRITE' was the only\n'prot' argument, the first read of that page caused a segmentation\nfault. If the page was read after it was written to, no fault\noccurred. This was incompatible with the Red Hat Enterprise Linux 4\nbehavior.\n\n* due to a NULL pointer dereference in powernowk8_init(), a panic may\nhave occurred.\n\n* certain error conditions handled by the bonding sysfs interface\ncould have left rtnl_lock() unbalanced, either by locking and\nreturning without unlocking, or by unlocking when it did not lock,\npossibly causing a 'kernel: RTNL: assertion failed at\nnet/core/fib_rules.c' error.\n\n* the kernel currently expects a maximum of six Machine Check\nException (MCE) banks to be exposed by a CPU. Certain CPUs have 7 or\nmore, which may have caused the MCE to be incorrectly reported.\n\n* a race condition in UNIX domain sockets may have caused recv() to\nreturn zero. For clusters, this may have caused unexpected failovers.\n\n* msgrcv() frequently returned an incorrect 'ERESTARTNOHAND (514)'\nerror number.\n\n* on certain Intel Itanium-based systems, when kdump was configured to\nhalt the system after a dump operation, after the 'System halted.'\noutput, the kernel continued to output endless 'soft lockup' messages.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 28, "published": "2010-01-06T00:00:00", "title": "CentOS 5 : kernel (CESA-2008:0612)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-1294", "CVE-2008-2812"], "modified": "2010-01-06T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-PAE-devel", "p-cpe:/a:centos:centos:kernel-xen-devel", "p-cpe:/a:centos:centos:kernel-xen", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-headers", "cpe:/o:centos:centos:5", "p-cpe:/a:centos:centos:kernel-PAE", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2008-0612.NASL", "href": "https://www.tenable.com/plugins/nessus/43701", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0612 and \n# CentOS Errata and Security Advisory 2008:0612 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43701);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-1294\", \"CVE-2008-2136\", \"CVE-2008-2812\");\n script_bugtraq_id(29235, 30076);\n script_xref(name:\"RHSA\", value:\"2008:0612\");\n\n script_name(english:\"CentOS 5 : kernel (CESA-2008:0612)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\n* a flaw was found in the Linux kernel setrlimit system call, when\nsetting RLIMIT_CPU to a certain value. This could allow a local\nunprivileged user to bypass the CPU time limit. (CVE-2008-1294,\nModerate)\n\n* multiple NULL pointer dereferences were found in various Linux\nkernel network drivers. These drivers were missing checks for terminal\nvalidity, which could allow privilege escalation. (CVE-2008-2812,\nModerate)\n\nThese updated packages fix the following bugs :\n\n* the GNU libc stub resolver is a minimal resolver that works with\nDomain Name System (DNS) servers to satisfy requests from applications\nfor names. The GNU libc stub resolver did not specify a source UDP\nport, and therefore used predictable port numbers. This could have\nmade DNS spoofing attacks easier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications,\nsuch as those using the GNU libc stub resolver, to use random UDP\nsource ports, helping to make DNS spoofing attacks harder.\n\n* when using certain hardware, a bug in UART_BUG_TXEN may have caused\nincorrect hardware detection, causing data flow to '/dev/ttyS1' to\nhang.\n\n* a 50-75% drop in NFS server rewrite performance, compared to Red Hat\nEnterprise Linux 4.6, has been resolved.\n\n* due a bug in the fast userspace mutex code, while one thread fetched\na pointer, another thread may have removed it, causing the first\nthread to fetch the wrong pointer, possibly causing a system crash.\n\n* on certain Hitachi hardware, removing the 'uhci_hcd' module caused a\nkernel oops, and the following error :\n\nBUG: warning at\narch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the 'uhci_hcd' module was reloaded, there was no access to\nUSB devices. As well, on systems that have legacy interrupts,\n'acpi_unregister_gsi' incorrectly called 'iosapci_unregister_intr()',\ncausing warning messages to be logged.\n\n* when a page was mapped with mmap(), and 'PROT_WRITE' was the only\n'prot' argument, the first read of that page caused a segmentation\nfault. If the page was read after it was written to, no fault\noccurred. This was incompatible with the Red Hat Enterprise Linux 4\nbehavior.\n\n* due to a NULL pointer dereference in powernowk8_init(), a panic may\nhave occurred.\n\n* certain error conditions handled by the bonding sysfs interface\ncould have left rtnl_lock() unbalanced, either by locking and\nreturning without unlocking, or by unlocking when it did not lock,\npossibly causing a 'kernel: RTNL: assertion failed at\nnet/core/fib_rules.c' error.\n\n* the kernel currently expects a maximum of six Machine Check\nException (MCE) banks to be exposed by a CPU. Certain CPUs have 7 or\nmore, which may have caused the MCE to be incorrectly reported.\n\n* a race condition in UNIX domain sockets may have caused recv() to\nreturn zero. For clusters, this may have caused unexpected failovers.\n\n* msgrcv() frequently returned an incorrect 'ERESTARTNOHAND (514)'\nerror number.\n\n* on certain Intel Itanium-based systems, when kdump was configured to\nhalt the system after a dump operation, after the 'System halted.'\noutput, the kernel continued to output endless 'soft lockup' messages.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-August/015181.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1743cd03\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-August/015182.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d3470ba2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-devel-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-devel-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-doc-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-headers-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-devel-2.6.18-92.1.10.el5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:44:00", "description": "These updated packages fix the following security issues :\n\n - a possible kernel memory leak was found in the Linux\n kernel Simple Internet Transition (SIT) INET6\n implementation. This could allow a local unprivileged\n user to cause a denial of service. (CVE-2008-2136,\n Important)\n\n - a flaw was found in the Linux kernel setrlimit system\n call, when setting RLIMIT_CPU to a certain value. This\n could allow a local unprivileged user to bypass the CPU\n time limit. (CVE-2008-1294, Moderate)\n\n - multiple NULL pointer dereferences were found in various\n Linux kernel network drivers. These drivers were missing\n checks for terminal validity, which could allow\n privilege escalation. (CVE-2008-2812, Moderate)\n\nThese updated packages fix the following bugs :\n\n - the GNU libc stub resolver is a minimal resolver that\n works with Domain Name System (DNS) servers to satisfy\n requests from applications for names. The GNU libc stub\n resolver did not specify a source UDP port, and\n therefore used predictable port numbers. This could have\n made DNS spoofing attacks easier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications,\nsuch as those using the GNU libc stub resolver, to use random UDP\nsource ports, helping to make DNS spoofing attacks harder.\n\n - when using certain hardware, a bug in UART_BUG_TXEN may\n have caused incorrect hardware detection, causing data\n flow to '/dev/ttyS1' to hang.\n\n - a 50-75% drop in NFS server rewrite performance,\n compared to Red Hat Enterprise Linux 4.6, has been\n resolved.\n\n - due a bug in the fast userspace mutex code, while one\n thread fetched a pointer, another thread may have\n removed it, causing the first thread to fetch the wrong\n pointer, possibly causing a system crash.\n\n - on certain Hitachi hardware, removing the 'uhci_hcd'\n module caused a kernel oops, and the following error :\n\nBUG: warning at\narch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the 'uhci_hcd' module was reloaded, there was no access to\nUSB devices. As well, on systems that have legacy interrupts,\n'acpi_unregister_gsi' incorrectly called 'iosapci_unregister_intr()',\ncausing warning messages to be logged.\n\n - when a page was mapped with mmap(), and 'PROT_WRITE' was\n the only 'prot' argument, the first read of that page\n caused a segmentation fault. If the page was read after\n it was written to, no fault occurred. This was\n incompatible with the Red Hat Enterprise Linux 4\n behavior.\n\n - due to a NULL pointer dereference in powernowk8_init(),\n a panic may have occurred.\n\n - certain error conditions handled by the bonding sysfs\n interface could have left rtnl_lock() unbalanced, either\n by locking and returning without unlocking, or by\n unlocking when it did not lock, possibly causing a\n 'kernel: RTNL: assertion failed at net/core/fib_rules.c'\n error.\n\n - the kernel currently expects a maximum of six Machine\n Check Exception (MCE) banks to be exposed by a CPU.\n Certain CPUs have 7 or more, which may have caused the\n MCE to be incorrectly reported.\n\n - a race condition in UNIX domain sockets may have caused\n recv() to return zero. For clusters, this may have\n caused unexpected failovers.\n\n - msgrcv() frequently returned an incorrect\n 'ERESTARTNOHAND (514)' error number.\n\n - on certain Intel Itanium-based systems, when kdump was\n configured to halt the system after a dump operation,\n after the 'System halted.' output, the kernel continued\n to output endless 'soft lockup' messages.", "edition": 26, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : kernel on SL5.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136", "CVE-2008-1294", "CVE-2008-2812"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20080804_KERNEL_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60459", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60459);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-1294\", \"CVE-2008-2136\", \"CVE-2008-2812\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"These updated packages fix the following security issues :\n\n - a possible kernel memory leak was found in the Linux\n kernel Simple Internet Transition (SIT) INET6\n implementation. This could allow a local unprivileged\n user to cause a denial of service. (CVE-2008-2136,\n Important)\n\n - a flaw was found in the Linux kernel setrlimit system\n call, when setting RLIMIT_CPU to a certain value. This\n could allow a local unprivileged user to bypass the CPU\n time limit. (CVE-2008-1294, Moderate)\n\n - multiple NULL pointer dereferences were found in various\n Linux kernel network drivers. These drivers were missing\n checks for terminal validity, which could allow\n privilege escalation. (CVE-2008-2812, Moderate)\n\nThese updated packages fix the following bugs :\n\n - the GNU libc stub resolver is a minimal resolver that\n works with Domain Name System (DNS) servers to satisfy\n requests from applications for names. The GNU libc stub\n resolver did not specify a source UDP port, and\n therefore used predictable port numbers. This could have\n made DNS spoofing attacks easier.\n\nThe Linux kernel has been updated to implement random UDP source ports\nwhere none are specified by an application. This allows applications,\nsuch as those using the GNU libc stub resolver, to use random UDP\nsource ports, helping to make DNS spoofing attacks harder.\n\n - when using certain hardware, a bug in UART_BUG_TXEN may\n have caused incorrect hardware detection, causing data\n flow to '/dev/ttyS1' to hang.\n\n - a 50-75% drop in NFS server rewrite performance,\n compared to Red Hat Enterprise Linux 4.6, has been\n resolved.\n\n - due a bug in the fast userspace mutex code, while one\n thread fetched a pointer, another thread may have\n removed it, causing the first thread to fetch the wrong\n pointer, possibly causing a system crash.\n\n - on certain Hitachi hardware, removing the 'uhci_hcd'\n module caused a kernel oops, and the following error :\n\nBUG: warning at\narch/ia64/kernel/iosapic.c:1001/iosapic_unregister_intr()\n\nEven after the 'uhci_hcd' module was reloaded, there was no access to\nUSB devices. As well, on systems that have legacy interrupts,\n'acpi_unregister_gsi' incorrectly called 'iosapci_unregister_intr()',\ncausing warning messages to be logged.\n\n - when a page was mapped with mmap(), and 'PROT_WRITE' was\n the only 'prot' argument, the first read of that page\n caused a segmentation fault. If the page was read after\n it was written to, no fault occurred. This was\n incompatible with the Red Hat Enterprise Linux 4\n behavior.\n\n - due to a NULL pointer dereference in powernowk8_init(),\n a panic may have occurred.\n\n - certain error conditions handled by the bonding sysfs\n interface could have left rtnl_lock() unbalanced, either\n by locking and returning without unlocking, or by\n unlocking when it did not lock, possibly causing a\n 'kernel: RTNL: assertion failed at net/core/fib_rules.c'\n error.\n\n - the kernel currently expects a maximum of six Machine\n Check Exception (MCE) banks to be exposed by a CPU.\n Certain CPUs have 7 or more, which may have caused the\n MCE to be incorrectly reported.\n\n - a race condition in UNIX domain sockets may have caused\n recv() to return zero. For clusters, this may have\n caused unexpected failovers.\n\n - msgrcv() frequently returned an incorrect\n 'ERESTARTNOHAND (514)' error number.\n\n - on certain Intel Itanium-based systems, when kdump was\n configured to halt the system after a dump operation,\n after the 'System halted.' output, the kernel continued\n to output endless 'soft lockup' messages.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0808&L=scientific-linux-errata&T=0&P=819\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?49f0c6c1\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"kernel-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-devel-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-devel-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-doc-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-headers-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-2.6.18-92.1.10.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-devel-2.6.18-92.1.10.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:25:22", "description": "Updated kernel packages that fix a security issue and several bugs are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issue :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\nAs well, these updated packages fix the following bugs :\n\n* a possible kernel hang on hugemem systems, due to a bug in NFS,\nwhich may have caused systems to become unresponsive, has been\nresolved.\n\n* an inappropriate exit condition occurred in the\narchitecture-specific 'mmap()' realization, which fell into an\ninfinite loop under certain conditions. On 64-bit systems, this issue\nmay have manifested itself to users as a soft lockup, or process\nhangs.\n\n* due to a bug in hardware initialization in the 'ohci_hcd' kernel\nmodule, the kernel may have failed with a NULL pointer dereference. On\n64-bit PowerPC systems, this may have caused booting to fail, and drop\nto xmon. On other platforms, a kernel oops occurred.\n\n* due to insufficient locks in task termination code, a panic may have\noccurred in the 'sys_times()' system call on SMP machines.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 27, "published": "2010-01-06T00:00:00", "title": "CentOS 4 : kernel (CESA-2008:0607)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "modified": "2010-01-06T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-xenU-devel", "p-cpe:/a:centos:centos:kernel-largesmp", "p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-smp-devel", "p-cpe:/a:centos:centos:kernel-largesmp-devel", "p-cpe:/a:centos:centos:kernel-xenU", "p-cpe:/a:centos:centos:kernel-hugemem-devel"], "id": "CENTOS_RHSA-2008-0607.NASL", "href": "https://www.tenable.com/plugins/nessus/43700", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0607 and \n# CentOS Errata and Security Advisory 2008:0607 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43700);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-2136\");\n script_bugtraq_id(29235);\n script_xref(name:\"RHSA\", value:\"2008:0607\");\n\n script_name(english:\"CentOS 4 : kernel (CESA-2008:0607)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix a security issue and several bugs are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issue :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\nAs well, these updated packages fix the following bugs :\n\n* a possible kernel hang on hugemem systems, due to a bug in NFS,\nwhich may have caused systems to become unresponsive, has been\nresolved.\n\n* an inappropriate exit condition occurred in the\narchitecture-specific 'mmap()' realization, which fell into an\ninfinite loop under certain conditions. On 64-bit systems, this issue\nmay have manifested itself to users as a soft lockup, or process\nhangs.\n\n* due to a bug in hardware initialization in the 'ohci_hcd' kernel\nmodule, the kernel may have failed with a NULL pointer dereference. On\n64-bit PowerPC systems, this may have caused booting to fail, and drop\nto xmon. On other platforms, a kernel oops occurred.\n\n* due to insufficient locks in task termination code, a panic may have\noccurred in the 'sys_times()' system call on SMP machines.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-July/015155.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?57a690cc\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-July/015156.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b2c26320\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-July/015171.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?adc71419\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/07/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-doc-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"ia64\", reference:\"kernel-largesmp-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"ia64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-xenU-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-xenU-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-67.0.22.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T14:45:28", "description": "This kernel update fixes the following security problems :\n\n - tunneled ipv6 packets (SIT) could trigger a memory leak\n in the kernel. Remote attackers could exploit that to\n crash machines. (CVE-2008-2136)\n\nAdditionally the following bugfixes have been included for all\nplatforms :\n\n - patches.xfs/xfs-kern_31033a_Fix-fsync-b0rkage.patch: Fix\n XFS fsync breakage. (bnc#388798)\n\n - patches.fixes/sit-add-missing-kfree_skb: sit - Add\n missing kfree_skb() on pskb_may_pull() failure. .\n (bnc#389152)\n\n -\n patches.xfs/xfs-kern_30701a_Ensure-a-btree-insert-return\n s-a- valid-cursor.patch: Ensure a btree insert returns a\n valid cursor. ( bnc#388806).\n\n - patches.fixes/369802_d_path_fix.patch: fix d_path for\n pseudo filesystems. (bnc#369802)\n\n - patches.fixes/ignore_lost_ticks: fixed\n do_vgettimeofday() and other issues with this patch.\n (bnc#267050)\n\n - patches.drivers/pci-express-aer-aerdriver-off.patch: PCI\n\n - add possibility to turn AER off. (bnc#382033)\n\n - patches.drivers/pci-express-aer-documentation: PCI - add\n AER documentation. (bnc#382033)", "edition": 23, "published": "2009-09-24T00:00:00", "title": "SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5235)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "modified": "2009-09-24T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_KERNEL-5235.NASL", "href": "https://www.tenable.com/plugins/nessus/41532", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41532);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-2136\");\n\n script_name(english:\"SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5235)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This kernel update fixes the following security problems :\n\n - tunneled ipv6 packets (SIT) could trigger a memory leak\n in the kernel. Remote attackers could exploit that to\n crash machines. (CVE-2008-2136)\n\nAdditionally the following bugfixes have been included for all\nplatforms :\n\n - patches.xfs/xfs-kern_31033a_Fix-fsync-b0rkage.patch: Fix\n XFS fsync breakage. (bnc#388798)\n\n - patches.fixes/sit-add-missing-kfree_skb: sit - Add\n missing kfree_skb() on pskb_may_pull() failure. .\n (bnc#389152)\n\n -\n patches.xfs/xfs-kern_30701a_Ensure-a-btree-insert-return\n s-a- valid-cursor.patch: Ensure a btree insert returns a\n valid cursor. ( bnc#388806).\n\n - patches.fixes/369802_d_path_fix.patch: fix d_path for\n pseudo filesystems. (bnc#369802)\n\n - patches.fixes/ignore_lost_ticks: fixed\n do_vgettimeofday() and other issues with this patch.\n (bnc#267050)\n\n - patches.drivers/pci-express-aer-aerdriver-off.patch: PCI\n\n - add possibility to turn AER off. (bnc#382033)\n\n - patches.drivers/pci-express-aer-documentation: PCI - add\n AER documentation. (bnc#382033)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-2136.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 5235.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-bigsmp-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-default-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-smp-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-source-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-syms-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-xen-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"i586\", reference:\"kernel-xenpae-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-bigsmp-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-debug-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-default-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-kdump-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-smp-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-source-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-syms-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-vmi-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-vmipae-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-xen-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"i586\", reference:\"kernel-xenpae-2.6.16.60-0.23\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:43:59", "description": "These updated packages fix the following security issue :\n\n - a possible kernel memory leak was found in the Linux\n kernel Simple Internet Transition (SIT) INET6\n implementation. This could allow a local unprivileged\n user to cause a denial of service. (CVE-2008-2136,\n Important)\n\nAs well, these updated packages fix the following bugs :\n\n - a possible kernel hang on hugemem systems, due to a bug\n in NFS, which may have caused systems to become\n unresponsive, has been resolved.\n\n - an inappropriate exit condition occurred in the\n architecture-specific 'mmap()' realization, which fell\n into an infinite loop under certain conditions. On\n 64-bit systems, this issue may have manifested itself to\n users as a soft lockup, or process hangs.\n\n - due to a bug in hardware initialization in the\n 'ohci_hcd' kernel module, the kernel may have failed\n with a NULL pointer dereference. On 64-bit PowerPC\n systems, this may have caused booting to fail, and drop\n to xmon. On other platforms, a kernel oops occurred.\n\n - due to insufficient locks in task termination code, a\n panic may have occurred in the 'sys_times()' system call\n on SMP machines.", "edition": 25, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : kernel on SL4.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20080723_KERNEL_ON_SL4_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60448", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60448);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-2136\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL4.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"These updated packages fix the following security issue :\n\n - a possible kernel memory leak was found in the Linux\n kernel Simple Internet Transition (SIT) INET6\n implementation. This could allow a local unprivileged\n user to cause a denial of service. (CVE-2008-2136,\n Important)\n\nAs well, these updated packages fix the following bugs :\n\n - a possible kernel hang on hugemem systems, due to a bug\n in NFS, which may have caused systems to become\n unresponsive, has been resolved.\n\n - an inappropriate exit condition occurred in the\n architecture-specific 'mmap()' realization, which fell\n into an infinite loop under certain conditions. On\n 64-bit systems, this issue may have manifested itself to\n users as a soft lockup, or process hangs.\n\n - due to a bug in hardware initialization in the\n 'ohci_hcd' kernel module, the kernel may have failed\n with a NULL pointer dereference. On 64-bit PowerPC\n systems, this may have caused booting to fail, and drop\n to xmon. On other platforms, a kernel oops occurred.\n\n - due to insufficient locks in task termination code, a\n panic may have occurred in the 'sys_times()' system call\n on SMP machines.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0807&L=scientific-linux-errata&T=0&P=2152\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?22c4c73c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/07/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL4\", reference:\"kernel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-doc-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-smp-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-smp-devel-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-xenU-2.6.9-67.0.22.EL\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"kernel-xenU-devel-2.6.9-67.0.22.EL\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T12:44:12", "description": "From Red Hat Security Advisory 2008:0607 :\n\nUpdated kernel packages that fix a security issue and several bugs are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issue :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\nAs well, these updated packages fix the following bugs :\n\n* a possible kernel hang on hugemem systems, due to a bug in NFS,\nwhich may have caused systems to become unresponsive, has been\nresolved.\n\n* an inappropriate exit condition occurred in the\narchitecture-specific 'mmap()' realization, which fell into an\ninfinite loop under certain conditions. On 64-bit systems, this issue\nmay have manifested itself to users as a soft lockup, or process\nhangs.\n\n* due to a bug in hardware initialization in the 'ohci_hcd' kernel\nmodule, the kernel may have failed with a NULL pointer dereference. On\n64-bit PowerPC systems, this may have caused booting to fail, and drop\nto xmon. On other platforms, a kernel oops occurred.\n\n* due to insufficient locks in task termination code, a panic may have\noccurred in the 'sys_times()' system call on SMP machines.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 25, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 4 : kernel (ELSA-2008-0607)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-hugemem", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-xenU-devel", "p-cpe:/a:oracle:linux:kernel-xenU", "p-cpe:/a:oracle:linux:kernel-smp-devel", "p-cpe:/a:oracle:linux:kernel-largesmp", "p-cpe:/a:oracle:linux:kernel-smp", "p-cpe:/a:oracle:linux:kernel-hugemem-devel", "cpe:/o:oracle:linux:4", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-largesmp-devel"], "id": "ORACLELINUX_ELSA-2008-0607.NASL", "href": "https://www.tenable.com/plugins/nessus/67729", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2008:0607 and \n# Oracle Linux Security Advisory ELSA-2008-0607 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67729);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-2136\");\n script_bugtraq_id(29235);\n script_xref(name:\"RHSA\", value:\"2008:0607\");\n\n script_name(english:\"Oracle Linux 4 : kernel (ELSA-2008-0607)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2008:0607 :\n\nUpdated kernel packages that fix a security issue and several bugs are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issue :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\nAs well, these updated packages fix the following bugs :\n\n* a possible kernel hang on hugemem systems, due to a bug in NFS,\nwhich may have caused systems to become unresponsive, has been\nresolved.\n\n* an inappropriate exit condition occurred in the\narchitecture-specific 'mmap()' realization, which fell into an\ninfinite loop under certain conditions. On 64-bit systems, this issue\nmay have manifested itself to users as a soft lockup, or process\nhangs.\n\n* due to a bug in hardware initialization in the 'ohci_hcd' kernel\nmodule, the kernel may have failed with a NULL pointer dereference. On\n64-bit PowerPC systems, this may have caused booting to fail, and drop\nto xmon. On other platforms, a kernel oops occurred.\n\n* due to insufficient locks in task termination code, a panic may have\noccurred in the 'sys_times()' system call on SMP machines.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2008-July/000690.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/07/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-2136\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2008-0607\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-devel-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-devel-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-doc-2.6.9\") && rpm_check(release:\"EL4\", reference:\"kernel-doc-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-hugemem-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-hugemem-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"kernel-largesmp-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"ia64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-largesmp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-smp-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-xenU-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"kernel-xenU-devel-2.6.9-67.0.22.0.1.EL\")) flag++;\nif (rpm_exists(release:\"EL4\", rpm:\"kernel-xenU-devel-2.6.9\") && rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-67.0.22.0.1.EL\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T14:45:29", "description": "This kernel update fixes the following security problems :\n\n - tunneled ipv6 packets (SIT) could trigger a memory leak\n in the kernel. Remote attackers could exploit that to\n crash machines. (CVE-2008-2136)\n\nAdditionally the following bugfixes have been included for all\nplatforms :\n\n - patches.xfs/xfs-kern_31033a_Fix-fsync-b0rkage.patch: Fix\n XFS fsync breakage. (bnc#388798)\n\n - patches.fixes/sit-add-missing-kfree_skb: sit - Add\n missing kfree_skb() on pskb_may_pull() failure. .\n (bnc#389152)\n\n -\n patches.xfs/xfs-kern_30701a_Ensure-a-btree-insert-return\n s-a- valid-cursor.patch: Ensure a btree insert returns a\n valid cursor. ( bnc#388806).\n\n - patches.fixes/369802_d_path_fix.patch: fix d_path for\n pseudo filesystems. (bnc#369802)\n\n - patches.fixes/ignore_lost_ticks: fixed\n do_vgettimeofday() and other issues with this patch.