Linux Kernel raw_sendmsg() Unspecified Memory Manipulation
2005-09-09T17:45:55
ID OSVDB:19261 Type osvdb Reporter Al Viro(aviro@redhat.com) Modified 2005-09-09T17:45:55
Description
Vulnerability Description
Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by an error in the "raw_sendmsg()" function, which may allow a local unprivileged user to read kernel memory contents to obtain sensitive information or on some architectures cause a denial of service by manipulating hardware state, resulting in a loss of confidentiality and/or availability.
Solution Description
Upgrade to kernel version 2.6.13.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Short Description
Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by an error in the "raw_sendmsg()" function, which may allow a local unprivileged user to read kernel memory contents to obtain sensitive information or on some architectures cause a denial of service by manipulating hardware state, resulting in a loss of confidentiality and/or availability.
{"enchantments": {"score": {"value": 4.2, "vector": "NONE", "modified": "2017-04-28T13:20:15"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-2492"]}, {"type": "nessus", "idList": ["FEDORA_2005-905.NASL", "FEDORA_2005-906.NASL", "UBUNTU_USN-178-1.NASL", "MANDRAKE_MDKSA-2005-235.NASL", "REDHAT-RHSA-2005-514.NASL", "CENTOS_RHSA-2005-514.NASL", "MANDRAKE_MDKSA-2005-220.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:9691", "SECURITYVULNS:DOC:10801", "SECURITYVULNS:DOC:10475"]}, {"type": "ubuntu", "idList": ["USN-178-1"]}, {"type": "redhat", "idList": ["RHSA-2005:514"]}, {"type": "centos", "idList": ["CESA-2005:514"]}, {"type": "suse", "idList": ["SUSE-SA:2005:068"]}], "modified": "2017-04-28T13:20:15"}, "vulnersScore": 4.2}, "bulletinFamily": "software", "affectedSoftware": [{"name": "Kernel", "operator": "eq", "version": "2.6.11"}, {"name": "Kernel", "operator": "eq", "version": "2.6.0"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.10"}, {"name": "Kernel", "operator": "eq", "version": "2.6.12.3"}, {"name": "Kernel", "operator": "eq", "version": "2.6.6"}, {"name": "Kernel", "operator": "eq", "version": "2.6.12.2"}, {"name": "Kernel", "operator": "eq", "version": "2.6.5"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.5"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.4"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.2"}, {"name": "Kernel", "operator": "eq", "version": "2.6.13"}, {"name": "Kernel", "operator": "eq", "version": "2.6.10"}, {"name": "Kernel", "operator": "eq", "version": "2.6.3"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.11"}, {"name": "Kernel", "operator": "eq", "version": "2.6.12.4"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.8"}, {"name": "Kernel", "operator": "eq", "version": "2.6.9"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.9"}, {"name": "Kernel", "operator": "eq", "version": "2.6.12.5"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.1"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.7"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.3"}, {"name": "Kernel", "operator": "eq", "version": "2.6.7"}, {"name": "Kernel", "operator": "eq", "version": "2.6.12"}, {"name": "Kernel", "operator": "eq", "version": "2.6.8.1"}, {"name": "Kernel", "operator": "eq", "version": "2.6.12.1"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.12"}, {"name": "Kernel", "operator": "eq", "version": "2.6.8"}, {"name": "Kernel", "operator": "eq", "version": "2.6.4"}, {"name": "Kernel", "operator": "eq", "version": "2.6.12.6"}, {"name": "Kernel", "operator": "eq", "version": "2.6.2"}, {"name": "Kernel", "operator": "eq", "version": "2.6.1"}, {"name": "Kernel", "operator": "eq", "version": "2.6.11.6"}], "references": [], "href": "https://vulners.com/osvdb/OSVDB:19261", "id": "OSVDB:19261", "title": "Linux Kernel raw_sendmsg() Unspecified Memory Manipulation", "history": [], "type": "osvdb", "cvss": {"score": 3.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:PARTIAL/"}, "lastseen": "2017-04-28T13:20:15", "edition": 1, "hash": "bf9be8a40f68442f5c9e779e132bbc92be61376c2c976fa01bdd9185f4e06caa", "objectVersion": "1.2", "reporter": "Al Viro(aviro@redhat.com)", "description": "## Vulnerability Description\nLinux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by an error in the \"raw_sendmsg()\" function, which may allow a local unprivileged user to read kernel memory contents to obtain sensitive information or on some architectures cause a denial of service by manipulating hardware state, resulting in a loss of confidentiality and/or availability.\n## Solution Description\nUpgrade to kernel version 2.6.13.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nLinux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by an error in the \"raw_sendmsg()\" function, which may allow a local unprivileged user to read kernel memory contents to obtain sensitive information or on some architectures cause a denial of service by manipulating hardware state, resulting in a loss of confidentiality and/or availability.\n## References:\nVendor Specific News/Changelog Entry: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1\nVendor Specific News/Changelog Entry: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166830\n[Secunia Advisory ID:17918](https://secuniaresearch.flexerasoftware.com/advisories/17918/)\n[Secunia Advisory ID:16910](https://secuniaresearch.flexerasoftware.com/advisories/16910/)\n[Secunia Advisory ID:17073](https://secuniaresearch.flexerasoftware.com/advisories/17073/)\n[Secunia Advisory ID:16747](https://secuniaresearch.flexerasoftware.com/advisories/16747/)\n[Secunia Advisory ID:16861](https://secuniaresearch.flexerasoftware.com/advisories/16861/)\n[Related OSVDB ID: 19260](https://vulners.com/osvdb/OSVDB:19260)\nRedHat RHSA: RHSA-2005:514\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Dec/0004.html\nISS X-Force ID: 22218\nFrSIRT Advisory: ADV-2005-1701\n[CVE-2005-2492](https://vulners.com/cve/CVE-2005-2492)\nBugtraq ID: 14787\n", "modified": "2005-09-09T17:45:55", "viewCount": 4, "published": "2005-09-09T17:45:55", "cvelist": ["CVE-2005-2492"], "hashmap": [{"key": "affectedSoftware", "hash": "aee8b3e627af548d13cca873fae4c3a5"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "0974bd2370fb056c7ad9a575747dbe87"}, {"key": "cvss", "hash": "22b1844b353effdd54e60bb9fe6edec5"}, {"key": "description", "hash": "0e210dfa0d30c7931216a96974326dcc"}, {"key": "href", "hash": "c3f6ce24d9ee9b585564a3e5ba0893bb"}, {"key": "modified", "hash": "df4bc2fcb84cc1e2248071a301c222a6"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "df4bc2fcb84cc1e2248071a301c222a6"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "0aac859663113f2f5b0eaef5afb87f43"}, {"key": "title", "hash": "9946663b2d9f68c2b41034d64d32c1e0"}, {"key": "