\n (bnc#267050)\n\n - patches.drivers/pci-express-aer-aerdriver-off.patch: PCI\n\n - add possibility to turn AER off. (bnc#382033)\n\n - patches.drivers/pci-express-aer-documentation: PCI - add\n AER documentation. (bnc#382033)", "edition": 23, "published": "2012-05-17T00:00:00", "title": "SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5239)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "modified": "2012-05-17T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_KERNEL-5239.NASL", "href": "https://www.tenable.com/plugins/nessus/59127", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(59127);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-2136\");\n\n script_name(english:\"SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5239)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This kernel update fixes the following security problems :\n\n - tunneled ipv6 packets (SIT) could trigger a memory leak\n in the kernel. Remote attackers could exploit that to\n crash machines. (CVE-2008-2136)\n\nAdditionally the following bugfixes have been included for all\nplatforms :\n\n - patches.xfs/xfs-kern_31033a_Fix-fsync-b0rkage.patch: Fix\n XFS fsync breakage. (bnc#388798)\n\n - patches.fixes/sit-add-missing-kfree_skb: sit - Add\n missing kfree_skb() on pskb_may_pull() failure. .\n (bnc#389152)\n\n -\n patches.xfs/xfs-kern_30701a_Ensure-a-btree-insert-return\n s-a- valid-cursor.patch: Ensure a btree insert returns a\n valid cursor. ( bnc#388806).\n\n - patches.fixes/369802_d_path_fix.patch: fix d_path for\n pseudo filesystems. (bnc#369802)\n\n - patches.fixes/ignore_lost_ticks: fixed\n do_vgettimeofday() and other issues with this patch.\n (bnc#267050)\n\n - patches.drivers/pci-express-aer-aerdriver-off.patch: PCI\n\n - add possibility to turn AER off. (bnc#382033)\n\n - patches.drivers/pci-express-aer-documentation: PCI - add\n AER documentation. (bnc#382033)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-2136.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 5239.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/05/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-debug-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-kdump-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.60-0.23\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.60-0.23\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:06:13", "description": "Updated kernel packages that fix a security issue and several bugs are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issue :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\nAs well, these updated packages fix the following bugs :\n\n* a possible kernel hang on hugemem systems, due to a bug in NFS,\nwhich may have caused systems to become unresponsive, has been\nresolved.\n\n* an inappropriate exit condition occurred in the\narchitecture-specific 'mmap()' realization, which fell into an\ninfinite loop under certain conditions. On 64-bit systems, this issue\nmay have manifested itself to users as a soft lockup, or process\nhangs.\n\n* due to a bug in hardware initialization in the 'ohci_hcd' kernel\nmodule, the kernel may have failed with a NULL pointer dereference. On\n64-bit PowerPC systems, this may have caused booting to fail, and drop\nto xmon. On other platforms, a kernel oops occurred.\n\n* due to insufficient locks in task termination code, a panic may have\noccurred in the 'sys_times()' system call on SMP machines.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.", "edition": 28, "published": "2008-07-24T00:00:00", "title": "RHEL 4 : kernel (RHSA-2008:0607)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-2136"], "modified": "2008-07-24T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:kernel-largesmp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-xenU", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-xenU-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-largesmp", "cpe:/o:redhat:enterprise_linux:4.6"], "id": "REDHAT-RHSA-2008-0607.NASL", "href": "https://www.tenable.com/plugins/nessus/33570", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0607. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(33570);\n script_version(\"1.26\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-2136\");\n script_bugtraq_id(29235);\n script_xref(name:\"RHSA\", value:\"2008:0607\");\n\n script_name(english:\"RHEL 4 : kernel (RHSA-2008:0607)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix a security issue and several bugs are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issue :\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a\nlocal unprivileged user to cause a denial of service. (CVE-2008-2136,\nImportant)\n\nAs well, these updated packages fix the following bugs :\n\n* a possible kernel hang on hugemem systems, due to a bug in NFS,\nwhich may have caused systems to become unresponsive, has been\nresolved.\n\n* an inappropriate exit condition occurred in the\narchitecture-specific 'mmap()' realization, which fell into an\ninfinite loop under certain conditions. On 64-bit systems, this issue\nmay have manifested itself to users as a soft lockup, or process\nhangs.\n\n* due to a bug in hardware initialization in the 'ohci_hcd' kernel\nmodule, the kernel may have failed with a NULL pointer dereference. On\n64-bit PowerPC systems, this may have caused booting to fail, and drop\nto xmon. On other platforms, a kernel oops occurred.\n\n* due to insufficient locks in task termination code, a panic may have\noccurred in the 'sys_times()' system call on SMP machines.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-2136\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2008:0607\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-largesmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-largesmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/07/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/07/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-2136\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2008:0607\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2008:0607\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-devel-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-doc-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-devel-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-largesmp-devel-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-devel-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-xenU-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-xenU-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-xenU-devel-2.6.9-67.0.22.EL\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-xenU-devel-2.6.9-67.0.22.EL\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:51", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2008-2826"], "description": "[2.6.9-67.0.22.0.1.EL]\r\n- fix skb alignment that was causing sendto() to fail with EFAULT (Olaf Kirch) [orabug 6845794]\r\n- fix entropy flag in bnx2 driver to generate entropy pool (John Sobecki) [orabug 5931647]\r\n- fix enomem due to larger mtu size page alloc (Zach Brown) [orabug 5486128]\r\n- fix per_cpu() api bug_on with rds (Zach Brown) [orabug 5760648]\r\n- remove patch sysrq-b that queues upto keventd thread [orabug 6125546]\r\n- allow more than 4GB hugepage for single user (Herbert van den Bergh) [orabug 6002738]\r\n- netrx/netpoll race avoidance (Tina Yang) [orabug 6143381]\r\n- fix pv guest oops on live migration (Chuck Anderson) [orabugz 4118]\r\n \n[2.6.9-67.0.22]\r\n-[revert] sys_times: Fix system unresponsiveness during many concurrent invocation of sys_times (Vitaly Mayatskikh) [449101 435280]\r\n \n[2.6.9-67.0.21]\r\n-rpc: do not block on skb allocation (Jeff Layton) [450185 439436]\r\n-Fix deadlock possibility in arch_get_unmapped_area_topdown() (Vitaly Mayatskikh) [450760 450094]\r\n-[usb] ohci-hcd: Fix kernel failed to boot and dropped to xmon on ppc64 (Vitaly Mayatskikh) [450865 443052]\r\n-sctp: make sure length argument passed does not overflow (Neil Horman) [452479 452480] {CVE-2008-2826}\r\n-sit: Fix exploitable remote memory leak (Jiri Pirko) [446035 446036] {CVE-2008-2136}", "edition": 4, "modified": "2008-07-24T00:00:00", "published": "2008-07-24T00:00:00", "id": "ELSA-2008-0607", "href": "http://linux.oracle.com/errata/ELSA-2008-0607.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:11", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2008-3525", "CVE-2008-2729", "CVE-2008-4210", "CVE-2008-3275", "CVE-2007-6063", "CVE-2008-2812", "CVE-2008-1673"], "description": "[2.4.21-58.0.0.0.1.EL]\n- add directio support for qla drivers (herb) [ora 6346849]\n- support PT Quad card [ora 5751043]\n- io to nfs partition hangs [ora 5088963]\n- add entropy for bnx2 nic [ora 5931647]\n- avoid large allocation-fragmentation in MTU (zab)\n- fix clear highpage (wli)\n[2.4.21-58.EL]\n- copy_user doesn't zero tail bytes on page fault (Don Howard) [433941] {CVE-2008-2729}\n- Fix long symlink support (Fabio Olive Leite) [BZ 438758]\n- Fix possible buffer overflow in ASN.1 parsing routine (Don Howard) [444461] {CVE-2008-1673}\n- Fix exploitable remote memory leak in sit (Don Howard) [446034] {CVE-2008-2136}\n- Fix possible panic in mptctl_gettargetinfo (Don Howard) [451955]\n- Add add NULL pointer checks in tty drivers (Don Howard) [453158] {CVE-2008-2812}\n- Add a kernel parameter to disable lost tick accounting on x86_64 (Don Howard) [455921]\n- Fix possible isdn_net buffer overflows (Don Howard) [456361] {CVE-2007-6063}\n- Fix lookup on deleted directory (Eugene Teo) [457862] {CVE-2008-3275}\n- Add missing capability checks in sbni_ioctl (Eugene Teo) [460404] {CVE-2008-3525}\n- Remove suid/sgid bits on ftruncate (dhoward) [463684] {CVE-2008-4210}", "edition": 4, "modified": "2008-12-18T00:00:00", "published": "2008-12-18T00:00:00", "id": "ELSA-2008-0973", "href": "http://linux.oracle.com/errata/ELSA-2008-0973.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:35", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2007-5904", "CVE-2008-0004", "CVE-2008-2826", "CVE-2008-1669", "CVE-2008-0001", "CVE-2008-0598", "CVE-2005-0504", "CVE-2007-6151", "CVE-2008-1375", "CVE-2007-4997", "CVE-2008-0007", "CVE-2008-2729", "CVE-2006-4145", "CVE-2007-6206", "CVE-2008-1367", "CVE-2007-6063", "CVE-2008-2812", "CVE-2007-5500", "CVE-2008-1673", "CVE-2007-4130"], "description": "[2.6.9-78]\n-alsa: Fix mic not working for HP XW series (Brian Maly) [453783]\n[2.6.9-77]\n-alsa: Add missing quirks for alc262 (Brian Maly) [453783]\n-Revert 'i8042: remove polling timer support - Original bz 246233' (Vivek Goyal) [450918]\n[2.6.9-76]\n-tty: fix tty holes (Vivek Goyal) [453155] {CVE-2008-2812}\n-xen: fix use of pvdisk or blkfront or xen-vbd for boot device (Don Dutile) [452210]\n-ppc64: fix restore of vmx registers in signal return (Brad Peters) [403471]\n-pci: correct pci bus assignments (Pete Zaitcev) [181648]\n-Fix diskdump failure on new mpt fusion driver (Chip Coldwell) [268921]\n[2.6.9-75]\n-mptfusion: Fix regression where commands timeout when issuing host reset to mpt fusion hba (Chip Coldwell) [452265]\n-copy_user_generic_c does not zero bytes left at destination after GPF (Vitaly Mayatskikh) [451274] {CVE-2008-2729}\n-sctp: make sure length argument passed does not overflow (Neil Horman) [452480] {CVE-2008-2826}\n-[infiniband] ehca: fixes lost interrupts problem over ib ehca after lpar to lpar communication (Brad Peters) [450689]\n-cifs: don t allow demultiplex thread to exit until kthread_stop is called (Jeff Layton) [442789]\n-Fix copy_from_user vulnerability (Vitaly Mayatskikh) [433943] {CVE-2008-0598}\n-Revert 'Enable fb_radeon driver on ppc64' (Vivek Goyal) [350931]\n[2.6.9-74]\n-[xen] pv on hvm: Fix cant open /dev/xvda while probing disks during installation issue (Don Dutile) [447315]\n-bnx2x: correct chip reset (Andy Gospodarek) [328001]\n-Fix race in switch_uid (Vince Worthington) [441282]\n[2.6.9-73]\n-Add more PCI IDs to support hdmi audio on amd chipsets (Bhavana Nagendra) [428964]\n-powernow k8: Repost to fix unnecessary error messages with synchronized p state transitions (Ed Pollard) [276771]\n-[usb] ohci-hcd: Fix kernel failed to boot and dropped to xmon on ppc64 (Vitaly Mayatskikh) [443052]\n-bonding: Fix interface flags issue (Andy Gospodarek) [442124]\n-qla4xxx: fix time outs, syncronization and re-logins (Marcus Barrow) [437898]\n-qla2xxx: update version to 8.02.09-d0-rhel4.7-04 (Marcus Barrow) [450645]\n-qla2xxx: correct srb usage after completion free issues resulting in slab corruption (Marcus Barrow) [450645]\n-qla2xxx: add 4 and 8 gb to port speed reporting (Marcus Barrow) [450645]\n-qla2xxx: add isp85xx in some ioctl paths for nvram and flash handling (Marcus Barrow) [450645]\n-qla2xxx: fix debug messages (Marcus Barrow) [450645]\n-qla2xxx: allocated firmware dump space for isp85xx (Marcus Barrow) [450645]\n-qla2xxx: correct isp84xx verify chip response handling (Marcus Barrow) [450645]\n-qla2xxx: add isp84xx to list of optionrom layout ids (Marcus Barrow) [450645]\n-qla2xxx: correct isp84xx logic operations in qla2x00_fw_ready (Marcus Barrow) [450645]\n-qla2xxx: correct isp84xx structure size mismatch with api (Marcus Barrow) [450645]\n-qla2xxx: correct isp84xx ioctl handling (Marcus Barrow) [450645]\n-Enable fb_radeon driver on ppc64 (Brad Peters) [350931]\n-ehca: fix for event queue overflow on ib ehca adapters (Brad Peters) [446714]\n-Fix deadlock possibility in arch_get_unmapped_area_topdown() (Vitaly Mayatskikh) [450094]\n-megaraid: Add support ibm blackrock controller (Chip Coldwell) [449718]\n-sit: Fix exploitable remote memory leak (Jiri Pirko) [446036] {CVE-2008-2136}\n-ehca: fix race possibility between qp async handler and destroy_qp (Brad Peters) [446110]\n-Fix hang when using /proc/sys/vm/drop_caches under heavy load on large system (Larry Woodman) [449381]\n-Fix possible buffer overflow in asn.1 parsing routines (Anton Arapov) [444463] {CVE-2008-1673}\n-[s390] Fix vmrm cmm use triggering oom killer (Hans-Joachim Picht) [446257]\n-[s390] fix iucv limit and cmm proc permissions (Hans-Joachim Picht) [446257]\n-Extend mce banks support to more than 6 for dunnington and nehalem (Geoff Gustafson) [446675]\n-ppc64: Fix slb shadow buffer support (Brad Peters) [440138]\n-Add hp DL385 G2 and DL585 G2 to whitelist for bfsort (Tony Camuso) [251032]\n[2.6.9-72]\n-Minor code cleanup to sys_times() call (Vitaly Mayatskikh) [448934]\n-qla2xxx: Update firmware for 4,8 gb/s adapters to version 8.02.09-d0-rhel4.7-03 (Marcus Barrow) [448641]\n-xen: minimize loss of network connectivity after guest migration (Don Dutile) [444473]\n-dm-raid: Fix bad performance of dm-raid (Mikulas Patocka) [432566]\n-Re-apply: Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [429727]\n-Revert '[MOXA] buffer overflow in moxa driver' (Vivek Goyal) [423141]\n-Revert 'neofb: avoid overwriting fb_info fields' (Vivek Goyal) [430252]\n[2.6.9-71]\n-cciss: disable scsi_ioctl_send_command in cciss driver (Doug Chapman) [443053]\n-bnx2: fix panic when changing device settings while running netconsole (Andy Gospodarek) [444041]\n-Infiniband: Fix ipoib oops (Doug Ledford) [445736]\n-Fix system lockup in eventpoll (Josef Bacik) [446409]\n-ptrace: fix ptrace_attach and ptrace_detach race (Jerome Marchand) [311931]\n-diskdump: Fix diskdump regression in rhel 4.6 (Chip Coldwell) [268921]\n-[s390] ptrace: restore single_step behavior after do_signal (Jerome Marchand) [426647]\n-[NET] change skb_reserve to have signed length (Neil Horman) [445774]\n-x86_64: ia32 syscall restart fix (Jerome Marchand) [435000]\n-ehca: fix ehca driver for use with dapl (Doug Ledford) [443072]\n-ibmebus: Cleanup all devices upon module rmmod (Brad Peters) [441739]\n-sys_times: Fix system unresponsiveness during many concurrent invocation of sys_times (Vitaly Mayatskikh) [435280]\n-ehea: support ipv4 checksum capability only (Brad Peters) [439445]\n-xen: Fix blkfront deadlock on pv restore (Don Dutile) [429103]\n-Re-apply: Fix usb stress test issue on amd sbx00 systems (Bhavana Nagendra) [435787]\n-libata: ahci kill spurious ncq completion detection (David Milburn) [432396]\n-libata: implement ATA_PFLAG_RESETTING (David Milburn) [432396]\n[2.6.9-70]\n-proc pid limits: fix duplicate file names (Neil Horman) [443825]\n-md: make md pack rdev list (Doug Ledford) [194585]\n-Add needed locking to fcheck() in both dnotify.c and locks.c (Alexander Viro) [443438 439757] {CVE-2008-1669 CVE-2008-1375}\n-bonding: fix link monitor capability check (Andy Gospodarek) [441897]\n-Kernel doesn not clear DF for signal handlers (Vitaly Mayatskikh) [437315] {CVE-2008-1367}\n-Fix pv on hvm crash due to vnif increase patch (Don Dutile) [442538]\n-pv on hvm: memory corruption due to vnif increase (Don Dutile) [442298]\n-oprofile fix for penryn based procs (Geoff Gustafson) [439540]\n-sound: Fix sound driver update compilation error (Vivek Goyal) [319701 228440 228443 216447 248060 240912]\n-sound: Enable CONFIG_SND_INTEL_HDA=m driver (Vivek Goyal) [319701 228440 228443 216447 248060 240912]\n-Add HDMI audio support for AMD ATI chipsets (Bhavana Nagendra) [428964]\n-Dual core chips reported as quad core in cpuinfo (Geoff Gustafson) [326781]\n-alsa: Unmute DACs on AMD shiner (ad1884) (Brian Maly) [351911 314391]\n-[SOUND] azx sound driver update (Brian Maly) [319701 228440 228443 216447 248060 240912 234358]\n-Revert 's390: qeth: tcpdump does not work with osa Layer2 and VLAN enabled' (Vivek Goyal) [379031]\n[2.6.9-69]\n-Updated the spec file for beta build numbering (Vivek Goyal)\n[2.6.9-68.34]\n-Fix memory leak of struct percpu_data in free_percpu (Larry Woodman) [441321]\n-Do not limit shmem locked memory when rlimit_memlock is rlim_infinity (Larry Woodman) [439926]\n-sata: fix work around sb600 sata hw errata (Bhavana Nagendra) [300861]\n-diskdump: Fix flush_cpu_workqueue so that diskdump can work after momentary link down of lpfc (Takao Indoh) [216618]\n-Revert 'Fix usb stress test issue on amd sbx00 systems' (Vivek Goyal) [435787]\n[2.6.9-68.33]\n-enhanced partition statistics: fix update partition statitics (Jerome Marchand) [233579]\n-enhanced partition statistics: fix core statistics (Jerome Marchand) [233579]\n-qla2xxx: isp84xx variant ioctl support (Marcus Barrow) [441445]\n-qla2xxx: isp84xx variant support (Marcus Barrow) [441445]\n-pci: fix quirk for ht1000 bridge chips (Andy Gospodarek) [439109]\n-rpc: do not block on skb allocation (Jeff Layton) [439436]\n-nmi: kill disable_irq calls (Aristeu Rozanski) [172749]\n-nmi: disable lapic and io apic nmis on unknown_nmi_panic (Aristeu Rozanski) [172749]\n-nmi: use perfctr functions for probing (Aristeu Rozanski) [172749]\n-nmi: update check_nmi_watchdog (Aristeu Rozanski) [172749]\n-nmi: update reserve_lapic_nmi (Aristeu Rozanski) [172749]\n-nmi: use setup_apic_nmi_watchdog and stop_apic_nmi_watchdog in suspend resume (Aristeu Rozanski) [172749]\n-nmi: change nmi_active usage (Aristeu Rozanski) [172749]\n-nmi: update nmi_watchdog_tick (Aristeu Rozanski) [172749]\n-nmi: modify setup_acpi_nmi_watchdog to handle both io apic and lapic (Aristeu Rozanski) [172749]\n-nmi: introduce do_nmi_callback (Aristeu Rozanski) [172749]\n-nmi: introduce per cpu wd_enabled (Aristeu Rozanski) [172749]\n-nmi: add perfctr infrastructure (Aristeu Rozanski) [172749]\n-[SCSI] aic79xx: fix timer handling (David Milburn) [243936]\n[2.6.9-68.32]\n-xen: Fix gettimeofday is not monotonically increasing on xenU (Don Dutile) [438975]\n-xen: config file additions for xen pv-on-hvm drivers (Don Dutile) [437423]\n-xen: pv-on-hvm driver subsystem for non xen kernels (Don Dutile) [437423]\n-xen: modifications to drivers/xen/ files for pv on hvm use (Don Dutile) [437423]\n-xen: pv on hvm kconfig and makefile changes (Don Dutile) [437423]\n-xen: pv.h file modifications for compilation on xen and non xen kernels (Don Dutile) [437423]\n[2.6.9-68.31]\n-qla4xxx: race condition fixes with constant qla3xxx ifup/ifdown (Marcus Barrow) [430313]\n-qla4xxx: Fix targets not seen on first port (Marcus Barrow) [425721]\n-Fix compilation warnings coming from module.h (Vivek Goyal) [280431]\n-qla4xxx: Handle multiple ports per target (Marcus Barrow) [412671]\n-qla4xxx: Update driver version string to 5.01.02-d1 (Marcus Barrow) [317631]\n-qla4xxx: Throttle on queue full errors (version 5.01.02-d1) (Marcus Barrow) [317631]\n[2.6.9-68.30]\n-Fix __call_usermodehelper wait_for_helper race condition (Dave Anderson) [438800]\n-nfs: 32 bit nfs server returns eio for readdirplus request when backing file system has 32bit inodes (Peter Staubach) [438723]\n-Ensure IV is in linear part of the skb to avoid BUG due to OOB access (Thomas Graf) [427246]\n-Enhanced partition statistics: documentation (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: Fill old partition statistics with right data (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: procfs changes (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: sysfs changes (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: update partition statitics (Jerome Marchand) [233579 310521]\n-Enhanced partition statistics: core statistics (Jerome Marchand) [233579 310521]\n[2.6.9-68.29]\n-Revert 'Add HP DL580 G5 to bfsort whitelist' (Vivek Goyal) [429727]\n-fix unprivileged crash on x86_64 cs corruption (Jarod Wilson) [439786]\n-ixgbe: Build module ixgbe CONFIG_IXGBE=m (Andy Gospodarek) [305051]\n-x86_64: add /dev/msr[0-n] device files (Jason Baron) [249514]\n-i386: Fix extended cpu model field being ignored (Geoff Gustafson) [439539]\n-x86_64: Fix hpet bug where system hangs during reboot cycle (Geoff Gustafson) [434854]\n-i386: Allow apicid to be 8 bit (Geoff Gustafson) [437821]\n-ixgbe: initial support code (Andy Gospodarek) [305051]\n-nfs: fix setgid handling in notify_change (Jeff Layton) [439253]\n-e1000: upstream update and alternate mac address support (Andy Gospodarek) [298901]\n[2.6.9-68.28]\n-powernow k8: fix UP kernel to register freq driver (David Milburn) [429519]\n-spec: fix summary description of largesmp kernel package (Vivek Goyal) [186606]\n-qla2xxx: Avoid delay for loop ready when loop dead (Marcus Barrow) [426411]\n-qla2xxx: Build qla25xx as module CONFIG_SCSI_QLA25XX=m (Marcus Barrow) [253287]\n-qla2xxx: Clean up firmware dumping mechanism for ISP25xx adapter (Marcus Barrow) [253287]\n-qla2xxx: Support ISP25xx adapters for 8GB/s (Marcus Barrow) [253287]\n-qla2xxx: Firmware support for new 8 GB/s adapter QLE25xx (Marcus Barrow) [253287]\n-qla2xxx: update 4 GB/s firmware to match 8 GB/s firmware (Marcus Barrow) [253287]\n-ext3: lighten up resize transaction requirements (Eric Sandeen) [166038]\n-nfs: Fix nfs_access_cache_shrinker race with umount (Peter Staubach) [433249]\n-hangcheck timer: remove monotomic clock dependencies (Brian Maly) [429928]\n-Fix execve returning EFBIG when running 4 GB executable (Dave Anderson) [393501]\n-[NET] Fix the redirect packet of the router if the jiffies wraparound (Thomas Graf) [428934]\n-bnx2: update to upstream version 1.6.9 (Andy Gospodarek) [311531 303051 310851]\n-Fix race condition in proc file reading that leads to module refcnt imbalance (Neil Horman) [280431]\n[2.6.9-68.27]\n-infiniband: hotcpu_notifier backport (Doug Ledford) [309591]\n-infiniband: Remove the unused cxgb3/core directory and files (Doug Ledford) [309591]\n-infiniband: Dont set CONFIG_MLX4_CORE on ppc64 iseries (Vivek Goyal) [309591]\n-infiniband: Enable various infiniband related config options (Vivek Goyal) [309591]\n-infiniband: additional kernel backports needed for ppc64 (Doug Ledford) [309591]\n-infiniband: update kconfig files so that setting infiniband off kills it all (Doug Ledford) [309591]\n-infiniband: backport for interrupt handler changes (Doug Ledford) [309591]\n-infiniband: add the genalloc backport (Doug Ledford) [309591]\n-infiniband: minor backports (Doug Ledford) [309591]\n-infiniband: util updates (Doug Ledford) [309591]\n-infiniband: srp updates (Doug Ledford) [309591]\n-infiniband: sdp updates (Doug Ledford) [309591]\n-infiniband: core updates and makefile kconfig changes (Doug Ledford) [309591]\n-infiniband: additional backport (Doug Ledford) [309591]\n-infiniband: move vnic to qlgc_vnic (Doug Ledford) [309591]\n-infiniband: ipoib updates (Doug Ledford) [309591]\n-infiniband: various header config updates (Doug Ledford) [309591]\n-infiniband: ehca driver update (Doug Ledford) [309591]\n-infiniband: nes hardware driver update (Doug Ledford) [309591]\n-infiniband: mthca driver update (Doug Ledford) [309591]\n-infiniband: ipath driver update (Doug Ledford) [309591]\n-infiniband: cxgb3 driver update (Doug Ledford) [309591]\n-infiniband: amso1100 driver update (Doug Ledford) [309591]\n-infiniband: kill off some uninitialized_var usage that breaks our kernel (Doug Ledford) [309591]\n-additional kernel.h backports (Doug Ledford) [309591]\n-infiniband: move a couple backports (Doug Ledford) [309591]\n-infiniband: add the mlx4 core net and infiniband drivers (Doug Ledford) [309591]\n-infiniband: move the vnic driver to qlgc_vnic (Doug Ledford) [309591]\n-bnx2x: enable bnx2x module CONFIG_BNX2X=m (Vivek Goyal) [328001]\n-Fix ext3 direct IO problem that occurs under memory pressure (Josef Bacik) [381221]\n-wacom: add support to cintiq 20wsx tablets (Aristeu Rozanski) [436890]\n-io_apic: fix irq race in check_timer (Brian Maly) [432405]\n-cxgb3: update to driver to support ofed 1 3 (Andy Gospodarek) [253452]\n-igb: update to upstream version 1.0.8-k2 (Andy Gospodarek) [298881]\n-e1000e: update to latest upstream (Andy Gospodarek) [311961 432364]\n-usb: Fix sporadic hangs in usb (Pete Zaitcev) [239723]\n-bnx2x: initial support for bcm57710 (Andy Gospodarek) [328001]\n-Fix usb stress test issue on amd sbx00 systems (Bhavana Nagendra) [435787]\n-mptfusion: Fix IO failures when host reset of adapter is in progress (Chip Coldwell) [429368]\n-mptfusion: Fix oops in mptctl_gettargetinfo due to null ioc raid_data piocpg3 (Chip Coldwell) [429623]\n-mptfusion: update mptfusion to version 3-12-19-00 (Chip Coldwell) [308341]\n-lpfc: update lpfc driver to version 8.0.16.40 (Chip Coldwell) [326931]\n-aacraid: update aacraid driver to version 1.1.5-2455 (Chip Coldwell) [300021]\n-aacraid: update aacraid driver to version 1.1.5-2453 (Chip Coldwell) [300021]\n-megaraid: Update megaraid_sas driver to version 3.18 (Chip Coldwell) [312061]\n-x86_64: fix 32-bit thread debugging (Jerome Marchand) [311881]\n-arcmsr: update the arcmsr driver to version 1.20.00.15.rh (Tomas Henzl) [428801]\n-e1000: disable pci-e completion timeouts on pseries (Andy Gospodarek) [231676]\n-[SCSI] ibmvscsi: add slave_configure to allow device restart (Brad Peters) [364601]\n-Request to demand load dm cluster logging module (Jonathan Brassow) [438834]\n-nfsv4: create dedicated workqueue for handling nfs4_close_state_work (Jeff Layton) [402581]\n-nfs: allow nfsv4 files open for write to invalidate caches (Jeff Layton) [359651]\n-k8_edac: add option to report gart errors (Aristeu Rozanski) [232488]\n-nfs: Allow RHEL4 to do READDIR on directory containing a referral (Jeff Layton) [227610]\n[2.6.9-68.26]\n-[SPEC] fix add call to weak modules script in spec file (Vivek Goyal) [438688]\n-[s390] qdio: FCP/SCSI write IO stagnates on LPAR (Hans-Joachim Picht) [436992]\n-lro: Build lro as module CONFIG_INET_LRO=m (Ed Pollard) [300201]\n-ehea: driver update and modifications to sync with upstream (Ed Pollard) [300201]\n-ehea: Fixes to make LRO compile in RHEL 4.7 (Ed Pollard) [300201]\n-ehea: Pull LRO support from upstream (Ed Pollard) [300201]\n-getrusage: fill ru_inblock and ru_oublock fields if possible (Jerome Marchand) [247285]\n-io accounting: set up config_task_io_accounting (Jerome Marchand) [247285]\n-io accounting: report in procfs (Jerome Marchand) [247285]\n-io accounting: account for direct io (Jerome Marchand) [247285]\n-io accounting: read accounting cifs fix (Jerome Marchand) [247285]\n-io accounting: read accounting nfs fix (Jerome Marchand) [247285]\n-io accounting: read accounting (Jerome Marchand) [247285]\n-io accounting: write cancel accounting (Jerome Marchand) [247285]\n-io accounting: write accounting (Jerome Marchand) [247285]\n-io accounting: core statistics (Jerome Marchand) [247285]\n-[PPC64] Add kernel support for storing slb entries, for cpu failure recovery (Brad Peters) [300081]\n-[Power6] Extend alignment exception handler to handle new floating point load, store instructions (Brad Peters) [300071]\n[2.6.9-68.25]\n-alsa: fix 32 to 64 bit pcm api conversion layer (Jaroslav Kysela) [429944]\n-[SPEC] Add call to weak modules script in spec file (Jon Masters) [438115]\n-bonding: 802.3ad: Fix no carrier on no partner found (Vince Worthington) [437865]\n-stex: update stex driver (Jeff Garzik) [251560]\n-s2io: Update to driver version 2.0.25.1 (Andy Gospodarek) [298551]\n-diskdump: fix diskdump to print warning message about large block_order (Takao Indoh) [219639]\n-[IPV4]: Fix fragmentation with header options (Thomas Graf) [214903]\n-sctp: backport new sctp receive buffer management code to rhel4 (Neil Horman) [200813]\n-diskdump: Diskdump performance regression in mptfusion driver (Takao Indoh) [438027]\n-[NETFILTER]: fix module to prevent deadlock via module refcounting (Neil Horman) [212922]\n[2.6.9-68.24]\n-Fix greyhound event based profiling support patch (Bhavana Nagendra) [437982]\n-forcedeth: update to upstream version 0.61 (Andy Gospodarek) [253592]\n-sata: work around sb600 sata hw errata (Jeff Garzik) [300861]\n-tg3: update to upstream version 3.86 (Andy Gospodarek) [324251]\n-[TCP] Fix tcp assertion where packets_out exceeds fackets_out (Thomas Graf) [296561]\n-i2c_piix4: Enable i2c_piix4 module on x86_64 (Prarit Bhargava) [424541]\n-Fix 64 bit dma issue on sb700 systems (Bhavana Nagendra) [434742]\n-ipr: dual sas raid adds support for new pci-e ipr adapters (Brad Peters) [299101]\n-ipr: dual sas raid escalates error handler failures all the way to host reset (Brad Peters) [299101]\n-[XEN] Fix xen pv netfront oops during live migrate (Chris Lalancette) [435351]\n-ICH10: Add relevant PCI device IDs to support ICH10 (Geoff Gustafson) [304101]\n-Retry: check to see if agp is valid before reporting aperture size warnings (Brian Maly) [392771 431897]\n[2.6.9-68.23]\n-pci: mmconfig patches 68.22 build breakage fix (Tony Camuso) [437837]\n-Add config_dm_multipath_hp to generic config (David Wysochanski) [195685]\n-xen: expand vnif number per a guest domain over four (Don Dutile) [435448]\n-sata_svw: update sata_svw driver to support broadcom HT1100 chipset (John Feeney) [234159]\n-qla3xxx: new 4032 does not work with vlan (Marcus Barrow) [314301]\n-Add greyhound event based profiling support (Bhavana Nagendra) [433524]\n-Adding sb800 sata controller support (Bhavana Nagendra) [299901]\n-dm-multipath: path group initialization retry support for hp hardware handler (David Wysochanski) [195685]\n-dm-multipath: add path group initialization retry support to generic multipath layer (David Wysochanski) [195685]\n-dm-multipath: add hp handler for HP active/passive array (David Wysochanski) [195685]\n-[s390] qeth: ifenslave -c causes kernel panic with vlan and osa layer2 (Hans-Joachim Picht) [387041]\n-[s390] zfcp: scsi LUNs going offline during cablepull or MC update (Hans-Joachim Picht) [207558]\n-[s390] zfcp: Various driver bugfixes from upstream (Hans-Joachim Picht) [248934]\n-Build PowerNow-k8 as module (Brian Maly) [234145]\n[2.6.9-68.22.EL]\n-xen: save restore migration of 32 bit pv guests can fail under load (Don Dutile) [431081]\n-sysfs: Keep away from adding an existing dirent (Josef Bacik) [383101]\n-[IA64] Avoid unnecessary tlb flushes when allocating memory (Doug Chapman) [424771]\n-[PCI] pci config: remove mmconf blacklist (Tony Camuso) [250313]\n-[PCI] pci config: Use PortIO to access config offsets below 256 byte (Tony Camuso) [250313]\n-wacom: add support to intuos3 12x19 (Aristeu Rozanski) [278681 253088]\n-wacom: add support to intuos3 12x12 (Aristeu Rozanski) [278681 253088]\n-wacom: fix the maximum distance value (Aristeu Rozanski) [278681 253088]\n-wacom: change cintiq interrupt handler (Aristeu Rozanski) [278681 253088]\n-wacom: add support for intuos3 4x6 (Aristeu Rozanski) [278681 253088]\n-wacom: use enum definitions for wacom models (Aristeu Rozanski) [278681 253088]\n-neofb: avoid overwriting fb_info fields (Vitaly Mayatskikh) [430252]\n[2.6.9-68.21.EL]\n-skge: do not clear multicast state on link down (Andy Gospodarek) [377611]\n-net: drop duplicate frames on vlan accelerated bonding interfaces (Andy Gospodarek) [295161]\n-ipmi: initialize second bmc properly (Peter Martuccelli) [411041]\n-diskdump: do not disregard crc error of the diskdump module (Takao Indoh) [248766]\n-Make kernel build when CONFIG_HIGHMEM is not set (Jason Baron) [185202]\n-Add HP DL580 G5 to bfsort whitelist (Tony Camuso) [429727]\n-sched: Exiting process returns its first time_slice to wrong process (Vitaly Mayatskikh) [238034]\n-Fix e820 map hole size calculations (Larry Woodman) [206113]\n-[NET] bonding: add MAC based failover support to bonding driver (Brad Peters) [300031]\n-[SCSI] aic7xxx: fix ahc_done check SCB_ACTIVE for tagged transactions (David Milburn) [223333]\n[2.6.9-68.20.EL]\n-EDAC: Add CONFIG_EDAC_I5000 option to config files (Vivek Goyal) [235936]\n-Reset LEDS on dell usb keyboards (John Feeney) [225361]\n-Tolapai: Report correct cpu cache info (Geoff Gustafson) [426301]\n-Tolapai: sata and i2c support (Geoff Gustafson) [304131]\n-Fix memory leak in alloc_disk_node (Jerome Marchand) [435892]\n-jbd: Fix journal overflow issues (Josef Bacik) [183119]\n-knfsd: Ratelimit remotely triggered rpc error messages (Chris Snook) [428149]\n-pata_jmicron: match devices using vendor and device class only and update quirk for JMB361/3/5/6 (Aristeu Rozanski) [337671]\n-cciss: Add SG_IO ioctl and fix error reporting for SG_IOCTL (Tomas Henzl) [293651]\n-cciss: add init of drv->cylinders back to cciss_geometry_inquiry (Tomas Henzl) [432026]\n-cciss : Modify /proc/driver/cciss entries to avoid system crash (Tomas Henzl) [432480]\n-EDAC: add support to intel 5000 chipsets (Aristeu Rozanski) [235936]\n[2.6.9-68.19.EL]\n-edac: Add CONFIG_EDAC_I3000 option to config files (Vivek Goyal) [427799]\n-cdrom: kill 'open failed' message (John Feeney) [247446]\n-Insufficient range checks in fault handlers with mremap (Vitaly Mayatskikh) [428969] {CVE-2008-0007}\n-Fix CDROM mounting problem when changing isos in iseries legacy (Brad Peters) [334651]\n-[PPC64] xmon: Make xmon= off work on rhel 4 (Brad Peters) [426878]\n-cciss: Change version number to 3.6.20-RH1 (Tomas Henzl) [426109]\n-cciss: Support new SAS/SATA controllers (Tomas Henzl) [426111]\n-cciss: Copyright information updated as per HP Legal (Tomas Henzl) [426110]\n-cciss: Remove read_ahead and use block layer defaults instead (Tomas Henzl) [426114]\n-Fix unix stream socket recv race condition (Hideo AOKI) [433685]\n-[NET] Fix socket name string length returned by sys_getsockname (Doug Ledford) [434554]\n-EDAC: add support to intel 3000 3010 chipsets (Aristeu Rozanski) [427799]\n-Revert 's390:qdio/qeth: make sure sent skbs are freed in time' (Vivek Goyal) [381041]\n[2.6.9-68.18.EL]\n-nlm: fix a client side race on blocking locks (Jeff Layton) [432855]\n-nlm: cleanup for blocked locks (Jeff Layton) [432855]\n-[PPC] Support for cpu freq values great than 32 bit on power5/6 (Guy Streeter) [373031]\n-[SCSI] fix kernel panic caused by scsi medium error (Takahiro Yasui) [242046]\n-forcedeth: msi bugfix: Stop using stale irq number (Andy Gospodarek) [359231]\n-ide: __ide_end_request check for empty list before dequeuing request (David Milburn) [426279]\n-redhat will not ipl with more than 64 procs (Scott Moser) [248428]\n-[MOXA] buffer overflow in moxa driver (Vitaly Mayatskikh) [423141] {CVE-2005-0504}\n-s390: cio: collection of update patches (Hans-Joachim Picht) [380931]\n-s390:qdio/qeth: make sure sent skbs are freed in time (Hans-Joachim Picht) [381041]\n-s390: qeth: tcpdump does not work with osa Layer2 and VLAN enabled (Hans-Joachim Picht) [379031]\n-make concurrent proc net dev reads return sane stats for bonds (Chris Snook) [430576]\n[2.6.9-68.17.EL]\n-Missing sb600 sb700 40 pin ide cable support (Bhavana Nagendra) [431440]\n-SB700 contains two ide channels (Bhavana Nagendra) [335361]\n-smbus: AMD ATI SB600 700 800 use same smbus controller devid (Bhavana Nagendra) [252287]\n-libata: un-blacklist hitachi drives to enable NCQ (David Milburn) [430293]\n-libata: sata_nv may send commands with duplicate tags (David Milburn) [430293]\n-add mutex_destroy() definition (Jason Baron) [233234]\n-sunrpc: print unsigned integers in stats (Jeff Layton) [401861]\n-nfsd: don t try to cache reply to nfsv2 readdir (Jeff Layton) [430946]\n-sunrpc: make sure portmap calls are always soft RPC tasks (Jeff Layton) [248787]\n-[NET] link_watch: always schedule urgent events (Don Dutile) [429930]\n-nfs: don t expose internal readdir errors to userspace (Jeff Layton) [354371]\n-nfs4: Make sure nfs4 mounts are interruptable when intr is specified (Jeff Layton) [151085]\n[2.6.9-68.16.EL]\n-[XEN] Fix xen pv oops when mmaping prot_none during save restore (Chris Lalancette) [311431]\n-[NET] link_watch: handle jiffies wraparound (Vince Worthington) [433698]\n-IA64: user data corruption on misaligned access with certain fp instructions (Luming Yu) [430918]\n-xen: xenbus suspend_mutex remains locked after transaction failure (Don Dutile) [250381]\n-hotplug: acpiphp: avoid acpiphp cannot get bridge info pci hotplug failure (Konrad Rzeszutek) [287741]\n-[COREDUMP] add MMF_DUMP_ELF_HEADERS flag support (Hideo AOKI) [235742]\n-[COREDUMP]: Documentation for coredump filter (Hideo AOKI) [235742]\n-[COREDUMP] elf: add coredump filtering feature (Hideo AOKI) [235742]\n-[COREDUMP]: add an interface for coredump filter (Hideo AOKI) [235742]\n-kswapd: kswapd does not use lower_zone_protection value properly, resulting in oomkill (Larry Woodman) [358731]\n[2.6.9-68.15.EL]\n-nfs: Introduce nfs.enable_ino64 command line parameter to enable/disable 32bit inode numbers (Peter Staubach) [213518]\n-nfs: 32 bit nfs client does not handle 64 inodes correctly. Server side changes. (Peter Staubach) [213518]\n-nfs: 32 bit nfs client does not handle 64 inodes correctly. Client side change (Peter Staubach) [213518]\n-xen: rapid block device plug unplug leads to kernel crash and or soft lockup (Don Dutile) [426031]\n-[NET] make tcp_input_metrics get minimum rto via tcp_rto_min (Anton Arapov) [427204]\n-acpiphp: differentiate between slot empty and slot power off (Prarit Bhargava) [248489]\n-Fix IPI interrupt storm on IA64 (Prarit Bhargava) [359671]\n-smbfs: Fix calculation of size parameter in smb_receive (Jeff Layton) [355141]\n-smbfs: fix more warnings and errors with debug builds (Jeff Layton) [355141]\n-smbfs: Fix debug logging only compilation error (Jeff Layton) [355141]\n-smbfs: smbfs readdir vs signal fix (Jeff Layton) [355141]\n-smbfs: Fix names_cache memory leak (Jeff Layton) [355141]\n-smbfs: smb_file_open retval fix (Jeff Layton) [355141]\n-smbfs: Turn null dereference into BUG() (Jeff Layton) [355141]\n-smbfs: fix data corruption in smb_proc_setattr_unix (Jeff Layton) [355141]\n[2.6.9-68.14.EL]\n-epoll_wait with negative timeout value results in bogus printk (Peter Staubach) [278961]\n-proc: add /proc/\n/limits (Neil Horman) [207340]\n-ACPI PCIE hotplug fails due to non receipt of acpi events (Konrad Rzeszutek) [252262]\n-Powernow-k8: Get rid of unnecessary error messages with synchronized p state transitions (Konrad Rzeszutek) [276771]\n-ide : handle ide removeable drives properly (Josef Bacik) [249061]\n-[AIO] account for io wait properly (Jeff Moyer) [220902]\n-nfs:for nfs4_create_exclusive, reset any fields set in attrmask (Jeff Layton) [196180]\n-nfs: set attrmask correctly on nfs4_create_exclusive reply (Jeff Layton) [196180]\n-Implement udp_poll to reduce likelyhood of false positive return from select() (Neil Horman) [212321]\n[2.6.9-68.13.EL]\n-sunrpc: dont retry portmap query forever if it is not responding (Jeff Layton) [204309]\n-nfs: Discard pagecache data for dirs on denty_iput (Jeff Layton) [364361]\n-Fix /proc/cpuinfo giving wrong model number information (John Feeney) [313631]\n-nfs: fix ATTR_KILL_S*ID handling on NFS (Jeff Layton) [225557]\n-[NET] kernel needs to support TCP_RTO_MIN (Anton Arapov) [251240]\n[2.6.9-68.12.EL]\n-eHEA: add poll_controller support to eHEA to support netdump and netconsole (Neil Horman) [249041]\n-Display count of pagecache pages in show_mem output (Larry Woodman) [428014]\n-Prevent long delay before OOM killer launches (Larry Woodman) [252939]\n-x86_64: Prevent iounmap from sleeping with a spinlock held (Larry Woodman) [361931]\n-i8042: remove polling timer support (David Milburn) [340561]\n-hfs: Do not mount the fs if hfs can t find the root inode (Josef Bacik) [223514]\n[2.6.9-68.11.EL]\n-cifs: update changes file and version string (Jeff Layton) [427544]\n-cifs: fix endian conversion problem in posix mkdir (Jeff Layton) [427544]\n-cifs: fix potential data corruption when writing out cached dirty pages (Jeff Layton) [427544]\n-cifs: when mount helper missing fix slash wrong direction in share (Jeff Layton) [427544]\n-cifs: fix error message about packet signing (Jeff Layton) [427544]\n-cifs: fix cifsd to shut down when signing fails during mount (Jeff Layton) [427544]\n-cifs: reduce chance of list corruption in find_writable_file (Jeff Layton) [427544]\n-cifs: fix memory leak in statfs to very old servers (Jeff Layton) [427544]\n-cifs: fix buffer overflow if server sends corrupt response to small request (Jeff Layton) [372981] {CVE-2007-5904}\n-cifs: log better errors on failed mounts (Jeff Layton) [427544]\n-cifs: fix oops on second mount to same server when null auth is used (Jeff Layton) [427544]\n-cifs: fix spurious reconnect on 2nd peek from read of SMB length (Jeff Layton) [427544]\n-cifs: fix bad handling of EAGAIN error on kernel_recvmsg in cifs_demultiplex_thread (Jeff Layton) [427544]\n-cifs: have older kernels clean out pages list in cifs_readpages (Jeff Layton) [427544]\n-cifs: add inline cifs_filemap_write_and_wait for older kernels (Jeff Layton) [427544]\n-cifs: add mutex_lock and mutex_unlock definitions (Jeff Layton) [427544]\n-cifs: account for change of kmem_cache_t to struct kmem_cache (Jeff Layton) [427544]\n-cifs: remove duplicate kzalloc definition (Jeff Layton) [427544]\n-cifs: Import cifs stock version 1.50c (Jeff Layton) [427544]\n-audit: break execve records into smaller parts (Eric Paris) [427532] {CVE-2008-0004}\n-eHEA: Fix kernel panic on DLPAR remove of eHEA (real fix) (Scott Moser) [253765]\n-Revert 'check to see if agp is valid before reporting aperture size warnings' (Vivek Goyal) [392771]\n[2.6.9-68.10.EL]\n-s390: qeth: discard inbound packets with unknown header id (Hans-Joachim Picht) [350871]\n-s390: qeth: hipersockets layer-3 interface to drop non-IP packets (Hans-Joachim Picht) [380961]\n-check to see if agp is valid before reporting aperture size warnings (Brian Maly) [392771]\n-xen: local domu to domu ssh broken when firewall enabled (Don Dutile) [414131]\n-nfs: multithreaded file lock/unlock issues over NFS (Sachin Prabhu) [346331]\n-Dont truncate /proc/PID/environ at 4096 characters (Anton Arapov) [254037]\n[2.6.9-68.9.EL]\n-udf: fix possible leakage of blocks (Eric Sandeen) [202765]\n-udf: fix possible udf data corruption (Eric Sandeen) [202765]\n-udf: support files larger than 1g (Eric Sandeen) [202765]\n-udf: add assertions in udf_discard_prealloc (Eric Sandeen) [202765]\n-udf: use get_bh instead of directly accessing b_count (Eric Sandeen) [202765]\n-udf: introduce struct extent_position (Eric Sandeen) [202765]\n-udf: use sector_t and loff_t for file offsets (Eric Sandeen) [202765]\n-udf: fix possible udf deadlock and memory corruption (Eric Sandeen) [202765]\n-udf: deadlock on unmount fix (Eric Sandeen) [202765]\n-udf: fix reservation discarding (Eric Sandeen) [202765]\n-nfs: Fix nfs read performance regression. Introduce a new tunable. (Larry Woodman) [396081]\n-nfs: High vm pagecache reclaim latency on systems with large highmem to lowmem ratio fix (Larry Woodman) [371191]\n-Do not mmap a page at address zero without MAP_FIXED (Vitaly Mayatskikh) [360281]\n[2.6.9-68.8.EL]\n-Fix unserialized task->files updation (Vitaly Mayatskikh) [250799]\n-nfs: fix redundant and incorrect protocol for nfs4 in /proc/mounts (Jeff Layton) [171712]\n-psmouse: Add support for cortps protocol (Aristeu Rozanski) [221467]\n-Potential deadlock in DM mirror code fix (Jonathan Brassow) [247879]\n-SIGKILL not respected under special circumstances fix (Michal Schmidt) [253665]\n-ide: Introduce command line option to disable ide drivers (Gerd Hoffmann) [270661]\n-networking: kernel oopses when multicasting with connection oriented socket (Anton Arapov) [250842]\n[2.6.9-68.7]\n-Fix possible NULL pointer dereference inside of strncmp() if of_get_property() failed (Vitaly Mayatskikh) [396811]\n-fix sys_waitid() hang (Jerome Marchand) [382191] {CVE-2007-5500}\n-dm mirror: fix pvmove causes kernel panic (Milan Broz) [179201]\n-fix possible filesystem corruption (Vitaly Mayatskikh) [428795] {CVE-2008-0001}\n[2.6.9-68.6]\n-add support for Realtek RTL8111/8168 PCI-Express NIC (Ivan Vecera) [251383]\n-ISDN: fix isdn_net_setcfg() vulnerability (Aristeu Rozanski) [392131] {CVE-2007-6063}\n-fix panic caused by set_mempolicy with MPOL_BIND (Vitaly Mayatskikh) [293211] {CVE-2007-4130}\n-fix core dump file permissions (Don Howard) [396981] {CVE-2007-6206}\n-I4L: fix isdn_ioctl memory issue (Vitaly Mayatskikh) [425161] {CVE-2007-6151}\n-fix dput after mntput bugs (Josef Bacik) [403361]\n-fix xenbus has use-after-free (Don Dutile) [249727]\n-acpiphp: Examine slots below P2P bridges (Prarit Bhargava) [415981]\n[2.6.9-68.5]\n-add tick divider capability (Chris Lalancette) [248488]\n[2.6.9-68.4]\n-do not call set_page_dirty_lock() on compound pages (Luming Yu) [248954 252400]\n-disables irqs in core sysrq code (Prarit Bhargava) [253573]\n-ipv6: fix inet6_dev refcnt leak (Neil Horman) [252222]\n-i386: ensure compressed diskdump header contains correct panic cpu (Dave Anderson) [309081]\n-fix up kabi for: enhance criteria for dead peer detection in ip_conntrack (Neil Horman)\n[2.6.9-68.3]\n-enhance criteria for dead peer detection in ip_conntrack (Neil Horman) [205966]\n-i386/x86_64 segment register access update (Peter Zijlstra) [414251]\n-Remove duplicated FAKE_STACK_FRAME macro (Peter Zijlstra) [414261]\n-add new CIFS Kconfig options (Jeff Layton) [282591]\n-dm: fix bd_mount_sem counter corruption (Milan Broz) [377351]\n-dm: fix panic on shrinking device size (Milan Broz) [360311]\n-dm crypt: fix oops on device removal (Milan Broz) [377371]\n[2.6.9-68.2]\n-add missing dput() in do_lookup() error case (Eric Sandeen) [363471]\n-fix diskdump performance regression on mpt fustion driver (Takao Indoh) [284991]\n-add missing pskb_may_pull in icmp_filter (Jerome Marchand) [356501]\n-Fix incorrect logic in AMD NMI code (Prarit Bhargava) [387451]\n-Get rid of Tuxs O_ATOMICLOOKUP (Michal Schmidt) [358681]\n-lcs: After channel failure do not drive normal shutdown sequence (Hans-Joachim Picht) [354141]\n[2.6.9-68.1]\n-add back: eliminate excessive latency when writing to a large file\n-add back: setting better values for dirty limits\n-serial: assert DTR for serial console devices (Michal Schmidt) [244248]\n-bonding: only do ipv6 addrconf on master bond devices (Vince Worthington) [249631]\n-lsm: reduce noise during security_register (Ivan Vecera) [249404]\n-selinux: quiet complaints when using OpenAFS (Eric Paris) [239628]\n-Fix for NFS attribute timeout handling (Fabio Leite) [247905]\n-tty: set pending_signal() when returning -ERESTARTSYS (Aristeu Rozanski) [245343]\n-ieee80211 off-by-two integer underflow (Anton Arapov) [346381] {CVE-2007-4997}\n-fix bad schedule_timeout() call causing excessive delay (Jonathan Brassow) [381081]\n-do not return zero in mmap (Rik van Riel) [360281]\n[2.6.9-68]\n-revert: eliminate excessive latency when writing to a large file\n-revert: setting better values for dirty limits", "edition": 72, "modified": "2008-08-01T00:00:00", "published": "2008-08-01T00:00:00", "id": "ELSA-2008-0665", "href": "http://linux.oracle.com/errata/ELSA-2008-0665.html", "title": "Updated kernel packages for Oracle Enterprise Linux 4.7", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:31:52", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2826", "CVE-2008-3247", "CVE-2008-2372", "CVE-2008-2750", "CVE-2008-2812"], "description": "The openSUSE 11.0 kernel was updated to 2.6.25.11-0.1.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-07-22T17:25:31", "published": "2008-07-22T17:25:31", "id": "SUSE-SA:2008:037", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html", "title": "local privilege escalation in kernel", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:27:16", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3528", "CVE-2008-3272", "CVE-2008-2826", "CVE-2008-3525", "CVE-2008-4576", "CVE-2008-3276", "CVE-2007-6716", "CVE-2008-2812", "CVE-2008-1673"], "description": "The openSUSE 10.3 kernel was update to 2.6.22.19. This includes bugs and security fixes.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-10-21T15:41:15", "published": "2008-10-21T15:41:15", "id": "SUSE-SA:2008:052", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:46:06", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1046", "CVE-2008-1294", "CVE-2009-0675", "CVE-2009-0028", "CVE-2009-0676", "CVE-2009-0065"], "description": "The Linux kernel for SUSE Linux Enterprise 10 Service Pack 2 was updated to fixes various bugs and several security issues.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2009-04-03T14:20:16", "published": "2009-04-03T14:20:16", "id": "SUSE-SA:2009:017", "href": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00002.html", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:13:25", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-3525", "CVE-2007-6716", "CVE-2008-2812", "CVE-2008-1673"], "description": "The Linux kernel in the SUSE Linux Enterprise Server 9 Service Pack 4 was released to fix various bugs and also some security problems:\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-10-01T15:09:37", "published": "2008-10-01T15:09:37", "id": "SUSE-SA:2008:047", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:45:04", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1669", "CVE-2008-1615", "CVE-2008-2372", "CVE-2008-2931", "CVE-2008-2812", "CVE-2008-1673"], "description": "This is a respin of the previous Linux kernel update for SUSE Linux Enterprise 10 SP2 as announced in SUSE-SA:2008:035, which got retracted due to an IDE-CDROM regression, where any IDE CDROM access would hang or crash the system. Only this problem was fixed additionally.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-07-29T17:28:49", "published": "2008-07-29T17:28:49", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html", "id": "SUSE-SA:2008:038", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:27:56", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1669", "CVE-2008-1615", "CVE-2008-2372", "CVE-2008-2931", "CVE-2008-2812", "CVE-2008-1673"], "description": "The Linux kernel on SUSE Linux Enterprise 10 Service Pack 2 and fixes the following security problems:\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2008-07-21T10:42:10", "published": "2008-07-21T10:42:10", "id": "SUSE-SA:2008:035", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T21:42:07", "description": "BUGTRAQ ID: 29990\r\nCVE ID:CVE-2008-2826\r\nCNCVE ID\uff1aCNCVE-20082826\r\n\r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\nLinux kernel 'sctp_getsockopt_local_addrs_old()'\u51fd\u6570\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u4f7f\u5185\u6838\u5d29\u6e83\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\r\n\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\n\nrPath rPath Linux 2\r\nrPath rPath Linux 1\r\nrPath Appliance Platform Linux Service 2\r\nrPath Appliance Platform Linux Service 1\r\nLinux kernel 2.6.26 -rc6\r\nLinux kernel 2.6.25 .5\r\nLinux kernel 2.6.25 \r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23 \r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22 \r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20 \r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19 \r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18 \r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14 \r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12 \r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10 \r\nLinux kernel 2.6.9 \r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8 \r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7 \r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6 \r\nLinux kernel 2.6.5 \r\nLinux kernel 2.6.4 \r\nLinux kernel 2.6.3 \r\nLinux kernel 2.6.2 \r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1 \r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6 \r\nLinux kernel 2.6.8.1\r\nLinux kernel 2.6.26-rc5-git1\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\r\n\n \u5347\u7ea7\u5230\u6700\u65b0\u7684linux\u5185\u6838\uff1a\r\n<a href=http://www.kernel.org/ target=_blank>http://www.kernel.org/</a>", "published": "2008-07-01T00:00:00", "type": "seebug", "title": "Linux kernel 'sctp_getsockopt_local_addrs_old()'\u51fd\u6570\u672c\u5730\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2826"], "modified": "2008-07-01T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3510", "id": "SSV:3510", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T21:40:23", "description": "BUGTRAQ ID: 29235\r\nCVE(CAN) ID: CVE-2008-2136\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u7684net/ipv6/sit.c\u6587\u4ef6\u4e2d\u7684ipip6_rcv\u51fd\u6570\u4e2d\u5b58\u5728\u5185\u5b58\u6cc4\u9732\u6f0f\u6d1e\uff0c\u5982\u679c\u8fdc\u7a0b\u653b\u51fb\u8005\u5411\u7b80\u5355Internet\u4f20\u8f93\uff08SIT\uff09\u96a7\u9053\u63a5\u53e3\u53d1\u9001\u4e86\u4e0epskb_may_pull\u3001kfree_skb\u51fd\u6570\u548cskb\u5f15\u7528\u8ba1\u6570\u7ba1\u7406\u76f8\u5173\u7684\u6076\u610f\u7f51\u7edc\u901a\u8baf\u7684\u8bdd\uff0c\u5c31\u53ef\u80fd\u89e6\u53d1\u8fd9\u4e2a\u6f0f\u6d1e\uff0c\u5bfc\u81f4\u8017\u5c3d\u5185\u5b58\u3002\r\n\n\nLinux kernel < 2.6.25.3\n Debian\r\n------\r\nDebian\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08DSA-1588-2\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nDSA-1588-2\uff1aNew Linux 2.6.18 packages fix several vulnerabilities\r\n\u94fe\u63a5\uff1a<a href=http://www.debian.org/security/2008/dsa-1588 target=_blank>http://www.debian.org/security/2008/dsa-1588</a>\r\n\r\n\u8865\u4e01\u4e0b\u8f7d\uff1a\r\n\r\nSource archives:\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.dsc target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.dsc</a>\r\nSize/MD5 checksum: 5672 70da3d3fa9c813c51429d8b5d3b2e8ea\r\n<a href=http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.dsc target=_blank>http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.dsc</a>\r\nSize/MD5 checksum: 740 94f5cb267a06c1dec878da90b9f1dd83\r\n<a href=http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz target=_blank>http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz</a>\r\nSize/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.diff.gz target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.diff.gz</a>\r\nSize/MD5 checksum: 5351147 abe5e0484f16f812708afc484e161bc5\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz</a>\r\nSize/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\r\n<a href=http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.diff.gz target=_blank>http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.diff.gz</a>\r\nSize/MD5 checksum: 17351 2f7dba888df3958188615ea041eca743\r\n<a href=http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.tar.gz target=_blank>http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.tar.gz</a>\r\nSize/MD5 checksum: 55660 0538ff4f7178e76ea127ebef056d6b06\r\n<a href=http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.dsc target=_blank>http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.dsc</a>\r\nSize/MD5 checksum: 892 be5c0a2ad62acc5172513a9ce287c94c\r\n\r\nArchitecture independent packages:\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch5_all.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch5_all.deb</a>\r\nSize/MD5 checksum: 41462358 4a72841c24a18efce23193d77f367fe1\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch5_all.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch5_all.deb</a>\r\nSize/MD5 checksum: 3718002 4f526d410be4803e0caa37b49447f4d2\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch5_all.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch5_all.deb</a>\r\nSize/MD5 checksum: 1083076 615903cc33714c0cfa8dbcc48772a939\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch5_all.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch5_all.deb</a>\r\nSize/MD5 checksum: 3589354 d3f8c0a58d10ba994aca59ce80317fe8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch5_all.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch5_all.deb</a>\r\nSize/MD5 checksum: 54650 0ec7b128e82da0898223888f4fa07e53\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch5_all.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch5_all.deb</a>\r\nSize/MD5 checksum: 1592544 f1b06a865148d3ecc897f6f898b9f56a\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 54138 e7252716146d76ec712aa139287db245\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 23532610 9e2eba932bf5b4cbf909da8be17025f0\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 54106 b537043ae0a9552a4e6c2d94cf2c2800\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 268424 dbbb97dee4c3070f9cd0172bcdc49ef4\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 3027930 4c8fd619b7f8bb0f50e1bf0609e37a20\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 268084 6464e53b77d391c0417013c3b270c59f\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 23463090 48ec7662494774ee942a6252fd44e07f\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 3052820 51f401e43b054813abfbe1c422713370\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 269742 5c26e5083d2a86ea8ce9c80873fb0d3e\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 23845162 28d1de6a26fd663eeb2e3977923575c8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 23484076 c04d5474a002c0c6872b0c0779499e00\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb</a>\r\nSize/MD5 checksum: 267482 537e40c1b92217edb912b680b30f8cd8\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 54108 f51956cb9e9c4fcce9d2852cc304c8de\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 54134 07e4c8015b83da692bf2128f73966043\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 16950720 269a05ec2a25fd5e6ce7df4cb5a998c6\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 3396124 8f57552a6dc82815c1e0881f3d827c20\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 3227466 a28c80ec87bb6b6a7534c36e9a01a8b4\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 16906784 c8ba6e5505966c0cbd559e07dc1a95ee\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 54082 a3e4fb024f6242b1761565cdb1a27bab\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 1682832 5bb35f10ad153f7a0e64d0560f36b14b\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 3251476 a8994a53f8082ac755c5153f21645cb6\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 274250 b632fc76029cda382920bbf17dc70c76\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 3421192 b41a836c46e5fb252989a41785d1374f\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 274730 2483995f136e52562556017c2f0d4a96\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 274044 0d460826b9c6fac02574482db7914bd6\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 15355064 384131032d56063c896019e39e037a96\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 274730 da10935f2b25722252c68761e5065405\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 54094 292e8525fc3f29d5166365da794cfaef\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 1651262 d538be2c0dda417622040c33f34cd237\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 15366488 a3ad9046c3f774dd5097e6982ffe39fa\r\n<a href=http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_amd64.deb</a>\r\nSize/MD5 checksum: 5960836 ccceae60cac558233545c4c4cdbe409e\r\n\r\narm architecture (ARM)\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 54180 fbd9dae1ecda050a0b0734b04db35501\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 7924540 fcc6f7d63d622745a55c4bd9fa066560\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 239248 e9e3b3e13071c64cc7e6f2dd7e15cfdb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 54140 f38cd11a11adfb18ea0aa4de1b08ea39\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 4587314 01782ba5f8d91bee1d77302e9a6a9e61\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 3410452 448786f55f94315700e03bb93b454621\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 234064 c0e792fcc328bedc6583179e5156266e\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 7566024 d0423054e62d157a7fc10ad2e27e07a9\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 204142 b4a419a3a28fb963c5279d9e9b125705\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 5009344 5613d609c1c046f2b2ba72c6c890c486\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 198814 12c93d0b1d0f0d61ecaf5bfebcf8eb3a\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 233122 5bc42539dc40aaa1d81507b5f5a9bf83\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb</a>\r\nSize/MD5 checksum: 8870920 3a45be48b3293a9cbe193b0db5ab2d96\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 10996540 34a482a7404b6e48cc4202a3c031e39c\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 11398886 13d0d088bbd0e90ba1ade33ee2ded031\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 54136 be5be650e3800c63cedec99e2c7823fa\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 11804256 cb47826af75d4ad2e3006ce8ea6ea493\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 195920 3883151884f603b502ed741945ffe3dd\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 10548980 c6bf62e7a77bac7a9f13e88934a7edd8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 196764 53581705559a0ff4812e5622633ad987\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 197038 03b0dd0d144eddf69e9cbf4ae9b3c187\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 54114 b399acd2935e12d8580bac5075aca833\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 3021520 2d524cf038836529a4b5b98b527fb2c3\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb</a>\r\nSize/MD5 checksum: 197926 929a482ee6043c8913e0a02297975d75\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 281128 96055c189ea53e2d36ef2ba928112fda\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 14279136 50f18a8d2410f33d2fa6b3d913d333c8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 54098 bc1b6debe849f30326190420aaf3bcf8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 16336566 f0da95e8ce638a5246ad4d814f5fde09\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 16375886 6d7a589bdf348d2b883b12dc59d821dc\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 280108 03ecf352b9f9808cfad169da68bae00d\r\n<a href=http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_i386.deb</a>\r\nSize/MD5 checksum: 5504676 89f5fa03885ee4f737461182eabd709b\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 3168146 107659ec75db011516e29d898c3bc63b\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 272402 ed55cb5a5a38b9b98ea99afda45fa179\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 283546 645d7a6511ed1edd8d939bcf23a06db0\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 16404516 342d98b58ac8d8e4e66923a4ce993463\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 280800 53a9b58e467b80f51e9164099ec88e18\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 16836824 56389bee0ae2c10099f7e19760c7b89f\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 277982 6242067c054616623741facb41be96b7\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 54098 4845efdb09aea41ef938c090530335d6\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 3148840 26b1b0193f25d457db81ed3893c0d1de\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 16467076 aa6cc19fdd8d3c4688ae4ea2c35e667b\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 54084 30945bdfc901629b6f1df13c704e70a7\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 272478 0563e7854cbbe484cbe7ba042c89b19c\r\n<a href=http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5_i386.deb</a>\r\nSize/MD5 checksum: 25587444 e2c0ff4dc80f241a41f27e415497462c\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 1326822 d6eccf90389e1f5fd41653ef2da4060a\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 3170850 4d2061539468c3788a8032e5e27aadfb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 14289748 1e8a50868e7dee3bcf4ed7e8469c20ff\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 272122 ac3985bf454e339c3a02ee17a4a4104c\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 1299688 f3a4ef71801a826f1da151fd12e4be57\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 281326 2b142556dc07fa41dada942fcf36cc8e\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 16190240 8a63f6a2ac3b6334cbacb99129c76a9d\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 3054490 f549787f1b48cf4a7bf5cad359776e72\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 16506826 4e0ef2228324c2fc14365a5aaeda0e30\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch5_i386.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch5_i386.deb</a>\r\nSize/MD5 checksum: 54160 8a5f9200a579604b5b44609549d0fec3\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch5_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch5_ia64.deb</a>\r\nSize/MD5 checksum: 54132 9c4710a3f9fe303d8fb91b1bc2f26aba\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb</a>\r\nSize/MD5 checksum: 255602 502b77e416d4146085c986e3f044ef65\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb</a>\r\nSize/MD5 checksum: 255496 a1e152ea44a76c0376c0c5308e7eb73f\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb</a>\r\nSize/MD5 checksum: 28013686 e3a9f2c0f65dbb32ddaef4279f46a02d\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_ia64.deb</a>\r\nSize/MD5 checksum: 54116 e91729e3a1d6c9e036b34a07d5322ea1\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb</a>\r\nSize/MD5 checksum: 28181240 a977c1726724712c52209f9448f4a430\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_ia64.deb</a>\r\nSize/MD5 checksum: 3082082 d279733263714c558f68651a532950d0\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 54134 22a4791eab8c910e616d157866d53025\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 167044 70a9e850f5b589307c11d793d1ae6402\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 3413738 bacb0e69b1b775b8c107817388179890\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 187064 c5e7a3e6da64281a67676b1f574da751\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 54186 24256be3de335798d64096467935c740\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 8308966 ddf5ee18359c5814b7becca4bb6db245\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 15677882 5ae00f56b380829aa0a497776b0135f8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 154386 e901acfcbcc3b5549c30bbe7ce710cc6\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 6125594 e396b15e9dcab593e4320236d7ac1572\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 15652934 8abfb40f359d54ac15854b782f8198bc\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 9075546 c7bda747c97bd58ecf70afa6fb71a02a\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 186748 16d2e8cce7839f20fbf5baa65f07094e\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb</a>\r\nSize/MD5 checksum: 162974 f9993e3f13a281a749a77e83a2c706cf\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 15053122 38c50780f0382abf544339b0423c86b2\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 54160 813b1edc195ae4a98f7c458e432e89ba\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 3350138 d4ffd93599f61d99b2f50ed87d31144d\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 9863398 71469c0b29659c83f2f4996de5ae855b\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 155774 bb807178ae81678f4cea5b64bcd8e0f9\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 15030230 802e7f15ae2a00d4a3fd99f8d37e48f8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 182630 a9e57a79ab1530af02e9b61b81606fa9\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 178290 bb9edbbf330c0b465ad37e0e5499b2b2\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 54106 3abe49b4366693a69c50a899f3f7eeea\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 150042 64a877e7e1680dd1a69317d87888621a\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 5941952 71641a79aa2f9869e4608b0df2cc78cc\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 182772 e01dad553ee807ba9bd8b4f12275e79d\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 155828 d95e8387335c55a5ded2340e8fec68f9\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 6027796 c1cc067bcd418ae935e8f4a39e96dc78\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb</a>\r\nSize/MD5 checksum: 5926602 baf4afb27b59a0b9ef8b548a3f1a80f3\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 3392458 d0e49a4a623d77420317f8e6cec301a6\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 229438 bf578fa343cc77237329c34882b4d038\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 18294080 cb7f16ec55e918534e9042e7e0c5ef7c\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 3414806 3a901290719800285b63c53e7b9d4109\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 15157308 f605138dd137eb4374139ec0cf79351a\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 251522 4f8ef89f851229849bc5a3bc5b19c82b\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 252312 e3c7462faede8715dd91b566a58f9b68\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 16969642 0607cea9945592510f5d3fb9f928c68e\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 252654 a1a124efec56637b9dfa87c8cd9550cc\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 245866 6745e27544fab3eb5aba4a97ebf0fd9a\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 16402670 d3b6fdc36ccd744cc0c8956be6176e0b\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 17016920 e24f260fac43e592708bb9ba1e707c16\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 253460 8cf63cbc53c6272a748d33b1bd98dfb2\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 18349664 4222693f7730b0e6833541ba79afd50e\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 253334 e3314d10a9e3160c79a497967f44fbbd\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 54160 2b3e2ac3e9367055f4e7669e56583beb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 54112 3199cd9481a91d0def2d149bc0b59c4e\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 16626546 e09c228686cb96ce5e56a142a6366e13\r\n<a href=http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_powerpc.deb</a>\r\nSize/MD5 checksum: 3366930 17db3e15c6d8cf2d8aca17939ca4cc22\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 143830 1b86a1ffa2bf8b743ef2608433a01d19\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 5402208 c05f1464684c5755dfd5c5e91b3cf2d8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 2943090 da0829d97b73d6a03242822237d00694\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 54106 fc387ee63680dc3a38ffd915fecc2fd8\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 1438980 c6e90fb394da315b633c09be3f4aa53b\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 2966156 d6a5e7edfa9424a613a4da2f54b487c4\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 5619846 bebebe67bf3bceefd8730dcb19b8fc0a\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 144730 7e2da310413f3224915663349e37f752\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 143378 bb59c0b53f875d201529ae52d310ba56\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 5661458 90e536af2b788da136062798aa933d30\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch5_s390.deb target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch5_s390.deb</a>\r\nSize/MD5 checksum: 5\r\n\r\n\u8865\u4e01\u5b89\u88c5\u65b9\u6cd5\uff1a\r\n\r\n1. \u624b\u5de5\u5b89\u88c5\u8865\u4e01\u5305\uff1a\r\n\r\n \u9996\u5148\uff0c\u4f7f\u7528\u4e0b\u9762\u7684\u547d\u4ee4\u6765\u4e0b\u8f7d\u8865\u4e01\u8f6f\u4ef6\uff1a\r\n # wget url (url\u662f\u8865\u4e01\u4e0b\u8f7d\u94fe\u63a5\u5730\u5740)\r\n\r\n \u7136\u540e\uff0c\u4f7f\u7528\u4e0b\u9762\u7684\u547d\u4ee4\u6765\u5b89\u88c5\u8865\u4e01\uff1a \r\n # dpkg -i file.deb (file\u662f\u76f8\u5e94\u7684\u8865\u4e01\u540d)\r\n\r\n2. \u4f7f\u7528apt-get\u81ea\u52a8\u5b89\u88c5\u8865\u4e01\u5305\uff1a\r\n\r\n \u9996\u5148\uff0c\u4f7f\u7528\u4e0b\u9762\u7684\u547d\u4ee4\u66f4\u65b0\u5185\u90e8\u6570\u636e\u5e93\uff1a\r\n # apt-get update\r\n \r\n \u7136\u540e\uff0c\u4f7f\u7528\u4e0b\u9762\u7684\u547d\u4ee4\u5b89\u88c5\u66f4\u65b0\u8f6f\u4ef6\u5305\uff1a\r\n # apt-get upgrade\r\n\r\nLinux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=http://www.kernel.org/pub/linux/kernel/v2.4/linux-2.4.36.5.tar.bz2 target=_blank>http://www.kernel.org/pub/linux/kernel/v2.4/linux-2.4.36.5.tar.bz2</a>", "published": "2008-06-04T00:00:00", "type": "seebug", "title": "Linux Kernel ipip6_rcv()\u51fd\u6570\u8fdc\u7a0b\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2136"], "modified": "2008-06-04T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3377", "id": "SSV:3377", "sourceData": "", "sourceHref": "", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T21:36:17", "description": "BUGTRAQ ID: 30076\r\nCVE ID\uff1aCVE-2008-2812\r\nCNCVE ID\uff1aCNCVE-20082812\r\n \r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\nLinux TTY\u64cd\u4f5c\u5728\u4e3b\u7ebf\u4e0a\u7684\u91cd\u5199\u5b58\u5728NULL\u6307\u9488\u5f15\u7528\u95ee\u9898\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u4f7f\u7cfb\u7edf\u5d29\u6e83\u3002\r\n\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\r\n\n\nLinux kernel 2.6.25 .5\r\nLinux kernel 2.6.25 \r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23 \r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22 \r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20 \r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19 \r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18 \r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14 \r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12 \r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10 \r\nLinux kernel 2.6.9 \r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8 \r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7 \r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6 \r\nLinux kernel 2.6.5 \r\nLinux kernel 2.6.4 \r\nLinux kernel 2.6.3 \r\nLinux kernel 2.6.2 \r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1 \r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6 \r\nLinux kernel 2.6.8.1\r\n+ S.u.S.E. Linux Personal 9.2 x86_64\r\n+ S.u.S.E. Linux Personal 9.2 \r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\r\n\n \u5347\u7ea7\u5230\u6700\u65b0\u5185\u6838\uff1a\r\nLinux kernel 2.6.20.2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21-RC3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21-RC3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.25.3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.23.14\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.11.4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20-rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22-rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20-2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21-RC4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20.3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.8.1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test6\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test9-CVS\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test7\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test9\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.1 -rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.1 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.10 rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.11 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.11 -rc3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.11 .11\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 -rc4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .12\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .22\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.13 -rc4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.13 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.14 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 -rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 -rc3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 .9\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 .1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 .23\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 -rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .5\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .7\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .13\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .10\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 -rc5\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.18 .3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.19 -rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.2 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20 .15\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21 .7\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21 4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .17\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .6\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .15\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .11\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.23 .7\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.23 -rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.23 -rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.24 -rc3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.24 -rc5\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.24 .1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.25 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.25 .5\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.4 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.6 rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.7 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.8 rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.8 rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>", "published": "2008-07-07T00:00:00", "title": "Linux Kernel TTY\u64cd\u4f5cNULL\u6307\u9488\u5f15\u7528\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2812"], "modified": "2008-07-07T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3554", "id": "SSV:3554", "sourceData": "", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T21:35:24", "description": "BUGTRAQ ID: 30076\r\nCVE(CAN) ID: CVE-2008-2812\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u6ca1\u6709\u6b63\u786e\u5730\u6267\u884ctty\u64cd\u4f5c\uff0c\u672c\u5730\u7528\u6237\u53ef\u4ee5\u5728drivers/net/\u7684\u4ee5\u4e0b\u6587\u4ef6\u4e2d\u89e6\u53d1\u7a7a\u6307\u9488\u5f15\u7528\uff0c\u5bfc\u81f4\u7cfb\u7edf\u5d29\u6e83\uff1a \r\n\r\n(1) hamradio/6pack.c\r\n(2) hamradio/mkiss.c\r\n(3) irda/irtty-sir.c\r\n(4) ppp_async.c\r\n(5) ppp_synctty.c\r\n(6) slip.c\r\n(7) wan/x25_asy.c\r\n(8) wireless/strip.c\n\nLinux kernel < 2.6.25.10\n Linux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>", "published": "2008-07-14T00:00:00", "title": "Linux Kernel TTY\u64cd\u4f5c\u7a7a\u6307\u9488\u5f15\u7528\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-2812"], "modified": "2008-07-14T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3609", "id": "SSV:3609", "sourceData": "", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": ""}], "securityvulns": [{"lastseen": "2018-08-31T11:09:30", "bulletinFamily": "software", "cvelist": ["CVE-2008-3272", "CVE-2007-6282", "CVE-2008-2826", "CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812"], "description": "IPSec ESP pacjet parsing DoS, multiple local DoS conditions, kernel memory data leak, privilege escalation.", "edition": 1, "modified": "2008-08-21T00:00:00", "published": "2008-08-21T00:00:00", "id": "SECURITYVULNS:VULN:9235", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9235", "title": "Linux kernel multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:27", "bulletinFamily": "software", "cvelist": ["CVE-2008-3272", "CVE-2007-6282", "CVE-2008-2826", "CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-1630-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nAug 21, 2008 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : denial of service/information leak\r\nProblem type : several\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2007-6282 CVE-2008-0598 CVE-2008-2729 CVE-2008-2812\r\n CVE-2008-2826 CVE-2008-2931 CVE-2008-3272 CVE-2008-3275\r\n\r\nSeveral vulnerabilities have been discovered in the Linux kernel that may\r\nlead to a denial of service or arbitrary code execution. The Common\r\nVulnerabilities and Exposures project identifies the following\r\nproblems:\r\n\r\nCVE-2007-6282\r\n\r\n Dirk Nehring discovered a vulnerability in the IPsec code that allows\r\n remote users to cause a denial of service by sending a specially crafted\r\n ESP packet.\r\n\r\nCVE-2008-0598\r\n\r\n Tavis Ormandy discovered a vulnerability that allows local users to access\r\n uninitialized kernel memory, possibly leaking sensitive data. This issue\r\n is specific to the amd64-flavour kernel images.\r\n\r\nCVE-2008-2729\r\n\r\n Andi Kleen discovered an issue where uninitialized kernel memory\r\n was being leaked to userspace during an exception. This issue may allow\r\n local users to gain access to sensitive data. Only the amd64-flavour\r\n Debian kernel images are affected.\r\n\r\nCVE-2008-2812\r\n\r\n Alan Cox discovered an issue in multiple tty drivers that allows\r\n local users to trigger a denial of service (NULL pointer dereference)\r\n and possibly obtain elevated privileges.\r\n\r\nCVE-2008-2826\r\n\r\n Gabriel Campana discovered an integer overflow in the sctp code that\r\n can be exploited by local users to cause a denial of service.\r\n\r\nCVE-2008-2931\r\n\r\n Miklos Szeredi reported a missing privilege check in the do_change_type()\r\n function. This allows local, unprivileged users to change the properties\r\n of mount points.\r\n\r\nCVE-2008-3272\r\n\r\n Tobias Klein reported a locally exploitable data leak in the\r\n snd_seq_oss_synth_make_info() function. This may allow local users\r\n to gain access to sensitive information.\r\n\r\nCVE-2008-3275\r\n\r\n Zoltan Sogor discovered a coding error in the VFS that allows local users\r\n to exploit a kernel memory leak resulting in a denial of service.\r\n\r\nFor the stable distribution (etch), this problem has been fixed in\r\nversion 2.6.18.dfsg.1-22etch2.\r\n\r\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\r\nuser-mode-linux packages.\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatability with or to take advantage of this update:\r\n\r\n Debian 4.0 (etch)\r\n fai-kernels 1.17+etch.22etch2\r\n user-mode-linux 2.6.18-1um-2etch.22etch2\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\nDebian GNU/Linux 4.0 alias etch\r\n- -------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and\r\nsparc.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.diff.gz\r\n Size/MD5 checksum: 5378366 80a876fbcded8984ff47308cf2ece776\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\r\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.dsc\r\n Size/MD5 checksum: 740 080fa46e372743186c973658347ceee1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\r\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.dsc\r\n Size/MD5 checksum: 892 30580beb633eb4806c40d659f552cd88\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.dsc\r\n Size/MD5 checksum: 5672 780d93329a4cedaad9d0539c1cc400ac\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.diff.gz\r\n Size/MD5 checksum: 18180 2b9bbd3f4bcc3852320fc60d6947607e\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.tar.gz\r\n Size/MD5 checksum: 56550 01fd54902e7ac7c3035c5176f1deae3c\r\n\r\nArchitecture independent packages:\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 3718952 804c3adc75403db743f603fd1dc44fa2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 41460250 9fda57df0d76f6300b162c0765a87e32\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 1632622 6d644a3a0502065b7a9faa9a7efdb8f4\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 1087372 8ff719e7a81edaa38b5eca31a7aaee02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 3590476 b803de0252e4f027567c5c13db4afe0a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 55722 a4dd6ba664f85780bbe1ebf7f3a77b25\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23464338 df80e9f9afac5942ec8cd73c8fa2acd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 55150 c752933d6628e0ebe75dbe47f29ad4e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 268952 128bea32232629d3255799ddc83da7b3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 269648 7617546d15e940343cbe381dfecae010\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 3053804 f72f8a710f0a4da22bc8fd431d9195ee\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 268368 5c248dbb5e31cc30d4148196b1f5cef0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 55180 2a8a3e402015cf1908906180eb6f8a5f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23846050 ba3b97267e75c3d8027627b2a3ece5fb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23485982 9ea2f705c0a99080425de75c48c66904\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 269242 1edcca9164f4eecd392897903269c1e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 3028978 253a048a7d3ccdf823b8e28b47e5f849\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_amd64.deb\r\n Size/MD5 checksum: 5961854 67e6d9bddf32e6ff37f15a37f9aa2b04\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55174 94bc1ab70d46a153205059b1ba2fbd9e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 279498 bf0107981fe6a603a9b72be5e94190bb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 16909690 0d7e343ec621b05fb565ed0c4b355c9e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3252530 97dc43477d90cae8fd6b4033781ce589\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 277930 b719a1156f14a870b6f0fed9fcac0e26\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55146 865ab31e1451d19f5374492c7b5cec02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55152 811c0ed6f63166536426b3a30a0ae6a0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 1652318 1e02b1e5c1315c6775efd5a3ebb8eba0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3228660 b3491a01820796609c57ff0ca45cd991\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 1684052 214c87ec095a47ddb16cb5a0386385d0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 15370528 6429150ddfdc20c94f5dd9223ce1eefa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 16955552 08dbcfaeb394f720be04b43584cc2dca\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 277636 0c1dd9ed04830cef72a2799682cdb373\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3422414 a66a5347a66c224513912f23df6e7811\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3397342 d69524c251013eca5cb9c2fc6ac49f08\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 278800 f808d9f0b51671184647976e61673ef7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55126 dcc26a10c820fe676abf6d0a8f733190\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 15356684 ca635c5a74fde0c121ac8ad0dca7f3bc\r\n\r\narm architecture (ARM)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 240724 05944f6adaed3622fdbf4fa94d9e37c1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 55194 cfb4019acf8ce2b9eca9a06cde8fa6d8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 200112 db009d7e4d83679ea6bf62352e8cbe27\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 7925520 1488da3529714a8490790357b2a28d34\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 235346 8bac39d6ded885fc5247046c1a0f5c1c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 205074 8fa04e311cd6e56aa2749d4146056c77\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 55234 060e1f4e0b26b2fb42fe0be4d8078952\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 3411494 cfe4f5b7273940720e2bc1e945631f1c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 4588214 42d8698407235b46507cf2d7b992c09c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 234198 35c06e74a9f26ab8217ea98df7c01a9b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 7567632 3e4a444afcf3df3e510e2c5000a4b684\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 5010844 a3a1c62fbe80192e80bcaac498036e92\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 8872222 e1a64be9bdc5246dd1d9ef666eb0a311\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 11805014 e45047cea390fd98d4a55557414b578e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 55184 397ca7761578ce779b6ef9bacc372ffb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 10551992 1d693cdd06bb4dee92a25cd886817522\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 55158 15e7aa685aea41e29ac6c76825e99ad6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 199066 5aaf2ce6a96449673f8a8f48f36cf841\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 11400554 53c5eca027dc1015bf6423cbe65536cd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 10998698 050980b34cbc925f0842c161828aa1f7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 197944 1d45f1fe804821cc7b8aa80b0dec4f36\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 3022526 52b6702172ceb2064dde03ea3cacca7a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 198152 556e2b16e2988976dac562f1baad15a9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 197130 298d3e069a1f6996685c4a5a8bc1bada\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16377614 74d1938921db193d10a0ff798fe7c005\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272450 5468ca009d328fc890a6ab771ab20968\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16471330 35ea40d0f873d6c8ff819a62239623ac\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 280452 b055d4305ed580aa9603c3ff5b8c48ef\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16838150 45beacafd1a4902c055c41bd7711586a\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2_i386.deb\r\n Size/MD5 checksum: 25589346 bf03c496e08b7d40f52f602011c07560\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16406940 0225f98fb843e23225875943b5179aa1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55132 28a33a24ebdcdcad85d335499397c88c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55196 16b6e16eefaeb5891ab4ba7f832d0ed3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3169128 eb405a8b5c8b6d815c95f73262a99af1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55144 3d96d807e874865af58831720adb4486\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3055432 a496fea546da3a21748b444ffd6836ec\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272846 c58bde7235a1f1ac5c8145dc1ae9346b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55140 eee1bdfac4bbecc919d0151b2e23d24c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 14292444 19fe5544166f396830fef3a1b4e4626f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 280608 496144bbb1d620644189d012b9d6ea70\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 282902 f4145bd74ab9467b1af36da46b7666ef\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 279034 26430131dc00922da7c9b034c191eaf1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272230 871474e9b227166f527391aa064ec971\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_i386.deb\r\n Size/MD5 checksum: 5505296 9da61c3c82edf996a6324ebd4517251c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3149672 c6cbb32f47b75db7d63a6fcf84e0df38\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3171866 333ceba6af38b86e41a1db10fc764319\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 281062 c0c403aedd560ad15fb7d90c54ce3145\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16192240 a4a3d514e989d64042c46d3ad8d0b0ae\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 278950 9de592d811e51eeb07ebe193f8734d15\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16337664 a367c6561e7cf8ff701a731d8072dca2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 1328006 c5089d6b0fa44ce46fdbbd17140cb9c6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16509906 c8894d32a5f39e7512d2db9de74ddf3c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 1300920 9c42c8356ab3a07b89f2d95f47de5303\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 14281014 32f281f475d4ee1f2d67dd029231ea46\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 256640 e96b0df79e67e6049d8feeb73e63f287\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 55174 c93847739b57f47faacaf642de4ab6c1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 256732 af4ee0bbafe50ce27d875243fe626ab9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 28181368 dff959a14317741919a7a46d73c273a8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 55146 9f30373190856528f752d21d66a88053\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 28014200 d290bc90985342dfe3b348d3e1d07922\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 3083012 cbb353d4e8cb3a2bfc4dbf43f4427344\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 8311782 6b24a125c1b553bd4f69d830f2d19eaa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 6124616 ab5d97cb43f8e7d0f7cfebe2db2416df\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 55190 1cd7be3bb06e63ecf67e6c5c175aa201\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 187898 a74c79e4b6de9312c1a531b7d1c04e06\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 164036 58db324ddfe7d1b3f7086c67091c1ae3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 15654946 4c99171f6b6e8e0b06d88f65244f5a5c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 155578 71edf3d7d29b414ee8fe9c26d98afe2f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 15680482 79ca37454bab6d11c4af5621e3963e87\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 168240 0eafb18463f917510d3110c74786742d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 3415314 94c72a62a2c3c52535c3ef4936400ad9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 9077040 581d6744c0c10ec63b06b5d058e44a87\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 55236 7c94ce0a6b000ba9abcc0bf8272e033c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 188208 2356f7b9cf66b0694b1b7bb07e9e1df0\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 3351164 f15965863479e2b0eab136c912b25ebd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 183690 e20c71f57188bc8458abb4dc212402f3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 156886 65c9aec3009d7ace0550bee15d0bd34c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 151270 92419bb4255d3989eef1b3d2e616e5a5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 9864388 2aa86c68a6c8ac36e8dc22aafcac34fb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 183862 262a4f1a05c00b6c2752733101d2bb4b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 6030536 1199eb8f7b6a9b4ff1a32ebccfcd7074\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 5944692 205d02fd233142d8058874e6ead00e94\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 156854 1f02416baf0082238418bba97eb8aa4f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 15028044 00f2ad06dfa6c908036349c35a5a8e39\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 55154 6b6f4c17287d5e053d716a742cb738a0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 179462 e5497abf20a5461319d8f1d7c37d19b3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 15057484 ea8ab2c273fbc3d282d0120cdbbe5c34\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 55208 f3bfa65fa08c4ad552aef1536bdd1fcc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 5928064 cad7b6b3653d205a39e876a508d4ddaf\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_powerpc.deb\r\n Size/MD5 checksum: 3367890 ad1ad713d488f9e0e0669e1293f1ccd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 254026 ae831a11ed61a4b52bb7a3043eb2f265\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16628466 1b10ecc3a4095b9f0e9cd6fa0c544308\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 3415704 ea230f1f09a4e8341e7bb24ebd037dd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 15160062 e41656dd2782d44ec9487138dc694722\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 17017000 04153c3611b94ae5044868407f1eaa96\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 255324 60960ac1262f6d8eabcd96d9789b27bc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 253678 e1a1fcc0865698fca0aa46cc02c0e38d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 18295838 01cb70246fc9027dc9097964d0a7c06d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 253858 a30720b97122274208888b564c0548b5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 18354880 c82075e19802e915551cd25b04f72c76\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 3393390 246ebdc0ce319ab1b8c0022b1b69fd1d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 246546 855a95e124dcd81d26d06fced8ff9cda\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16406142 59c2543679159905e0d16445d7f5b66d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 231148 96bb009cbc3c1c9fc00a4f84a4aa9cd5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 55156 94c052eb19ce469aabc0a9a71860f861\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16971942 c230eb342210e9f9376783e013216695\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 252866 4b2bf2f6783bb456b5c003df3e1ea1f5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 55206 209887bf65d555135cde2cb7b1ef0b7b\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 55168 ba80b3fe0aa1ffdc92825578c4a0a8e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5620988 555c4bd0a4b245f267dc324c9b39d695\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 144604 bd539fa6955b9ea80a38046b1097ea6e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 145888 80f3dcbc19b2076e6a37ac8f48f1c687\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5403802 9bfc6e49de7faecc3ae013efd8a5ff85\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 2944158 7a37040db97a3a43817eea570ca29554\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5663004 f3b7384004cd0c0c6a0478865300b9f8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 55146 fd4df49a7d2116c1b1eb0f38211c196c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 145096 7e0bfcc155246d4b7cb8ee00d9a370ba\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 1440072 437e3a46bda63f1ba5bb2d0b970a669f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 2967228 a32e5147c0f741a5300c6122aade4377\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10394174 30c3164de023288678eda955e7088e89\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 166138 da9c686e82839dbecfc4d2f8d5d6ff8f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 6412488 738092d091284463d88dcce9bc0d683e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10694332 aa5d657822ad30eb7edf2eca35644e09\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 196630 b349a6dd56888b772577075f21229498\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 195534 c7b2e3ee30ba33f0a207fa11a5f08916\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 197330 5e9f1ad14b5b10c6012b09dcfa93acb5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10647804 5bab66c5cdaa22683425b4e101fea4e0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 55156 da09f09d5c47ce3cd8666b7ba98b9a08\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 3191596 f6aee8879affc350feb8706cdffb95da\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 3169298 a6ad7bd3b6ba9d573f47c21f45b9f660\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 55184 322a273cbddb53db9fdb143229104384\r\n\r\n These changes will probably be included in the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFIrZh4huANDBmkLRkRAskxAJ9J3UrvqPqj2rhy3PIXIfPUcWu8ggCggi+J\r\n3axwz1azO0SgmGCRip6WKHQ=\r\n=x8fB\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2008-08-21T00:00:00", "published": "2008-08-21T00:00:00", "id": "SECURITYVULNS:DOC:20387", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:20387", "title": "[SECURITY] [DSA 1630-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:29", "bulletinFamily": "software", "cvelist": ["CVE-2008-1294", "CVE-2008-1375", "CVE-2008-0007", "CVE-2007-6694"], "description": "Multiple DoS conditions and privilege escalation.", "edition": 1, "modified": "2008-05-02T00:00:00", "published": "2008-05-02T00:00:00", "id": "SECURITYVULNS:VULN:8964", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:8964", "title": "Linux multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:26", "bulletinFamily": "software", "cvelist": ["CVE-2008-1294", "CVE-2008-1375", "CVE-2008-0007", "CVE-2007-6694"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-1565-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nMay 1, 2008 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : several vulnerabilities\r\nProblem type : local\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2007-6694 CVE-2008-0007 CVE-2008-1294 CVE-2008-1375\r\n\r\nSeveral local vulnerabilities have been discovered in the Linux kernel\r\nthat may lead to a denial of service or the execution of arbitrary\r\ncode. The Common Vulnerabilities and Exposures project identifies the\r\nfollowing problems:\r\n\r\nCVE-2007-6694\r\n\r\n Cyrill Gorcunov reported a NULL pointer dereference in code specific\r\n to the CHRP PowerPC platforms. Local users could exploit this issue\r\n to achieve a Denial of Service (DoS).\r\n\r\nCVE-2008-0007\r\n\r\n Nick Piggin of SuSE discovered a number of issues in subsystems which\r\n register a fault handler for memory mapped areas. This issue can be\r\n exploited by local users to achieve a Denial of Service (DoS) and possibly\r\n execute arbitrary code.\r\n\r\nCVE-2008-1294\r\n\r\n David Peer discovered that users could escape administrator imposed cpu\r\n time limitations (RLIMIT_CPU) by setting a limit of 0.\r\n\r\nCVE-2008-1375\r\n\r\n Alexander Viro discovered a race condition in the directory notification\r\n subsystem that allows local users to cause a Denial of Service (oops)\r\n and possibly result in an escalation of priveleges.\r\n\r\nFor the stable distribution (etch), this problem has been fixed in version\r\n2.6.18.dfsg.1-18etch3.\r\n\r\nThe unstable (sid) and testing distributions will be fixed soon.\r\n\r\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\r\nuser-mode-linux packages.\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatability with or to take advantage of this update:\r\n\r\n Debian 4.0 (etch)\r\n fai-kernels 1.17+etch.18etch3\r\n user-mode-linux 2.6.18-1um-2etch.18etch3\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\nDebian GNU/Linux 4.0 alias etch\r\n- -------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.dsc\r\n Size/MD5 checksum: 740 950fed7ed7c289cfea9c1b39f0f41bc0\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.dsc\r\n Size/MD5 checksum: 740 6f6faa132a53e808bcc61823d140290a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.diff.gz\r\n Size/MD5 checksum: 5395308 ae08d42b58cd3cf93a23fe31615ac2fd\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\r\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\r\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.dsc\r\n Size/MD5 checksum: 892 ca5cdee7568704bc9f6c58f786d0daae\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.tar.gz\r\n Size/MD5 checksum: 55267 981e9a0a1d79b1605164588eef7da492\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.dsc\r\n Size/MD5 checksum: 5672 4e4714f542968b30b2c3f94e203e1e04\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.tar.gz\r\n Size/MD5 checksum: 55185 0a46d75b3ced870a96ea41b900f1ecaa\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.diff.gz\r\n Size/MD5 checksum: 16873 868c1f27ad2c8db782bbd2bdc3618d70\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.dsc\r\n Size/MD5 checksum: 892 52c602d55bdc301a0622ed8a63745f29\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.diff.gz\r\n Size/MD5 checksum: 16968 ff99991657e11545a0f557b623962c52\r\n\r\nArchitecture independent packages:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\r\n Size/MD5 checksum: 3589210 d2033347599e8db12e2446fd75c0ce37\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\r\n Size/MD5 checksum: 54558 3362cfa5f1de0c80b1aa96f22d846c7e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\r\n Size/MD5 checksum: 1586214 a496f633c826ce730ce6150dff49209f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\r\n Size/MD5 checksum: 41463452 67e56915cd61f4b0058aa668e284ca8c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\r\n Size/MD5 checksum: 1085670 9c6513bc6e29a63d0aedc8da8958fc3f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch3_all.deb\r\n Size/MD5 checksum: 3752262 e2f225858212089b10aa319236d300f3\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 3027694 ef8b352212a8184702407e69cb7046bd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 268330 7b7d0ab15fe537a59c68b35531750739\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 54038 f42aafb19b9fae6445d0581277b60e92\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 23531650 8633558cda9f10fbadbc9299dde77575\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 54074 f4b61f5f330a7a2248d91432fa307f41\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 268076 09bdbafb6d32a4d9f8ceab5f1a6c666e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 23484202 d14e2e1d8537aa0cb2f2367f6ddd6762\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 23844262 0cb427290707d8a59a3afdf68f523e6b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 3052524 4323a32807ee9a2a7f13bc605ef0a9c7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 268772 bcec817953f14a50253dbe83e16d6c70\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 23462618 f6873f376755c4f29b24d0d11c9d70ae\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb\r\n Size/MD5 checksum: 267446 376df6aed1989d65f8144f8790862e17\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 15260738 6c000df81a113d2d69a9473a3d764f08\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 16859134 9480377d14efcd65c7bde090d2c18023\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 3357018 fcb1a842f85110b4a37d246621027ad3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 271914 9a7953d1adbcfbbea07a1357450f34a0\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 15272470 2581dfa79e27ead359eb27642748b3df\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 54066 ce821a602278441fb157d2e8dffa7840\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 16820486 a1540f416895111ff4a4f6dc8d5ae2ad\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 3191118 dae286014c3a55824e3cb3040948caa4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 271584 5246a3f1ccb78bde203aab0338e90cd3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 54038 20567a8f59997151900492fbbdb5a5bf\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 54012 fcd8a752e777bf97667914fe658ca440\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 3167674 8fed61ce7278a060d600e54481851c2b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 3334306 bd7dd1d9b1518e0e52f3d513ad9f7cea\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 1650934 92ab0f73f6d2a1699f975ebede812c99\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 54034 224990e92d1255bac74a4a540ef8ee15\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 271184 4d2dfd603bf61408db599c9a972d6824\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 1682946 a2ccb197f0b4bc35e889a61c095add5e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\r\n Size/MD5 checksum: 272850 4cab43a5199e6764b4857a91aaa52e09\r\n\r\narm architecture (ARM)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 7924514 6f93e2c2e0f3e5ddeddb95bd50d560ef\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 233088 acb0dd092348b024f08e0fc2467c31f3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 54104 1437f25c10919b2f944295b8d7f168d8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 54064 1afdbacaa80466a4705a9b7ef50a4a9d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 239810 542097b2625db36fa56dfd7a29b66f37\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 233830 e9a09a7d2a3927486adc68e1f1f7f0f8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 3410416 dfc64565c01ac1f01784d72a8befa378\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 7566074 822c9f74d2a88f4ac8e94210ecb06752\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 204874 1b773fb8b26f20629b8c868db90c5521\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 5009022 ef23e40a692019b29f03f1ef7c864e12\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 4586924 66c55044ecf936cf08b69e3f78f8318e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 8870890 a5a52727b1e019791b260c65d4793911\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb\r\n Size/MD5 checksum: 198750 09c8bda5566b05dd0f969dedfc316d4c\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 10552252 247e3774a6493211af6575531966a8a4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 3020374 69fbbe6591cdab73257c9f68bacb63c0\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 54044 77f6c66523dba6bb546b28b6b40b51e9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 196344 3ed099784ab8fe2f625462b1689ea7cd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 196818 f0d8bbb055a380b4c2b6064bbd9de0ac\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 54068 f91b5aa270a091f57a246e4cf1f6924a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 195368 29352673ddd4364e7dab3f5a1eb6e2d1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 197570 bde8500410397921905e78f71cd68a10\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 11398348 8201e0a1b33c60d737fb2821dadb8d18\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 10999924 6a0b08925946b094d1638ca20095df15\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb\r\n Size/MD5 checksum: 11806360 7e63ef04531d59c2e3d0c93893d09bf0\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 16376092 f7e958b27f039bb044d46f94cc0c9231\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 54014 593ee26c9bed3b3c853511c6bbbd13ea\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2_i386.deb\r\n Size/MD5 checksum: 25583354 6cc7cc34a241783bb8f3b2c9da7595a2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 278502 0f7f0e13f78438eeb1a939a637b8070c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 16466936 99c66acfa3cd0c109f0d3e2eaedf8877\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 279716 62626201a89882bab17d10ce706b2df5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 14289932 049b2b4696e9cbeec20ec8c2056c7185\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 277596 042152b79d08eea568fd7481b4849386\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 16507076 a1a5845401d351c6fa1f380565bcb5d6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 16190600 6c50e29e1616140b367e626c93db2ae4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 271900 8d74262b41e039125ce896f8e8d2f8bd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 272690 94db026fc7d498b48c5ac0b504f63390\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 1299670 879785b1ee5f4ef0bec7423e5c7599e9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 14279230 3101d59c0d8ad8bf617f4d0eefbbb7de\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 54088 e23a1d89d0f998caed5b594c5762dc19\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 54032 d7b04d8d6f7a0d43579a499e4e0b681b\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2_i386.deb\r\n Size/MD5 checksum: 5518204 0ce72fa3c9dfd208b1afa6912ffbcc3d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 16336828 0780d6d13e90466249f83e6d72ce1780\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3_i386.deb\r\n Size/MD5 checksum: 5518218 b86648769c5d3db2eb79b1bf6d490c50\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 3148608 633afcaaeb9d655b8bde34977bfd0bd5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 272236 a611f8a0301e945ce72af3610bc05350\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 3054330 6cfae664f54be8c9ed3958c003f404c9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 3167916 756a4eed5e44d0530c5f20a7bc80d3d2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 279366 357140fdeff990683639e8f290593b0c\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3_i386.deb\r\n Size/MD5 checksum: 25583596 f0c6d87c849d5384be99dba70d34fb0d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 282728 a6b21a6fc38381b3884b2d2cd052d306\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 16836766 be9c22427d5666a80bf96e4c6501ebf7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 54030 125894b7dd2b90ba5f48de2e7f04518b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 1326708 add492f75bb0337e6e69a4afb73114c6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 16404432 9411c28cfbb27329417aa28b32de764c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 3170704 6b86d80969e7f62ceaae5ee5af7f1a5c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb\r\n Size/MD5 checksum: 279198 92c75044e071977263a20c444ee655d0\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb\r\n Size/MD5 checksum: 255464 ad4b1e9a12ca70ebb46a4c0f77bb62bf\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb\r\n Size/MD5 checksum: 28013676 bacb3a11176542aa961867eaac8539d3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb\r\n Size/MD5 checksum: 28181506 d0c75846976e8ebcd8baf1ee64a46414\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_ia64.deb\r\n Size/MD5 checksum: 54036 746e70c193f28c412acec61cf63e4572\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch3_ia64.deb\r\n Size/MD5 checksum: 54050 fa3dc6c7671185e9ce4f7a00783990dc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_ia64.deb\r\n Size/MD5 checksum: 3081858 970b72442606e4878d77a274d4fa4306\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb\r\n Size/MD5 checksum: 255414 885054343ab6670ce1d90f7bdda61ef2\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 167030 7bce3329b9fc5d10faafecfac21bc70a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 186870 37e9b246abeb84886cd9a6215187f229\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 8309262 893346de1a07ed015320fe333fc41037\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 15653182 1938128d29990cc16bc3f829d3fa1cbf\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 6125514 e6842c7aedc7b70d5a4a5d8e624e9627\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 162870 5ebcff098fd97c89bc0f3057f68c3e31\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 54110 9408231d8eb91431b2ca495f1e94f3cb\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 54054 ed109dbb8bf134256164d6d07bd061f6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 3413590 6013078ea705dbf5367d284f6ae401a4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 154266 e5775b643e07055ec7121815d9316e62\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 186682 9027d5504f2739d64d1bb4111ec5e136\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 15677870 4b5a1f2e56c587a0d470ea17fab07647\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb\r\n Size/MD5 checksum: 9075438 02f535440d5018de7b6233b232aa04de\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 9863510 a6c8def78ca64e8e8b6ef10533186d30\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 149960 2e09d53e58663189a043b7d7493cec8e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 5926528 cb0dfe477608a2da181596f9b78ceddc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 155716 76a619c24cc74cfe22ab42f9f2964096\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 54040 affef50872a733868e2e3d58d566993a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 155772 dd2d75f96ee5dd4c7a7ff8250f631649\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 182490 f6be30e57bbff0ecace79826d4474bb3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 5941862 45689ea22cb4ebdfb71936f79e00eebe\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 178194 4baf9d4d2fed0b5e3f12add06fae014b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 3350066 4938243e89da8ace26c47d00bc60acf1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 182706 84024a93ebcd9d394f179c8ee254ef1b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 15053292 024f0d5e1fbaf5c7d5664aca87ac8741\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 54102 d25d6e1de865a3da93959dd8f8034d7f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 6027404 26b3c01fd8f1c798189c1ee5ec44d11c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb\r\n Size/MD5 checksum: 15030096 69c0f1d1c25f49c3201a0b3edc1873b0\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 16402406 7f918a1714d84f8ccb6aaf1a13fc518e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 17016786 c06998d5b9b3c192bde5ecc4119830a1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 54088 3683bf42ff1af3009202bf4c6a0e30cd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 16626352 37c3c60edcd7f7b22ededfcda073b5a8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 251358 20ade66e354f4473ff045bb0e4e2f7c5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 229986 a6996ddd8cd1f5439aecfc4693ab83f9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 54036 d451146b15c05d5d630f72a3399a3464\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 253356 69fd6bca694ce1aea2788658eb530d3e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 18348404 6899ee7990a534276f4c98970a05a843\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 3414514 54cad7ae1cd248f0125aa12c9823f0c7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 18293832 2025add962d50482de362ee202f8bb79\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 252806 ed8f3ba9ab6384096d25204af0594ed1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 3392288 02cba07fa4ab35192737f7a40907cf53\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 16969082 d986973f5c4d0e577b169c96ffa0cec4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 15157518 c3ae440ddcd66b9aaa80260824f91967\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 253230 4d2e3ce370d0c3caf798cfee0dfc44d2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 246254 fa91c1654d4f46128856838066eb11bf\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb\r\n Size/MD5 checksum: 252272 5eda39b6177f4e66f082c06a159f5719\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 54058 9e8a26d5500ffcd7a6a29dfac6d570b8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 54032 350d6fe5dcfdefcc6f92e364f0ffba3f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 5401990 4af4cf18cb011bb00bb882f7a03c9a21\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 143264 76db142c20b22a4d0847f6309e0a10da\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 2966014 81cfb914839c4709399e25ffe9eb2cb5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 143688 4291bc7d9865c2842a181b22a7992188\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 5661534 8f7661bfe58017b2e3aa2eb9ca3ffadd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 1438796 18d9f041343153cf48f441eeed112885\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 5619704 7213d869d6e23933ae5e55c87fade8f6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 144632 5df45b01064fc7de2106e8b532946cb5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_s390.deb\r\n Size/MD5 checksum: 2942938 7dcac05e6588849c7491ef1004759f39\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 3168126 ef5277a44be4e2fb95d7f7feca1cc568\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 165126 8d82f98016c375c250105791051e3021\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 6411270 7106725061d98e4036d0ebabd01ca7fa\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 195102 73419b6d64a68410924a0471f0d3bf62\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 10391364 f35ec6950afc88b69fa814d005b68550\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 54046 dbd49273f393e72c21f056d50f94cf02\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 3190444 40bc9af5142779024dea09675f833778\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 194260 80fdc90e470899b21ae831aaa06702b9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 195828 2036f355f29c418602074540bde81c65\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 10693152 7bef279c0e967019fa5e8a07c1eb4019\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 10647534 197798f662b6e4fc55d0f64dcea6eeff\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch3_sparc.deb\r\n Size/MD5 checksum: 54076 8a2d9ac2067a4c8a7b090da06faf4025\r\n\r\n These files will probably be moved into the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.6 (GNU/Linux)\r\n\r\niD8DBQFIGgmwhuANDBmkLRkRAoRpAKCCo/Ja0CkmHW8VQijCHN7Y5l113ACeKR48\r\n1gWjfQ6MRn5jOphirPT8DZg=\r\n=22DK\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2008-05-02T00:00:00", "published": "2008-05-02T00:00:00", "id": "SECURITYVULNS:DOC:19763", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:19763", "title": "[SECURITY] [DSA 1565-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:26", "bulletinFamily": "software", "cvelist": ["CVE-2008-2136", "CVE-2007-6712", "CVE-2008-2137", "CVE-2008-1615"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-1588-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nMay 27, 2008 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : denial of service\r\nProblem type : local/remote\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2007-6712 CVE-2008-1615 CVE-2008-2136 CVE-2008-2137\r\n\r\nSeveral vulnerabilities have been discovered in the Linux kernel that may\r\nlead to a denial of service. The Common Vulnerabilities and Exposures\r\nproject identifies the following problems:\r\n\r\nCVE-2007-6712\r\n\r\n Johannes Bauer discovered an integer overflow condition in the hrtimer\r\n subsystem on 64-bit systems. This can be exploited by local users to\r\n trigger a denial of service (DoS) by causing the kernel to execute an\r\n infinite loop.\r\n\r\nCVE-2008-1615\r\n\r\n Jan Kratochvil reported a local denial of service condition that\r\n permits local users on systems running the amd64 flavor kernel\r\n to cause a system crash.\r\n\r\nCVE-2008-2136\r\n\r\n Paul Harks discovered a memory leak in the Simple Internet Transition\r\n (SIT) code used for IPv6 over IPv4 tunnels. This can be exploited\r\n by remote users to cause a denial of service condition.\r\n\r\nCVE-2008-2137\r\n\r\n David Miller and Jan Lieskovsky discovered issues with the virtual\r\n address range checking of mmaped regions on the sparc architecture\r\n that may be exploited by local users to cause a denial of service.\r\n\r\nFor the stable distribution (etch), this problem has been fixed in version\r\n2.6.18.dfsg.1-18etch5.\r\n\r\nBuilds for linux-2.6/s390 and fai-kernels/powerpc were not yet available at\r\nthe time of this advisory. This advisory will be updated as these builds\r\nbecome available.\r\n\r\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\r\nuser-mode-linux packages.\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatability with or to take advantage of this update:\r\n\r\n Debian 4.0 (etch)\r\n fai-kernels 1.17+etch.18etch5\r\n user-mode-linux 2.6.18-1um-2etch.18etch5\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\nDebian GNU/Linux 4.0 alias etch\r\n- -------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, and sparc.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.dsc\r\n Size/MD5 checksum: 5672 70da3d3fa9c813c51429d8b5d3b2e8ea\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.dsc\r\n Size/MD5 checksum: 740 94f5cb267a06c1dec878da90b9f1dd83\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\r\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.diff.gz\r\n Size/MD5 checksum: 5351147 abe5e0484f16f812708afc484e161bc5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\r\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.diff.gz\r\n Size/MD5 checksum: 17351 2f7dba888df3958188615ea041eca743\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.tar.gz\r\n Size/MD5 checksum: 55660 0538ff4f7178e76ea127ebef056d6b06\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.dsc\r\n Size/MD5 checksum: 892 be5c0a2ad62acc5172513a9ce287c94c\r\n\r\nArchitecture independent packages:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\r\n Size/MD5 checksum: 41462358 4a72841c24a18efce23193d77f367fe1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch5_all.deb\r\n Size/MD5 checksum: 3718002 4f526d410be4803e0caa37b49447f4d2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\r\n Size/MD5 checksum: 1083076 615903cc33714c0cfa8dbcc48772a939\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\r\n Size/MD5 checksum: 3589354 d3f8c0a58d10ba994aca59ce80317fe8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\r\n Size/MD5 checksum: 54650 0ec7b128e82da0898223888f4fa07e53\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\r\n Size/MD5 checksum: 1592544 f1b06a865148d3ecc897f6f898b9f56a\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 54138 e7252716146d76ec712aa139287db245\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 23532610 9e2eba932bf5b4cbf909da8be17025f0\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 54106 b537043ae0a9552a4e6c2d94cf2c2800\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 268424 dbbb97dee4c3070f9cd0172bcdc49ef4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 3027930 4c8fd619b7f8bb0f50e1bf0609e37a20\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 268084 6464e53b77d391c0417013c3b270c59f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 23463090 48ec7662494774ee942a6252fd44e07f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 3052820 51f401e43b054813abfbe1c422713370\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 269742 5c26e5083d2a86ea8ce9c80873fb0d3e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 23845162 28d1de6a26fd663eeb2e3977923575c8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 23484076 c04d5474a002c0c6872b0c0779499e00\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb\r\n Size/MD5 checksum: 267482 537e40c1b92217edb912b680b30f8cd8\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 54108 f51956cb9e9c4fcce9d2852cc304c8de\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 54134 07e4c8015b83da692bf2128f73966043\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 16950720 269a05ec2a25fd5e6ce7df4cb5a998c6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 3396124 8f57552a6dc82815c1e0881f3d827c20\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 3227466 a28c80ec87bb6b6a7534c36e9a01a8b4\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 16906784 c8ba6e5505966c0cbd559e07dc1a95ee\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 54082 a3e4fb024f6242b1761565cdb1a27bab\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 1682832 5bb35f10ad153f7a0e64d0560f36b14b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 3251476 a8994a53f8082ac755c5153f21645cb6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 274250 b632fc76029cda382920bbf17dc70c76\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 3421192 b41a836c46e5fb252989a41785d1374f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 274730 2483995f136e52562556017c2f0d4a96\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 274044 0d460826b9c6fac02574482db7914bd6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 15355064 384131032d56063c896019e39e037a96\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 274730 da10935f2b25722252c68761e5065405\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 54094 292e8525fc3f29d5166365da794cfaef\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 1651262 d538be2c0dda417622040c33f34cd237\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\r\n Size/MD5 checksum: 15366488 a3ad9046c3f774dd5097e6982ffe39fa\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_amd64.deb\r\n Size/MD5 checksum: 5960836 ccceae60cac558233545c4c4cdbe409e\r\n\r\narm architecture (ARM)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 54180 fbd9dae1ecda050a0b0734b04db35501\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 7924540 fcc6f7d63d622745a55c4bd9fa066560\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 239248 e9e3b3e13071c64cc7e6f2dd7e15cfdb\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 54140 f38cd11a11adfb18ea0aa4de1b08ea39\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 4587314 01782ba5f8d91bee1d77302e9a6a9e61\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 3410452 448786f55f94315700e03bb93b454621\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 234064 c0e792fcc328bedc6583179e5156266e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 7566024 d0423054e62d157a7fc10ad2e27e07a9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 204142 b4a419a3a28fb963c5279d9e9b125705\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 5009344 5613d609c1c046f2b2ba72c6c890c486\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 198814 12c93d0b1d0f0d61ecaf5bfebcf8eb3a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 233122 5bc42539dc40aaa1d81507b5f5a9bf83\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb\r\n Size/MD5 checksum: 8870920 3a45be48b3293a9cbe193b0db5ab2d96\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 10996540 34a482a7404b6e48cc4202a3c031e39c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 11398886 13d0d088bbd0e90ba1ade33ee2ded031\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 54136 be5be650e3800c63cedec99e2c7823fa\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 11804256 cb47826af75d4ad2e3006ce8ea6ea493\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 195920 3883151884f603b502ed741945ffe3dd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 10548980 c6bf62e7a77bac7a9f13e88934a7edd8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 196764 53581705559a0ff4812e5622633ad987\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 197038 03b0dd0d144eddf69e9cbf4ae9b3c187\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 54114 b399acd2935e12d8580bac5075aca833\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 3021520 2d524cf038836529a4b5b98b527fb2c3\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb\r\n Size/MD5 checksum: 197926 929a482ee6043c8913e0a02297975d75\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 281128 96055c189ea53e2d36ef2ba928112fda\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 14279136 50f18a8d2410f33d2fa6b3d913d333c8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 54098 bc1b6debe849f30326190420aaf3bcf8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 16336566 f0da95e8ce638a5246ad4d814f5fde09\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 16375886 6d7a589bdf348d2b883b12dc59d821dc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 280108 03ecf352b9f9808cfad169da68bae00d\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_i386.deb\r\n Size/MD5 checksum: 5504676 89f5fa03885ee4f737461182eabd709b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 3168146 107659ec75db011516e29d898c3bc63b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 272402 ed55cb5a5a38b9b98ea99afda45fa179\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 283546 645d7a6511ed1edd8d939bcf23a06db0\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 16404516 342d98b58ac8d8e4e66923a4ce993463\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 280800 53a9b58e467b80f51e9164099ec88e18\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 16836824 56389bee0ae2c10099f7e19760c7b89f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 277982 6242067c054616623741facb41be96b7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 54098 4845efdb09aea41ef938c090530335d6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 3148840 26b1b0193f25d457db81ed3893c0d1de\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 16467076 aa6cc19fdd8d3c4688ae4ea2c35e667b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 54084 30945bdfc901629b6f1df13c704e70a7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 272478 0563e7854cbbe484cbe7ba042c89b19c\r\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5_i386.deb\r\n Size/MD5 checksum: 25587444 e2c0ff4dc80f241a41f27e415497462c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 1326822 d6eccf90389e1f5fd41653ef2da4060a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 3170850 4d2061539468c3788a8032e5e27aadfb\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 14289748 1e8a50868e7dee3bcf4ed7e8469c20ff\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 272122 ac3985bf454e339c3a02ee17a4a4104c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 1299688 f3a4ef71801a826f1da151fd12e4be57\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 281326 2b142556dc07fa41dada942fcf36cc8e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 16190240 8a63f6a2ac3b6334cbacb99129c76a9d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 3054490 f549787f1b48cf4a7bf5cad359776e72\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 16506826 4e0ef2228324c2fc14365a5aaeda0e30\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch5_i386.deb\r\n Size/MD5 checksum: 54160 8a5f9200a579604b5b44609549d0fec3\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch5_ia64.deb\r\n Size/MD5 checksum: 54132 9c4710a3f9fe303d8fb91b1bc2f26aba\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb\r\n Size/MD5 checksum: 255602 502b77e416d4146085c986e3f044ef65\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb\r\n Size/MD5 checksum: 255496 a1e152ea44a76c0376c0c5308e7eb73f\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb\r\n Size/MD5 checksum: 28013686 e3a9f2c0f65dbb32ddaef4279f46a02d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_ia64.deb\r\n Size/MD5 checksum: 54116 e91729e3a1d6c9e036b34a07d5322ea1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb\r\n Size/MD5 checksum: 28181240 a977c1726724712c52209f9448f4a430\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_ia64.deb\r\n Size/MD5 checksum: 3082082 d279733263714c558f68651a532950d0\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 54134 22a4791eab8c910e616d157866d53025\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 167044 70a9e850f5b589307c11d793d1ae6402\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 3413738 bacb0e69b1b775b8c107817388179890\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 187064 c5e7a3e6da64281a67676b1f574da751\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 54186 24256be3de335798d64096467935c740\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 8308966 ddf5ee18359c5814b7becca4bb6db245\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 15677882 5ae00f56b380829aa0a497776b0135f8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 154386 e901acfcbcc3b5549c30bbe7ce710cc6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 6125594 e396b15e9dcab593e4320236d7ac1572\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 15652934 8abfb40f359d54ac15854b782f8198bc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 9075546 c7bda747c97bd58ecf70afa6fb71a02a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 186748 16d2e8cce7839f20fbf5baa65f07094e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb\r\n Size/MD5 checksum: 162974 f9993e3f13a281a749a77e83a2c706cf\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 15053122 38c50780f0382abf544339b0423c86b2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 54160 813b1edc195ae4a98f7c458e432e89ba\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 3350138 d4ffd93599f61d99b2f50ed87d31144d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 9863398 71469c0b29659c83f2f4996de5ae855b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 155774 bb807178ae81678f4cea5b64bcd8e0f9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 15030230 802e7f15ae2a00d4a3fd99f8d37e48f8\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 182630 a9e57a79ab1530af02e9b61b81606fa9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 178290 bb9edbbf330c0b465ad37e0e5499b2b2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 54106 3abe49b4366693a69c50a899f3f7eeea\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 150042 64a877e7e1680dd1a69317d87888621a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 5941952 71641a79aa2f9869e4608b0df2cc78cc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 182772 e01dad553ee807ba9bd8b4f12275e79d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 155828 d95e8387335c55a5ded2340e8fec68f9\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 6027796 c1cc067bcd418ae935e8f4a39e96dc78\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb\r\n Size/MD5 checksum: 5926602 baf4afb27b59a0b9ef8b548a3f1a80f3\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 3392458 d0e49a4a623d77420317f8e6cec301a6\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 229438 bf578fa343cc77237329c34882b4d038\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 18294080 cb7f16ec55e918534e9042e7e0c5ef7c\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 3414806 3a901290719800285b63c53e7b9d4109\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 15157308 f605138dd137eb4374139ec0cf79351a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 251522 4f8ef89f851229849bc5a3bc5b19c82b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 252312 e3c7462faede8715dd91b566a58f9b68\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 16969642 0607cea9945592510f5d3fb9f928c68e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 252654 a1a124efec56637b9dfa87c8cd9550cc\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 245866 6745e27544fab3eb5aba4a97ebf0fd9a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 16402670 d3b6fdc36ccd744cc0c8956be6176e0b\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 17016920 e24f260fac43e592708bb9ba1e707c16\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 253460 8cf63cbc53c6272a748d33b1bd98dfb2\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 18349664 4222693f7730b0e6833541ba79afd50e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 253334 e3314d10a9e3160c79a497967f44fbbd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 54160 2b3e2ac3e9367055f4e7669e56583beb\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 54112 3199cd9481a91d0def2d149bc0b59c4e\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\r\n Size/MD5 checksum: 16626546 e09c228686cb96ce5e56a142a6366e13\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 3190524 3e8e5ea3e72da553d2716dd73f0a5fb7\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 10647606 9ec3d7c71c0a503b4294aa780a9fdd09\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 54110 f011e208c98ce3aeeaf9dd00ad82b6dd\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 6411008 58c2219a0c20105cf239e323da2e0340\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 165004 ebcd3a274a921148a884d50eb71fb2c5\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 194096 ce1428b814293647a6e00c947270b813\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 195024 4c4ff026f91be55c689b43a19060620d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 10692826 1053f11e2d543a6c56f9f80f31dc28af\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 54140 46c81fa9576fa5e3ac9200115527f02a\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 195748 32499d6fc1f632ec879464002dceb221\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 3168216 d78356180bcbe48cc6ac77a980e08e9d\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\r\n Size/MD5 checksum: 10391204 8cb2fa5bd484dff88cab8741035128df\r\n\r\n These changes will probably be included in the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.6 (GNU/Linux)\r\n\r\niD8DBQFIPD45huANDBmkLRkRAi5BAJsHnGiFMDJb1rkp/QJ38cRAhAB1xgCeIL0I\r\nctecy+cP3sK3xsDYTxot1Ug=\r\n=Vl8h\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2008-05-29T00:00:00", "published": "2008-05-29T00:00:00", "id": "SECURITYVULNS:DOC:19921", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:19921", "title": "[SECURITY] [DSA 1588-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:29", "bulletinFamily": "software", "cvelist": ["CVE-2008-2136", "CVE-2007-6712", "CVE-2008-2137", "CVE-2008-1615"], "description": "Memory leak in IPv6 over IPv4 tunnels, mmap DoS on the SPARC architecture, DoS on amd64 architecture, DoS with hrtimer integer overflow on 64bit architectures.", "edition": 1, "modified": "2008-05-29T00:00:00", "published": "2008-05-29T00:00:00", "id": "SECURITYVULNS:VULN:9029", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9029", "title": "Linux multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "debian": [{"lastseen": "2020-11-11T13:11:20", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2007-6282", "CVE-2008-2826", "CVE-2008-0598", "CVE-2008-2729", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1630-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nAug 21, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : denial of service/information leak\nProblem type : several\nDebian-specific: no\nCVE Id(s) : CVE-2007-6282 CVE-2008-0598 CVE-2008-2729 CVE-2008-2812\n CVE-2008-2826 CVE-2008-2931 CVE-2008-3272 CVE-2008-3275\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may\nlead to a denial of service or arbitrary code execution. The Common\nVulnerabilities and Exposures project identifies the following\nproblems:\n\nCVE-2007-6282\n\n Dirk Nehring discovered a vulnerability in the IPsec code that allows\n remote users to cause a denial of service by sending a specially crafted\n ESP packet.\n\nCVE-2008-0598\n\n Tavis Ormandy discovered a vulnerability that allows local users to access\n uninitialized kernel memory, possibly leaking sensitive data. This issue\n is specific to the amd64-flavour kernel images.\n\nCVE-2008-2729\n\n Andi Kleen discovered an issue where uninitialized kernel memory\n was being leaked to userspace during an exception. This issue may allow\n local users to gain access to sensitive data. Only the amd64-flavour\n Debian kernel images are affected.\n\nCVE-2008-2812\n\n Alan Cox discovered an issue in multiple tty drivers that allows\n local users to trigger a denial of service (NULL pointer dereference)\n and possibly obtain elevated privileges.\n\nCVE-2008-2826\n\n Gabriel Campana discovered an integer overflow in the sctp code that\n can be exploited by local users to cause a denial of service.\n\nCVE-2008-2931\n\n Miklos Szeredi reported a missing privilege check in the do_change_type()\n function. This allows local, unprivileged users to change the properties\n of mount points.\n\nCVE-2008-3272\n\n Tobias Klein reported a locally exploitable data leak in the\n snd_seq_oss_synth_make_info() function. This may allow local users\n to gain access to sensitive information.\n\nCVE-2008-3275\n\n Zoltan Sogor discovered a coding error in the VFS that allows local users\n to exploit a kernel memory leak resulting in a denial of service.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 2.6.18.dfsg.1-22etch2.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.22etch2\n user-mode-linux 2.6.18-1um-2etch.22etch2\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.diff.gz\n Size/MD5 checksum: 5378366 80a876fbcded8984ff47308cf2ece776\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.dsc\n Size/MD5 checksum: 740 080fa46e372743186c973658347ceee1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.dsc\n Size/MD5 checksum: 892 30580beb633eb4806c40d659f552cd88\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.dsc\n Size/MD5 checksum: 5672 780d93329a4cedaad9d0539c1cc400ac\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.diff.gz\n Size/MD5 checksum: 18180 2b9bbd3f4bcc3852320fc60d6947607e\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.tar.gz\n Size/MD5 checksum: 56550 01fd54902e7ac7c3035c5176f1deae3c\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 3718952 804c3adc75403db743f603fd1dc44fa2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 41460250 9fda57df0d76f6300b162c0765a87e32\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 1632622 6d644a3a0502065b7a9faa9a7efdb8f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 1087372 8ff719e7a81edaa38b5eca31a7aaee02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 3590476 b803de0252e4f027567c5c13db4afe0a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 55722 a4dd6ba664f85780bbe1ebf7f3a77b25\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23464338 df80e9f9afac5942ec8cd73c8fa2acd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 55150 c752933d6628e0ebe75dbe47f29ad4e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 268952 128bea32232629d3255799ddc83da7b3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 269648 7617546d15e940343cbe381dfecae010\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 3053804 f72f8a710f0a4da22bc8fd431d9195ee\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 268368 5c248dbb5e31cc30d4148196b1f5cef0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 55180 2a8a3e402015cf1908906180eb6f8a5f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23846050 ba3b97267e75c3d8027627b2a3ece5fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23485982 9ea2f705c0a99080425de75c48c66904\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 269242 1edcca9164f4eecd392897903269c1e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 3028978 253a048a7d3ccdf823b8e28b47e5f849\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_amd64.deb\n Size/MD5 checksum: 5961854 67e6d9bddf32e6ff37f15a37f9aa2b04\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55174 94bc1ab70d46a153205059b1ba2fbd9e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 279498 bf0107981fe6a603a9b72be5e94190bb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 16909690 0d7e343ec621b05fb565ed0c4b355c9e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3252530 97dc43477d90cae8fd6b4033781ce589\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 277930 b719a1156f14a870b6f0fed9fcac0e26\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55146 865ab31e1451d19f5374492c7b5cec02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55152 811c0ed6f63166536426b3a30a0ae6a0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 1652318 1e02b1e5c1315c6775efd5a3ebb8eba0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3228660 b3491a01820796609c57ff0ca45cd991\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 1684052 214c87ec095a47ddb16cb5a0386385d0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 15370528 6429150ddfdc20c94f5dd9223ce1eefa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 16955552 08dbcfaeb394f720be04b43584cc2dca\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 277636 0c1dd9ed04830cef72a2799682cdb373\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3422414 a66a5347a66c224513912f23df6e7811\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3397342 d69524c251013eca5cb9c2fc6ac49f08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 278800 f808d9f0b51671184647976e61673ef7\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55126 dcc26a10c820fe676abf6d0a8f733190\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 15356684 ca635c5a74fde0c121ac8ad0dca7f3bc\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 240724 05944f6adaed3622fdbf4fa94d9e37c1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 55194 cfb4019acf8ce2b9eca9a06cde8fa6d8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 200112 db009d7e4d83679ea6bf62352e8cbe27\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 7925520 1488da3529714a8490790357b2a28d34\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 235346 8bac39d6ded885fc5247046c1a0f5c1c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 205074 8fa04e311cd6e56aa2749d4146056c77\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 55234 060e1f4e0b26b2fb42fe0be4d8078952\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 3411494 cfe4f5b7273940720e2bc1e945631f1c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 4588214 42d8698407235b46507cf2d7b992c09c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 234198 35c06e74a9f26ab8217ea98df7c01a9b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 7567632 3e4a444afcf3df3e510e2c5000a4b684\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 5010844 a3a1c62fbe80192e80bcaac498036e92\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 8872222 e1a64be9bdc5246dd1d9ef666eb0a311\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 11805014 e45047cea390fd98d4a55557414b578e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 55184 397ca7761578ce779b6ef9bacc372ffb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 10551992 1d693cdd06bb4dee92a25cd886817522\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 55158 15e7aa685aea41e29ac6c76825e99ad6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 199066 5aaf2ce6a96449673f8a8f48f36cf841\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 11400554 53c5eca027dc1015bf6423cbe65536cd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 10998698 050980b34cbc925f0842c161828aa1f7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 197944 1d45f1fe804821cc7b8aa80b0dec4f36\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 3022526 52b6702172ceb2064dde03ea3cacca7a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 198152 556e2b16e2988976dac562f1baad15a9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 197130 298d3e069a1f6996685c4a5a8bc1bada\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16377614 74d1938921db193d10a0ff798fe7c005\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272450 5468ca009d328fc890a6ab771ab20968\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16471330 35ea40d0f873d6c8ff819a62239623ac\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 280452 b055d4305ed580aa9603c3ff5b8c48ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16838150 45beacafd1a4902c055c41bd7711586a\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2_i386.deb\n Size/MD5 checksum: 25589346 bf03c496e08b7d40f52f602011c07560\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16406940 0225f98fb843e23225875943b5179aa1\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55132 28a33a24ebdcdcad85d335499397c88c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55196 16b6e16eefaeb5891ab4ba7f832d0ed3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3169128 eb405a8b5c8b6d815c95f73262a99af1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55144 3d96d807e874865af58831720adb4486\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3055432 a496fea546da3a21748b444ffd6836ec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272846 c58bde7235a1f1ac5c8145dc1ae9346b\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55140 eee1bdfac4bbecc919d0151b2e23d24c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 14292444 19fe5544166f396830fef3a1b4e4626f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 280608 496144bbb1d620644189d012b9d6ea70\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 282902 f4145bd74ab9467b1af36da46b7666ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 279034 26430131dc00922da7c9b034c191eaf1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272230 871474e9b227166f527391aa064ec971\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_i386.deb\n Size/MD5 checksum: 5505296 9da61c3c82edf996a6324ebd4517251c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3149672 c6cbb32f47b75db7d63a6fcf84e0df38\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3171866 333ceba6af38b86e41a1db10fc764319\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 281062 c0c403aedd560ad15fb7d90c54ce3145\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16192240 a4a3d514e989d64042c46d3ad8d0b0ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 278950 9de592d811e51eeb07ebe193f8734d15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16337664 a367c6561e7cf8ff701a731d8072dca2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 1328006 c5089d6b0fa44ce46fdbbd17140cb9c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16509906 c8894d32a5f39e7512d2db9de74ddf3c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 1300920 9c42c8356ab3a07b89f2d95f47de5303\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 14281014 32f281f475d4ee1f2d67dd029231ea46\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 256640 e96b0df79e67e6049d8feeb73e63f287\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 55174 c93847739b57f47faacaf642de4ab6c1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 256732 af4ee0bbafe50ce27d875243fe626ab9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 28181368 dff959a14317741919a7a46d73c273a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 55146 9f30373190856528f752d21d66a88053\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 28014200 d290bc90985342dfe3b348d3e1d07922\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 3083012 cbb353d4e8cb3a2bfc4dbf43f4427344\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 8311782 6b24a125c1b553bd4f69d830f2d19eaa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 6124616 ab5d97cb43f8e7d0f7cfebe2db2416df\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 55190 1cd7be3bb06e63ecf67e6c5c175aa201\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 187898 a74c79e4b6de9312c1a531b7d1c04e06\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 164036 58db324ddfe7d1b3f7086c67091c1ae3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 15654946 4c99171f6b6e8e0b06d88f65244f5a5c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 155578 71edf3d7d29b414ee8fe9c26d98afe2f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 15680482 79ca37454bab6d11c4af5621e3963e87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 168240 0eafb18463f917510d3110c74786742d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 3415314 94c72a62a2c3c52535c3ef4936400ad9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 9077040 581d6744c0c10ec63b06b5d058e44a87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 55236 7c94ce0a6b000ba9abcc0bf8272e033c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 188208 2356f7b9cf66b0694b1b7bb07e9e1df0\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 3351164 f15965863479e2b0eab136c912b25ebd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 183690 e20c71f57188bc8458abb4dc212402f3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 156886 65c9aec3009d7ace0550bee15d0bd34c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 151270 92419bb4255d3989eef1b3d2e616e5a5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 9864388 2aa86c68a6c8ac36e8dc22aafcac34fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 183862 262a4f1a05c00b6c2752733101d2bb4b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 6030536 1199eb8f7b6a9b4ff1a32ebccfcd7074\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 5944692 205d02fd233142d8058874e6ead00e94\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 156854 1f02416baf0082238418bba97eb8aa4f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 15028044 00f2ad06dfa6c908036349c35a5a8e39\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 55154 6b6f4c17287d5e053d716a742cb738a0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 179462 e5497abf20a5461319d8f1d7c37d19b3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 15057484 ea8ab2c273fbc3d282d0120cdbbe5c34\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 55208 f3bfa65fa08c4ad552aef1536bdd1fcc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 5928064 cad7b6b3653d205a39e876a508d4ddaf\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_powerpc.deb\n Size/MD5 checksum: 3367890 ad1ad713d488f9e0e0669e1293f1ccd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 254026 ae831a11ed61a4b52bb7a3043eb2f265\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16628466 1b10ecc3a4095b9f0e9cd6fa0c544308\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 3415704 ea230f1f09a4e8341e7bb24ebd037dd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 15160062 e41656dd2782d44ec9487138dc694722\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 17017000 04153c3611b94ae5044868407f1eaa96\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 255324 60960ac1262f6d8eabcd96d9789b27bc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 253678 e1a1fcc0865698fca0aa46cc02c0e38d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 18295838 01cb70246fc9027dc9097964d0a7c06d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 253858 a30720b97122274208888b564c0548b5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 18354880 c82075e19802e915551cd25b04f72c76\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 3393390 246ebdc0ce319ab1b8c0022b1b69fd1d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 246546 855a95e124dcd81d26d06fced8ff9cda\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16406142 59c2543679159905e0d16445d7f5b66d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 231148 96bb009cbc3c1c9fc00a4f84a4aa9cd5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 55156 94c052eb19ce469aabc0a9a71860f861\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16971942 c230eb342210e9f9376783e013216695\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 252866 4b2bf2f6783bb456b5c003df3e1ea1f5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 55206 209887bf65d555135cde2cb7b1ef0b7b\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 55168 ba80b3fe0aa1ffdc92825578c4a0a8e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5620988 555c4bd0a4b245f267dc324c9b39d695\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 144604 bd539fa6955b9ea80a38046b1097ea6e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 145888 80f3dcbc19b2076e6a37ac8f48f1c687\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5403802 9bfc6e49de7faecc3ae013efd8a5ff85\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 2944158 7a37040db97a3a43817eea570ca29554\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5663004 f3b7384004cd0c0c6a0478865300b9f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 55146 fd4df49a7d2116c1b1eb0f38211c196c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 145096 7e0bfcc155246d4b7cb8ee00d9a370ba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 1440072 437e3a46bda63f1ba5bb2d0b970a669f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 2967228 a32e5147c0f741a5300c6122aade4377\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10394174 30c3164de023288678eda955e7088e89\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 166138 da9c686e82839dbecfc4d2f8d5d6ff8f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 6412488 738092d091284463d88dcce9bc0d683e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10694332 aa5d657822ad30eb7edf2eca35644e09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 196630 b349a6dd56888b772577075f21229498\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 195534 c7b2e3ee30ba33f0a207fa11a5f08916\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 197330 5e9f1ad14b5b10c6012b09dcfa93acb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10647804 5bab66c5cdaa22683425b4e101fea4e0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 55156 da09f09d5c47ce3cd8666b7ba98b9a08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 3191596 f6aee8879affc350feb8706cdffb95da\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 3169298 a6ad7bd3b6ba9d573f47c21f45b9f660\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 55184 322a273cbddb53db9fdb143229104384\n\n These changes will probably be included in the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2008-08-21T16:40:28", "published": "2008-08-21T16:40:28", "id": "DEBIAN:DSA-1630-1:8E4BC", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00216.html", "title": "[SECURITY] [DSA 1630-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:19:55", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1294", "CVE-2008-1375", "CVE-2008-0007", "CVE-2007-6694"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1565-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nMay 1, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : several vulnerabilities\nProblem type : local\nDebian-specific: no\nCVE Id(s) : CVE-2007-6694 CVE-2008-0007 CVE-2008-1294 CVE-2008-1375\n\nSeveral local vulnerabilities have been discovered in the Linux kernel\nthat may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-6694\n\n Cyrill Gorcunov reported a NULL pointer dereference in code specific\n to the CHRP PowerPC platforms. Local users could exploit this issue\n to achieve a Denial of Service (DoS).\n\nCVE-2008-0007\n\n Nick Piggin of SuSE discovered a number of issues in subsystems which\n register a fault handler for memory mapped areas. This issue can be\n exploited by local users to achieve a Denial of Service (DoS) and possibly\n execute arbitrary code.\n\nCVE-2008-1294\n\n David Peer discovered that users could escape administrator imposed cpu\n time limitations (RLIMIT_CPU) by setting a limit of 0.\n\nCVE-2008-1375\n\n Alexander Viro discovered a race condition in the directory notification\n subsystem that allows local users to cause a Denial of Service (oops)\n and possibly result in an escalation of priveleges.\n\nFor the stable distribution (etch), this problem has been fixed in version\n2.6.18.dfsg.1-18etch3.\n\nThe unstable (sid) and testing distributions will be fixed soon.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.18etch3\n user-mode-linux 2.6.18-1um-2etch.18etch3\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.dsc\n Size/MD5 checksum: 740 950fed7ed7c289cfea9c1b39f0f41bc0\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.dsc\n Size/MD5 checksum: 740 6f6faa132a53e808bcc61823d140290a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.diff.gz\n Size/MD5 checksum: 5395308 ae08d42b58cd3cf93a23fe31615ac2fd\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.dsc\n Size/MD5 checksum: 892 ca5cdee7568704bc9f6c58f786d0daae\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3.tar.gz\n Size/MD5 checksum: 55267 981e9a0a1d79b1605164588eef7da492\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch3.dsc\n Size/MD5 checksum: 5672 4e4714f542968b30b2c3f94e203e1e04\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2.tar.gz\n Size/MD5 checksum: 55185 0a46d75b3ced870a96ea41b900f1ecaa\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.diff.gz\n Size/MD5 checksum: 16873 868c1f27ad2c8db782bbd2bdc3618d70\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2.dsc\n Size/MD5 checksum: 892 52c602d55bdc301a0622ed8a63745f29\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3.diff.gz\n Size/MD5 checksum: 16968 ff99991657e11545a0f557b623962c52\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 3589210 d2033347599e8db12e2446fd75c0ce37\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 54558 3362cfa5f1de0c80b1aa96f22d846c7e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 1586214 a496f633c826ce730ce6150dff49209f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 41463452 67e56915cd61f4b0058aa668e284ca8c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 1085670 9c6513bc6e29a63d0aedc8da8958fc3f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch3_all.deb\n Size/MD5 checksum: 3752262 e2f225858212089b10aa319236d300f3\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 3027694 ef8b352212a8184702407e69cb7046bd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 268330 7b7d0ab15fe537a59c68b35531750739\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 54038 f42aafb19b9fae6445d0581277b60e92\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 23531650 8633558cda9f10fbadbc9299dde77575\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 54074 f4b61f5f330a7a2248d91432fa307f41\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 268076 09bdbafb6d32a4d9f8ceab5f1a6c666e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 23484202 d14e2e1d8537aa0cb2f2367f6ddd6762\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 23844262 0cb427290707d8a59a3afdf68f523e6b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 3052524 4323a32807ee9a2a7f13bc605ef0a9c7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 268772 bcec817953f14a50253dbe83e16d6c70\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 23462618 f6873f376755c4f29b24d0d11c9d70ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch3_alpha.deb\n Size/MD5 checksum: 267446 376df6aed1989d65f8144f8790862e17\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 15260738 6c000df81a113d2d69a9473a3d764f08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 16859134 9480377d14efcd65c7bde090d2c18023\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 3357018 fcb1a842f85110b4a37d246621027ad3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 271914 9a7953d1adbcfbbea07a1357450f34a0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 15272470 2581dfa79e27ead359eb27642748b3df\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 54066 ce821a602278441fb157d2e8dffa7840\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 16820486 a1540f416895111ff4a4f6dc8d5ae2ad\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 3191118 dae286014c3a55824e3cb3040948caa4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 271584 5246a3f1ccb78bde203aab0338e90cd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 54038 20567a8f59997151900492fbbdb5a5bf\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 54012 fcd8a752e777bf97667914fe658ca440\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 3167674 8fed61ce7278a060d600e54481851c2b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 3334306 bd7dd1d9b1518e0e52f3d513ad9f7cea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 1650934 92ab0f73f6d2a1699f975ebede812c99\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 54034 224990e92d1255bac74a4a540ef8ee15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 271184 4d2dfd603bf61408db599c9a972d6824\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 1682946 a2ccb197f0b4bc35e889a61c095add5e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch3_amd64.deb\n Size/MD5 checksum: 272850 4cab43a5199e6764b4857a91aaa52e09\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 7924514 6f93e2c2e0f3e5ddeddb95bd50d560ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 233088 acb0dd092348b024f08e0fc2467c31f3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 54104 1437f25c10919b2f944295b8d7f168d8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 54064 1afdbacaa80466a4705a9b7ef50a4a9d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 239810 542097b2625db36fa56dfd7a29b66f37\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 233830 e9a09a7d2a3927486adc68e1f1f7f0f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 3410416 dfc64565c01ac1f01784d72a8befa378\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 7566074 822c9f74d2a88f4ac8e94210ecb06752\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 204874 1b773fb8b26f20629b8c868db90c5521\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 5009022 ef23e40a692019b29f03f1ef7c864e12\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 4586924 66c55044ecf936cf08b69e3f78f8318e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 8870890 a5a52727b1e019791b260c65d4793911\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch3_arm.deb\n Size/MD5 checksum: 198750 09c8bda5566b05dd0f969dedfc316d4c\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 10552252 247e3774a6493211af6575531966a8a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 3020374 69fbbe6591cdab73257c9f68bacb63c0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 54044 77f6c66523dba6bb546b28b6b40b51e9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 196344 3ed099784ab8fe2f625462b1689ea7cd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 196818 f0d8bbb055a380b4c2b6064bbd9de0ac\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 54068 f91b5aa270a091f57a246e4cf1f6924a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 195368 29352673ddd4364e7dab3f5a1eb6e2d1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 197570 bde8500410397921905e78f71cd68a10\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 11398348 8201e0a1b33c60d737fb2821dadb8d18\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 10999924 6a0b08925946b094d1638ca20095df15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch3_hppa.deb\n Size/MD5 checksum: 11806360 7e63ef04531d59c2e3d0c93893d09bf0\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16376092 f7e958b27f039bb044d46f94cc0c9231\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 54014 593ee26c9bed3b3c853511c6bbbd13ea\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch2_i386.deb\n Size/MD5 checksum: 25583354 6cc7cc34a241783bb8f3b2c9da7595a2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 278502 0f7f0e13f78438eeb1a939a637b8070c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16466936 99c66acfa3cd0c109f0d3e2eaedf8877\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 279716 62626201a89882bab17d10ce706b2df5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 14289932 049b2b4696e9cbeec20ec8c2056c7185\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 277596 042152b79d08eea568fd7481b4849386\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16507076 a1a5845401d351c6fa1f380565bcb5d6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16190600 6c50e29e1616140b367e626c93db2ae4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 271900 8d74262b41e039125ce896f8e8d2f8bd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 272690 94db026fc7d498b48c5ac0b504f63390\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 1299670 879785b1ee5f4ef0bec7423e5c7599e9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 14279230 3101d59c0d8ad8bf617f4d0eefbbb7de\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 54088 e23a1d89d0f998caed5b594c5762dc19\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 54032 d7b04d8d6f7a0d43579a499e4e0b681b\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch2_i386.deb\n Size/MD5 checksum: 5518204 0ce72fa3c9dfd208b1afa6912ffbcc3d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16336828 0780d6d13e90466249f83e6d72ce1780\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch3_i386.deb\n Size/MD5 checksum: 5518218 b86648769c5d3db2eb79b1bf6d490c50\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 3148608 633afcaaeb9d655b8bde34977bfd0bd5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 272236 a611f8a0301e945ce72af3610bc05350\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 3054330 6cfae664f54be8c9ed3958c003f404c9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 3167916 756a4eed5e44d0530c5f20a7bc80d3d2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 279366 357140fdeff990683639e8f290593b0c\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch3_i386.deb\n Size/MD5 checksum: 25583596 f0c6d87c849d5384be99dba70d34fb0d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 282728 a6b21a6fc38381b3884b2d2cd052d306\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16836766 be9c22427d5666a80bf96e4c6501ebf7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 54030 125894b7dd2b90ba5f48de2e7f04518b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 1326708 add492f75bb0337e6e69a4afb73114c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 16404432 9411c28cfbb27329417aa28b32de764c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 3170704 6b86d80969e7f62ceaae5ee5af7f1a5c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch3_i386.deb\n Size/MD5 checksum: 279198 92c75044e071977263a20c444ee655d0\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 255464 ad4b1e9a12ca70ebb46a4c0f77bb62bf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 28013676 bacb3a11176542aa961867eaac8539d3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 28181506 d0c75846976e8ebcd8baf1ee64a46414\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 54036 746e70c193f28c412acec61cf63e4572\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 54050 fa3dc6c7671185e9ce4f7a00783990dc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 3081858 970b72442606e4878d77a274d4fa4306\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch3_ia64.deb\n Size/MD5 checksum: 255414 885054343ab6670ce1d90f7bdda61ef2\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 167030 7bce3329b9fc5d10faafecfac21bc70a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 186870 37e9b246abeb84886cd9a6215187f229\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 8309262 893346de1a07ed015320fe333fc41037\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 15653182 1938128d29990cc16bc3f829d3fa1cbf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 6125514 e6842c7aedc7b70d5a4a5d8e624e9627\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 162870 5ebcff098fd97c89bc0f3057f68c3e31\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 54110 9408231d8eb91431b2ca495f1e94f3cb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 54054 ed109dbb8bf134256164d6d07bd061f6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 3413590 6013078ea705dbf5367d284f6ae401a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 154266 e5775b643e07055ec7121815d9316e62\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 186682 9027d5504f2739d64d1bb4111ec5e136\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 15677870 4b5a1f2e56c587a0d470ea17fab07647\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch3_mips.deb\n Size/MD5 checksum: 9075438 02f535440d5018de7b6233b232aa04de\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 9863510 a6c8def78ca64e8e8b6ef10533186d30\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 149960 2e09d53e58663189a043b7d7493cec8e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 5926528 cb0dfe477608a2da181596f9b78ceddc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 155716 76a619c24cc74cfe22ab42f9f2964096\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 54040 affef50872a733868e2e3d58d566993a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 155772 dd2d75f96ee5dd4c7a7ff8250f631649\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 182490 f6be30e57bbff0ecace79826d4474bb3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 5941862 45689ea22cb4ebdfb71936f79e00eebe\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 178194 4baf9d4d2fed0b5e3f12add06fae014b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 3350066 4938243e89da8ace26c47d00bc60acf1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 182706 84024a93ebcd9d394f179c8ee254ef1b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 15053292 024f0d5e1fbaf5c7d5664aca87ac8741\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 54102 d25d6e1de865a3da93959dd8f8034d7f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 6027404 26b3c01fd8f1c798189c1ee5ec44d11c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch3_mipsel.deb\n Size/MD5 checksum: 15030096 69c0f1d1c25f49c3201a0b3edc1873b0\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 16402406 7f918a1714d84f8ccb6aaf1a13fc518e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 17016786 c06998d5b9b3c192bde5ecc4119830a1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 54088 3683bf42ff1af3009202bf4c6a0e30cd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 16626352 37c3c60edcd7f7b22ededfcda073b5a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 251358 20ade66e354f4473ff045bb0e4e2f7c5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 229986 a6996ddd8cd1f5439aecfc4693ab83f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 54036 d451146b15c05d5d630f72a3399a3464\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 253356 69fd6bca694ce1aea2788658eb530d3e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 18348404 6899ee7990a534276f4c98970a05a843\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 3414514 54cad7ae1cd248f0125aa12c9823f0c7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 18293832 2025add962d50482de362ee202f8bb79\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 252806 ed8f3ba9ab6384096d25204af0594ed1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 3392288 02cba07fa4ab35192737f7a40907cf53\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 16969082 d986973f5c4d0e577b169c96ffa0cec4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 15157518 c3ae440ddcd66b9aaa80260824f91967\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 253230 4d2e3ce370d0c3caf798cfee0dfc44d2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 246254 fa91c1654d4f46128856838066eb11bf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch3_powerpc.deb\n Size/MD5 checksum: 252272 5eda39b6177f4e66f082c06a159f5719\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 54058 9e8a26d5500ffcd7a6a29dfac6d570b8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 54032 350d6fe5dcfdefcc6f92e364f0ffba3f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 5401990 4af4cf18cb011bb00bb882f7a03c9a21\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 143264 76db142c20b22a4d0847f6309e0a10da\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 2966014 81cfb914839c4709399e25ffe9eb2cb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 143688 4291bc7d9865c2842a181b22a7992188\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 5661534 8f7661bfe58017b2e3aa2eb9ca3ffadd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 1438796 18d9f041343153cf48f441eeed112885\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 5619704 7213d869d6e23933ae5e55c87fade8f6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 144632 5df45b01064fc7de2106e8b532946cb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_s390.deb\n Size/MD5 checksum: 2942938 7dcac05e6588849c7491ef1004759f39\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 3168126 ef5277a44be4e2fb95d7f7feca1cc568\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 165126 8d82f98016c375c250105791051e3021\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 6411270 7106725061d98e4036d0ebabd01ca7fa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 195102 73419b6d64a68410924a0471f0d3bf62\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 10391364 f35ec6950afc88b69fa814d005b68550\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 54046 dbd49273f393e72c21f056d50f94cf02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 3190444 40bc9af5142779024dea09675f833778\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 194260 80fdc90e470899b21ae831aaa06702b9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 195828 2036f355f29c418602074540bde81c65\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 10693152 7bef279c0e967019fa5e8a07c1eb4019\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 10647534 197798f662b6e4fc55d0f64dcea6eeff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch3_sparc.deb\n Size/MD5 checksum: 54076 8a2d9ac2067a4c8a7b090da06faf4025\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2008-05-01T18:35:14", "published": "2008-05-01T18:35:14", "id": "DEBIAN:DSA-1565-1:0416F", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00139.html", "title": "[SECURITY] [DSA 1565-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-11-11T13:25:38", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2007-6712", "CVE-2008-2137", "CVE-2008-1615"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1588-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nMay 27, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : denial of service\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2007-6712 CVE-2008-1615 CVE-2008-2136 CVE-2008-2137\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may\nlead to a denial of service. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2007-6712\n\n Johannes Bauer discovered an integer overflow condition in the hrtimer\n subsystem on 64-bit systems. This can be exploited by local users to\n trigger a denial of service (DoS) by causing the kernel to execute an\n infinite loop.\n\nCVE-2008-1615\n\n Jan Kratochvil reported a local denial of service condition that\n permits local users on systems running the amd64 flavor kernel\n to cause a system crash.\n\nCVE-2008-2136\n\n Paul Harks discovered a memory leak in the Simple Internet Transition\n (SIT) code used for IPv6 over IPv4 tunnels. This can be exploited\n by remote users to cause a denial of service condition.\n\nCVE-2008-2137\n\n David Miller and Jan Lieskovsky discovered issues with the virtual\n address range checking of mmaped regions on the sparc architecture\n that may be exploited by local users to cause a denial of service.\n\nFor the stable distribution (etch), this problem has been fixed in version\n2.6.18.dfsg.1-18etch5.\n\nBuilds for linux-2.6/s390 and fai-kernels/powerpc were not yet available at\nthe time of this advisory. This advisory will be updated as these builds\nbecome available.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.18etch5\n user-mode-linux 2.6.18-1um-2etch.18etch5\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.dsc\n Size/MD5 checksum: 5672 70da3d3fa9c813c51429d8b5d3b2e8ea\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.dsc\n Size/MD5 checksum: 740 94f5cb267a06c1dec878da90b9f1dd83\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.diff.gz\n Size/MD5 checksum: 5351147 abe5e0484f16f812708afc484e161bc5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.diff.gz\n Size/MD5 checksum: 17351 2f7dba888df3958188615ea041eca743\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.tar.gz\n Size/MD5 checksum: 55660 0538ff4f7178e76ea127ebef056d6b06\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.dsc\n Size/MD5 checksum: 892 be5c0a2ad62acc5172513a9ce287c94c\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 41462358 4a72841c24a18efce23193d77f367fe1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 3718002 4f526d410be4803e0caa37b49447f4d2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 1083076 615903cc33714c0cfa8dbcc48772a939\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 3589354 d3f8c0a58d10ba994aca59ce80317fe8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 54650 0ec7b128e82da0898223888f4fa07e53\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 1592544 f1b06a865148d3ecc897f6f898b9f56a\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 54138 e7252716146d76ec712aa139287db245\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 23532610 9e2eba932bf5b4cbf909da8be17025f0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 54106 b537043ae0a9552a4e6c2d94cf2c2800\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 268424 dbbb97dee4c3070f9cd0172bcdc49ef4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 3027930 4c8fd619b7f8bb0f50e1bf0609e37a20\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 268084 6464e53b77d391c0417013c3b270c59f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 23463090 48ec7662494774ee942a6252fd44e07f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 3052820 51f401e43b054813abfbe1c422713370\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 269742 5c26e5083d2a86ea8ce9c80873fb0d3e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 23845162 28d1de6a26fd663eeb2e3977923575c8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 23484076 c04d5474a002c0c6872b0c0779499e00\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 267482 537e40c1b92217edb912b680b30f8cd8\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 54108 f51956cb9e9c4fcce9d2852cc304c8de\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 54134 07e4c8015b83da692bf2128f73966043\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 16950720 269a05ec2a25fd5e6ce7df4cb5a998c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 3396124 8f57552a6dc82815c1e0881f3d827c20\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 3227466 a28c80ec87bb6b6a7534c36e9a01a8b4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 16906784 c8ba6e5505966c0cbd559e07dc1a95ee\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 54082 a3e4fb024f6242b1761565cdb1a27bab\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 1682832 5bb35f10ad153f7a0e64d0560f36b14b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 3251476 a8994a53f8082ac755c5153f21645cb6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 274250 b632fc76029cda382920bbf17dc70c76\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 3421192 b41a836c46e5fb252989a41785d1374f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 274730 2483995f136e52562556017c2f0d4a96\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 274044 0d460826b9c6fac02574482db7914bd6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 15355064 384131032d56063c896019e39e037a96\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 274730 da10935f2b25722252c68761e5065405\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 54094 292e8525fc3f29d5166365da794cfaef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 1651262 d538be2c0dda417622040c33f34cd237\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 15366488 a3ad9046c3f774dd5097e6982ffe39fa\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_amd64.deb\n Size/MD5 checksum: 5960836 ccceae60cac558233545c4c4cdbe409e\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 54180 fbd9dae1ecda050a0b0734b04db35501\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 7924540 fcc6f7d63d622745a55c4bd9fa066560\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 239248 e9e3b3e13071c64cc7e6f2dd7e15cfdb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 54140 f38cd11a11adfb18ea0aa4de1b08ea39\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 4587314 01782ba5f8d91bee1d77302e9a6a9e61\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 3410452 448786f55f94315700e03bb93b454621\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 234064 c0e792fcc328bedc6583179e5156266e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 7566024 d0423054e62d157a7fc10ad2e27e07a9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 204142 b4a419a3a28fb963c5279d9e9b125705\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 5009344 5613d609c1c046f2b2ba72c6c890c486\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 198814 12c93d0b1d0f0d61ecaf5bfebcf8eb3a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 233122 5bc42539dc40aaa1d81507b5f5a9bf83\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 8870920 3a45be48b3293a9cbe193b0db5ab2d96\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 10996540 34a482a7404b6e48cc4202a3c031e39c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 11398886 13d0d088bbd0e90ba1ade33ee2ded031\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 54136 be5be650e3800c63cedec99e2c7823fa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 11804256 cb47826af75d4ad2e3006ce8ea6ea493\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 195920 3883151884f603b502ed741945ffe3dd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 10548980 c6bf62e7a77bac7a9f13e88934a7edd8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 196764 53581705559a0ff4812e5622633ad987\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 197038 03b0dd0d144eddf69e9cbf4ae9b3c187\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 54114 b399acd2935e12d8580bac5075aca833\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 3021520 2d524cf038836529a4b5b98b527fb2c3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 197926 929a482ee6043c8913e0a02297975d75\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 281128 96055c189ea53e2d36ef2ba928112fda\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 14279136 50f18a8d2410f33d2fa6b3d913d333c8\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 54098 bc1b6debe849f30326190420aaf3bcf8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16336566 f0da95e8ce638a5246ad4d814f5fde09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16375886 6d7a589bdf348d2b883b12dc59d821dc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 280108 03ecf352b9f9808cfad169da68bae00d\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_i386.deb\n Size/MD5 checksum: 5504676 89f5fa03885ee4f737461182eabd709b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 3168146 107659ec75db011516e29d898c3bc63b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 272402 ed55cb5a5a38b9b98ea99afda45fa179\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 283546 645d7a6511ed1edd8d939bcf23a06db0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16404516 342d98b58ac8d8e4e66923a4ce993463\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 280800 53a9b58e467b80f51e9164099ec88e18\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16836824 56389bee0ae2c10099f7e19760c7b89f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 277982 6242067c054616623741facb41be96b7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 54098 4845efdb09aea41ef938c090530335d6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 3148840 26b1b0193f25d457db81ed3893c0d1de\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16467076 aa6cc19fdd8d3c4688ae4ea2c35e667b\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 54084 30945bdfc901629b6f1df13c704e70a7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 272478 0563e7854cbbe484cbe7ba042c89b19c\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5_i386.deb\n Size/MD5 checksum: 25587444 e2c0ff4dc80f241a41f27e415497462c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 1326822 d6eccf90389e1f5fd41653ef2da4060a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 3170850 4d2061539468c3788a8032e5e27aadfb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 14289748 1e8a50868e7dee3bcf4ed7e8469c20ff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 272122 ac3985bf454e339c3a02ee17a4a4104c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 1299688 f3a4ef71801a826f1da151fd12e4be57\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 281326 2b142556dc07fa41dada942fcf36cc8e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16190240 8a63f6a2ac3b6334cbacb99129c76a9d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 3054490 f549787f1b48cf4a7bf5cad359776e72\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16506826 4e0ef2228324c2fc14365a5aaeda0e30\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 54160 8a5f9200a579604b5b44609549d0fec3\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 54132 9c4710a3f9fe303d8fb91b1bc2f26aba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 255602 502b77e416d4146085c986e3f044ef65\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 255496 a1e152ea44a76c0376c0c5308e7eb73f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 28013686 e3a9f2c0f65dbb32ddaef4279f46a02d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 54116 e91729e3a1d6c9e036b34a07d5322ea1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 28181240 a977c1726724712c52209f9448f4a430\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 3082082 d279733263714c558f68651a532950d0\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 54134 22a4791eab8c910e616d157866d53025\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 167044 70a9e850f5b589307c11d793d1ae6402\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 3413738 bacb0e69b1b775b8c107817388179890\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 187064 c5e7a3e6da64281a67676b1f574da751\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 54186 24256be3de335798d64096467935c740\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 8308966 ddf5ee18359c5814b7becca4bb6db245\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 15677882 5ae00f56b380829aa0a497776b0135f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 154386 e901acfcbcc3b5549c30bbe7ce710cc6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 6125594 e396b15e9dcab593e4320236d7ac1572\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 15652934 8abfb40f359d54ac15854b782f8198bc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 9075546 c7bda747c97bd58ecf70afa6fb71a02a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 186748 16d2e8cce7839f20fbf5baa65f07094e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 162974 f9993e3f13a281a749a77e83a2c706cf\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 15053122 38c50780f0382abf544339b0423c86b2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 54160 813b1edc195ae4a98f7c458e432e89ba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 3350138 d4ffd93599f61d99b2f50ed87d31144d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 9863398 71469c0b29659c83f2f4996de5ae855b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 155774 bb807178ae81678f4cea5b64bcd8e0f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 15030230 802e7f15ae2a00d4a3fd99f8d37e48f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 182630 a9e57a79ab1530af02e9b61b81606fa9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 178290 bb9edbbf330c0b465ad37e0e5499b2b2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 54106 3abe49b4366693a69c50a899f3f7eeea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 150042 64a877e7e1680dd1a69317d87888621a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 5941952 71641a79aa2f9869e4608b0df2cc78cc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 182772 e01dad553ee807ba9bd8b4f12275e79d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 155828 d95e8387335c55a5ded2340e8fec68f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 6027796 c1cc067bcd418ae935e8f4a39e96dc78\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 5926602 baf4afb27b59a0b9ef8b548a3f1a80f3\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 3392458 d0e49a4a623d77420317f8e6cec301a6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 229438 bf578fa343cc77237329c34882b4d038\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 18294080 cb7f16ec55e918534e9042e7e0c5ef7c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 3414806 3a901290719800285b63c53e7b9d4109\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 15157308 f605138dd137eb4374139ec0cf79351a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 251522 4f8ef89f851229849bc5a3bc5b19c82b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 252312 e3c7462faede8715dd91b566a58f9b68\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 16969642 0607cea9945592510f5d3fb9f928c68e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 252654 a1a124efec56637b9dfa87c8cd9550cc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 245866 6745e27544fab3eb5aba4a97ebf0fd9a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 16402670 d3b6fdc36ccd744cc0c8956be6176e0b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 17016920 e24f260fac43e592708bb9ba1e707c16\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 253460 8cf63cbc53c6272a748d33b1bd98dfb2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 18349664 4222693f7730b0e6833541ba79afd50e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 253334 e3314d10a9e3160c79a497967f44fbbd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 54160 2b3e2ac3e9367055f4e7669e56583beb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 54112 3199cd9481a91d0def2d149bc0b59c4e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 16626546 e09c228686cb96ce5e56a142a6366e13\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 3190524 3e8e5ea3e72da553d2716dd73f0a5fb7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 10647606 9ec3d7c71c0a503b4294aa780a9fdd09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 54110 f011e208c98ce3aeeaf9dd00ad82b6dd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 6411008 58c2219a0c20105cf239e323da2e0340\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 165004 ebcd3a274a921148a884d50eb71fb2c5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 194096 ce1428b814293647a6e00c947270b813\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 195024 4c4ff026f91be55c689b43a19060620d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 10692826 1053f11e2d543a6c56f9f80f31dc28af\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 54140 46c81fa9576fa5e3ac9200115527f02a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 195748 32499d6fc1f632ec879464002dceb221\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 3168216 d78356180bcbe48cc6ac77a980e08e9d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 10391204 8cb2fa5bd484dff88cab8741035128df\n\n These changes will probably be included in the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2008-05-27T17:12:07", "published": "2008-05-27T17:12:07", "id": "DEBIAN:DSA-1588-1:0FC6B", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00166.html", "title": "[SECURITY] [DSA 1588-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-11-11T13:17:13", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2007-6712", "CVE-2008-2137", "CVE-2008-1615"], "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1588-2 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nMay 30, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : denial of service\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2007-6712 CVE-2008-1615 CVE-2008-2136 CVE-2008-2137\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may\nlead to a denial of service. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2007-6712\n\n Johannes Bauer discovered an integer overflow condition in the hrtimer\n subsystem on 64-bit systems. This can be exploited by local users to\n trigger a denial of service (DoS) by causing the kernel to execute an\n infinite loop.\n\nCVE-2008-1615\n\n Jan Kratochvil reported a local denial of service condition that\n permits local users on systems running the amd64 flavor kernel\n to cause a system crash.\n\nCVE-2008-2136\n\n Paul Harks discovered a memory leak in the Simple Internet Transition\n (SIT) code used for IPv6 over IPv4 tunnels. This can be exploited\n by remote users to cause a denial of service condition.\n\nCVE-2008-2137\n\n David Miller and Jan Lieskovsky discovered issues with the virtual\n address range checking of mmaped regions on the sparc architecture\n that may be exploited by local users to cause a denial of service.\n\nFor the stable distribution (etch), this problem has been fixed in version\n2.6.18.dfsg.1-18etch5.\n\nThis updated advisory adds the linux-2.6 build for s390 and the fai-kernels\nbuild for powerpc which were not yet available at the time of DSA-1588-1.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.18etch5\n user-mode-linux 2.6.18-1um-2etch.18etch5\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.dsc\n Size/MD5 checksum: 5672 70da3d3fa9c813c51429d8b5d3b2e8ea\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.dsc\n Size/MD5 checksum: 740 94f5cb267a06c1dec878da90b9f1dd83\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-18etch5.diff.gz\n Size/MD5 checksum: 5351147 abe5e0484f16f812708afc484e161bc5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.diff.gz\n Size/MD5 checksum: 17351 2f7dba888df3958188615ea041eca743\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5.tar.gz\n Size/MD5 checksum: 55660 0538ff4f7178e76ea127ebef056d6b06\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5.dsc\n Size/MD5 checksum: 892 be5c0a2ad62acc5172513a9ce287c94c\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 41462358 4a72841c24a18efce23193d77f367fe1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 3718002 4f526d410be4803e0caa37b49447f4d2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 1083076 615903cc33714c0cfa8dbcc48772a939\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 3589354 d3f8c0a58d10ba994aca59ce80317fe8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 54650 0ec7b128e82da0898223888f4fa07e53\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-18etch5_all.deb\n Size/MD5 checksum: 1592544 f1b06a865148d3ecc897f6f898b9f56a\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 54138 e7252716146d76ec712aa139287db245\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 23532610 9e2eba932bf5b4cbf909da8be17025f0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 54106 b537043ae0a9552a4e6c2d94cf2c2800\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 268424 dbbb97dee4c3070f9cd0172bcdc49ef4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 3027930 4c8fd619b7f8bb0f50e1bf0609e37a20\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 268084 6464e53b77d391c0417013c3b270c59f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 23463090 48ec7662494774ee942a6252fd44e07f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 3052820 51f401e43b054813abfbe1c422713370\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 269742 5c26e5083d2a86ea8ce9c80873fb0d3e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 23845162 28d1de6a26fd663eeb2e3977923575c8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 23484076 c04d5474a002c0c6872b0c0779499e00\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-18etch5_alpha.deb\n Size/MD5 checksum: 267482 537e40c1b92217edb912b680b30f8cd8\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 54108 f51956cb9e9c4fcce9d2852cc304c8de\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 54134 07e4c8015b83da692bf2128f73966043\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 16950720 269a05ec2a25fd5e6ce7df4cb5a998c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 3396124 8f57552a6dc82815c1e0881f3d827c20\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 3227466 a28c80ec87bb6b6a7534c36e9a01a8b4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 16906784 c8ba6e5505966c0cbd559e07dc1a95ee\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 54082 a3e4fb024f6242b1761565cdb1a27bab\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 1682832 5bb35f10ad153f7a0e64d0560f36b14b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 3251476 a8994a53f8082ac755c5153f21645cb6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 274250 b632fc76029cda382920bbf17dc70c76\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 3421192 b41a836c46e5fb252989a41785d1374f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 274730 2483995f136e52562556017c2f0d4a96\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 274044 0d460826b9c6fac02574482db7914bd6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 15355064 384131032d56063c896019e39e037a96\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 274730 da10935f2b25722252c68761e5065405\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 54094 292e8525fc3f29d5166365da794cfaef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 1651262 d538be2c0dda417622040c33f34cd237\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-18etch5_amd64.deb\n Size/MD5 checksum: 15366488 a3ad9046c3f774dd5097e6982ffe39fa\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_amd64.deb\n Size/MD5 checksum: 5960836 ccceae60cac558233545c4c4cdbe409e\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 54180 fbd9dae1ecda050a0b0734b04db35501\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 7924540 fcc6f7d63d622745a55c4bd9fa066560\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 239248 e9e3b3e13071c64cc7e6f2dd7e15cfdb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 54140 f38cd11a11adfb18ea0aa4de1b08ea39\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 4587314 01782ba5f8d91bee1d77302e9a6a9e61\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 3410452 448786f55f94315700e03bb93b454621\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 234064 c0e792fcc328bedc6583179e5156266e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 7566024 d0423054e62d157a7fc10ad2e27e07a9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 204142 b4a419a3a28fb963c5279d9e9b125705\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 5009344 5613d609c1c046f2b2ba72c6c890c486\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 198814 12c93d0b1d0f0d61ecaf5bfebcf8eb3a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 233122 5bc42539dc40aaa1d81507b5f5a9bf83\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-18etch5_arm.deb\n Size/MD5 checksum: 8870920 3a45be48b3293a9cbe193b0db5ab2d96\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 10996540 34a482a7404b6e48cc4202a3c031e39c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 11398886 13d0d088bbd0e90ba1ade33ee2ded031\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 54136 be5be650e3800c63cedec99e2c7823fa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 11804256 cb47826af75d4ad2e3006ce8ea6ea493\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 195920 3883151884f603b502ed741945ffe3dd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 10548980 c6bf62e7a77bac7a9f13e88934a7edd8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 196764 53581705559a0ff4812e5622633ad987\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 197038 03b0dd0d144eddf69e9cbf4ae9b3c187\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 54114 b399acd2935e12d8580bac5075aca833\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 3021520 2d524cf038836529a4b5b98b527fb2c3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-18etch5_hppa.deb\n Size/MD5 checksum: 197926 929a482ee6043c8913e0a02297975d75\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 281128 96055c189ea53e2d36ef2ba928112fda\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 14279136 50f18a8d2410f33d2fa6b3d913d333c8\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 54098 bc1b6debe849f30326190420aaf3bcf8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16336566 f0da95e8ce638a5246ad4d814f5fde09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16375886 6d7a589bdf348d2b883b12dc59d821dc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 280108 03ecf352b9f9808cfad169da68bae00d\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_i386.deb\n Size/MD5 checksum: 5504676 89f5fa03885ee4f737461182eabd709b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 3168146 107659ec75db011516e29d898c3bc63b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 272402 ed55cb5a5a38b9b98ea99afda45fa179\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 283546 645d7a6511ed1edd8d939bcf23a06db0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16404516 342d98b58ac8d8e4e66923a4ce993463\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 280800 53a9b58e467b80f51e9164099ec88e18\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16836824 56389bee0ae2c10099f7e19760c7b89f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 277982 6242067c054616623741facb41be96b7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 54098 4845efdb09aea41ef938c090530335d6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 3148840 26b1b0193f25d457db81ed3893c0d1de\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16467076 aa6cc19fdd8d3c4688ae4ea2c35e667b\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 54084 30945bdfc901629b6f1df13c704e70a7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 272478 0563e7854cbbe484cbe7ba042c89b19c\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.18etch5_i386.deb\n Size/MD5 checksum: 25587444 e2c0ff4dc80f241a41f27e415497462c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 1326822 d6eccf90389e1f5fd41653ef2da4060a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 3170850 4d2061539468c3788a8032e5e27aadfb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 14289748 1e8a50868e7dee3bcf4ed7e8469c20ff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 272122 ac3985bf454e339c3a02ee17a4a4104c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 1299688 f3a4ef71801a826f1da151fd12e4be57\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 281326 2b142556dc07fa41dada942fcf36cc8e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16190240 8a63f6a2ac3b6334cbacb99129c76a9d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 3054490 f549787f1b48cf4a7bf5cad359776e72\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 16506826 4e0ef2228324c2fc14365a5aaeda0e30\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-18etch5_i386.deb\n Size/MD5 checksum: 54160 8a5f9200a579604b5b44609549d0fec3\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 54132 9c4710a3f9fe303d8fb91b1bc2f26aba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 255602 502b77e416d4146085c986e3f044ef65\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 255496 a1e152ea44a76c0376c0c5308e7eb73f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 28013686 e3a9f2c0f65dbb32ddaef4279f46a02d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 54116 e91729e3a1d6c9e036b34a07d5322ea1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 28181240 a977c1726724712c52209f9448f4a430\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_ia64.deb\n Size/MD5 checksum: 3082082 d279733263714c558f68651a532950d0\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 54134 22a4791eab8c910e616d157866d53025\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 167044 70a9e850f5b589307c11d793d1ae6402\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 3413738 bacb0e69b1b775b8c107817388179890\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 187064 c5e7a3e6da64281a67676b1f574da751\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 54186 24256be3de335798d64096467935c740\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 8308966 ddf5ee18359c5814b7becca4bb6db245\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 15677882 5ae00f56b380829aa0a497776b0135f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 154386 e901acfcbcc3b5549c30bbe7ce710cc6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 6125594 e396b15e9dcab593e4320236d7ac1572\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 15652934 8abfb40f359d54ac15854b782f8198bc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 9075546 c7bda747c97bd58ecf70afa6fb71a02a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 186748 16d2e8cce7839f20fbf5baa65f07094e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-18etch5_mips.deb\n Size/MD5 checksum: 162974 f9993e3f13a281a749a77e83a2c706cf\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 15053122 38c50780f0382abf544339b0423c86b2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 54160 813b1edc195ae4a98f7c458e432e89ba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 3350138 d4ffd93599f61d99b2f50ed87d31144d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 9863398 71469c0b29659c83f2f4996de5ae855b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 155774 bb807178ae81678f4cea5b64bcd8e0f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 15030230 802e7f15ae2a00d4a3fd99f8d37e48f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 182630 a9e57a79ab1530af02e9b61b81606fa9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 178290 bb9edbbf330c0b465ad37e0e5499b2b2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 54106 3abe49b4366693a69c50a899f3f7eeea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 150042 64a877e7e1680dd1a69317d87888621a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 5941952 71641a79aa2f9869e4608b0df2cc78cc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 182772 e01dad553ee807ba9bd8b4f12275e79d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 155828 d95e8387335c55a5ded2340e8fec68f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 6027796 c1cc067bcd418ae935e8f4a39e96dc78\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-18etch5_mipsel.deb\n Size/MD5 checksum: 5926602 baf4afb27b59a0b9ef8b548a3f1a80f3\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 3392458 d0e49a4a623d77420317f8e6cec301a6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 229438 bf578fa343cc77237329c34882b4d038\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 18294080 cb7f16ec55e918534e9042e7e0c5ef7c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 3414806 3a901290719800285b63c53e7b9d4109\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 15157308 f605138dd137eb4374139ec0cf79351a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 251522 4f8ef89f851229849bc5a3bc5b19c82b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 252312 e3c7462faede8715dd91b566a58f9b68\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 16969642 0607cea9945592510f5d3fb9f928c68e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 252654 a1a124efec56637b9dfa87c8cd9550cc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 245866 6745e27544fab3eb5aba4a97ebf0fd9a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 16402670 d3b6fdc36ccd744cc0c8956be6176e0b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 17016920 e24f260fac43e592708bb9ba1e707c16\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 253460 8cf63cbc53c6272a748d33b1bd98dfb2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 18349664 4222693f7730b0e6833541ba79afd50e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 253334 e3314d10a9e3160c79a497967f44fbbd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 54160 2b3e2ac3e9367055f4e7669e56583beb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 54112 3199cd9481a91d0def2d149bc0b59c4e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-18etch5_powerpc.deb\n Size/MD5 checksum: 16626546 e09c228686cb96ce5e56a142a6366e13\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.18etch5_powerpc.deb\n Size/MD5 checksum: 3366930 17db3e15c6d8cf2d8aca17939ca4cc22\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 143830 1b86a1ffa2bf8b743ef2608433a01d19\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 5402208 c05f1464684c5755dfd5c5e91b3cf2d8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 2943090 da0829d97b73d6a03242822237d00694\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 54106 fc387ee63680dc3a38ffd915fecc2fd8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 1438980 c6e90fb394da315b633c09be3f4aa53b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 2966156 d6a5e7edfa9424a613a4da2f54b487c4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 5619846 bebebe67bf3bceefd8730dcb19b8fc0a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 144730 7e2da310413f3224915663349e37f752\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 143378 bb59c0b53f875d201529ae52d310ba56\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 5661458 90e536af2b788da136062798aa933d30\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-18etch5_s390.deb\n Size/MD5 checksum: 54126 ea1dc6ca830658f681a3ce6b66cfc58b\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 3190524 3e8e5ea3e72da553d2716dd73f0a5fb7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 10647606 9ec3d7c71c0a503b4294aa780a9fdd09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 54110 f011e208c98ce3aeeaf9dd00ad82b6dd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 6411008 58c2219a0c20105cf239e323da2e0340\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 165004 ebcd3a274a921148a884d50eb71fb2c5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 194096 ce1428b814293647a6e00c947270b813\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 195024 4c4ff026f91be55c689b43a19060620d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 10692826 1053f11e2d543a6c56f9f80f31dc28af\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 54140 46c81fa9576fa5e3ac9200115527f02a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 195748 32499d6fc1f632ec879464002dceb221\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 3168216 d78356180bcbe48cc6ac77a980e08e9d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-18etch5_sparc.deb\n Size/MD5 checksum: 10391204 8cb2fa5bd484dff88cab8741035128df\n\n These changes will probably be included in the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2008-05-30T21:46:36", "published": "2008-05-30T21:46:36", "id": "DEBIAN:DSA-1588-2:B9B84", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00169.html", "title": "[SECURITY] [DSA 1588-2] New Linux 2.6.18 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:49", "bulletinFamily": "unix", "cvelist": ["CVE-2008-1669", "CVE-2008-1675", "CVE-2008-2136"], "description": "The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. ", "modified": "2008-05-14T22:15:01", "published": "2008-05-14T22:15:01", "id": "FEDORA:M4EMEXAT001099", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 9 Update: kernel-2.6.25.3-18.fc9", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2020-07-08T23:33:59", "bulletinFamily": "unix", "cvelist": ["CVE-2008-2136", "CVE-2007-6282", "CVE-2008-2826", "CVE-2008-0598", "CVE-2007-6712", "CVE-2008-2137", "CVE-2008-1615", "CVE-2008-2365", "CVE-2008-2729", "CVE-2008-2358", "CVE-2008-2750", "CVE-2008-2148", "CVE-2008-1673"], "description": "Dirk Nehring discovered that the IPsec protocol stack did not correctly \nhandle fragmented ESP packets. A remote attacker could exploit this to \ncrash the system, leading to a denial of service. (CVE-2007-6282)\n\nJohannes Bauer discovered that the 64bit kernel did not correctly handle \nhrtimer updates. A local attacker could request a large expiration value \nand cause the system to hang, leading to a denial of service. \n(CVE-2007-6712)\n\nTavis Ormandy discovered that the ia32 emulation under 64bit kernels did \nnot fully clear uninitialized data. A local attacker could read private \nkernel memory, leading to a loss of privacy. (CVE-2008-0598)\n\nJan Kratochvil discovered that PTRACE did not correctly handle certain \ncalls when running under 64bit kernels. A local attacker could exploit this \nto crash the system, leading to a denial of service. (CVE-2008-1615)\n\nWei Wang discovered that the ASN.1 decoding routines in CIFS and SNMP NAT \ndid not correctly handle certain length values. Remote attackers could \nexploit this to execute arbitrary code or crash the system. (CVE-2008-1673)\n\nPaul Marks discovered that the SIT interfaces did not correctly manage \nallocated memory. A remote attacker could exploit this to fill all \navailable memory, leading to a denial of service. (CVE-2008-2136)\n\nDavid Miller and Jan Lieskovsky discovered that the Sparc kernel did not \ncorrectly range-check memory regions allocated with mmap. A local attacker \ncould exploit this to crash the system, leading to a denial of service. \n(CVE-2008-2137)\n\nThe sys_utimensat system call did not correctly check file permissions in \ncertain situations. A local attacker could exploit this to modify the file \ntimes of arbitrary files which could lead to a denial of service. \n(CVE-2008-2148)\n\nBrandon Edwards discovered that the DCCP system in the kernel did not \ncorrectly check feature lengths. A remote attacker could exploit this to \nexecute arbitrary code. (CVE-2008-2358)\n\nA race condition was discovered between ptrace and utrace in the kernel. A \nlocal attacker could exploit this to crash the system, leading to a denial \nof service. (CVE-2008-2365)\n\nThe copy_to_user routine in the kernel did not correctly clear memory \ndestination addresses when running on 64bit kernels. A local attacker could \nexploit this to gain access to sensitive kernel memory, leading to a loss \nof privacy. (CVE-2008-2729)\n\nThe PPP over L2TP routines in the kernel did not correctly handle certain \nmessages. A remote attacker could send a specially crafted packet that \ncould crash the system or execute arbitrary code. (CVE-2008-2750)\n\nGabriel Campana discovered that SCTP routines did not correctly check for \nlarge addresses. A local user could exploit this to allocate all available \nmemory, leading to a denial of service. (CVE-2008-2826)", "edition": 5, "modified": "2008-07-15T00:00:00", "published": "2008-07-15T00:00:00", "id": "USN-625-1", "href": "https://ubuntu.com/security/notices/USN-625-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T00:25:44", "bulletinFamily": "unix", "cvelist": ["CVE-2008-3272", "CVE-2008-0598", "CVE-2008-2931", "CVE-2008-3275", "CVE-2008-2812"], "description": "It was discovered that there were multiple NULL-pointer function \ndereferences in the Linux kernel terminal handling code. A local attacker \ncould exploit this to execute arbitrary code as root, or crash the system, \nleading to a denial of service. (CVE-2008-2812)\n\nThe do_change_type routine did not correctly validation administrative \nusers. A local attacker could exploit this to block mount points or cause \nprivate mounts to be shared, leading to denial of service or a possible \nloss of privacy. (CVE-2008-2931)\n\nTobias Klein discovered that the OSS interface through ALSA did not \ncorrectly validate the device number. A local attacker could exploit this \nto access sensitive kernel memory, leading to a denial of service or a loss \nof privacy. (CVE-2008-3272)\n\nZoltan Sogor discovered that new directory entries could be added to \nalready deleted directories. A local attacker could exploit this, filling \nup available memory and disk space, leading to a denial of service. \n(CVE-2008-3275)\n\nIn certain situations, the fix for CVE-2008-0598 from USN-623-1 was causing \ninfinite loops in the writev syscall. This update corrects the mistake. We \napologize for the inconvenience.", "edition": 5, "modified": "2008-08-25T00:00:00", "published": "2008-08-25T00:00:00", "id": "USN-637-1", "href": "https://ubuntu.com/security/notices/USN-637-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-09T01:31:50", "bulletinFamily": "unix", "cvelist": ["CVE-2007-5904", "CVE-2008-1294", "CVE-2008-1669", "CVE-2008-1375", "CVE-2008-0007", "CVE-2007-4571", "CVE-2007-6694"], "description": "It was discovered that the ALSA /proc interface did not write the \ncorrect number of bytes when reporting memory allocations. A local \nattacker might be able to access sensitive kernel memory, leading to \na loss of privacy. (CVE-2007-4571)\n\nMultiple buffer overflows were discovered in the handling of CIFS \nfilesystems. A malicious CIFS server could cause a client system crash \nor possibly execute arbitrary code with kernel privileges. (CVE-2007-5904)\n\nIt was discovered that PowerPC kernels did not correctly handle reporting \ncertain system details. By requesting a specific set of information, \na local attacker could cause a system crash resulting in a denial \nof service. (CVE-2007-6694)\n\nIt was discovered that some device driver fault handlers did not \ncorrectly verify memory ranges. A local attacker could exploit this \nto access sensitive kernel memory, possibly leading to a loss of privacy. \n(CVE-2008-0007)\n\nIt was discovered that CPU resource limits could be bypassed. \nA malicious local user could exploit this to avoid administratively \nimposed resource limits. (CVE-2008-1294)\n\nA race condition was discovered between dnotify fcntl() and close() in \nthe kernel. If a local attacker performed malicious dnotify requests, \nthey could cause memory consumption leading to a denial of service, \nor possibly send arbitrary signals to any process. (CVE-2008-1375)\n\nOn SMP systems, a race condition existed in fcntl(). Local attackers \ncould perform malicious locks, causing system crashes and leading to \na denial of service. (CVE-2008-1669)", "edition": 5, "modified": "2008-06-19T00:00:00", "published": "2008-06-19T00:00:00", "id": "USN-618-1", "href": "https://ubuntu.com/security/notices/USN-618-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}]}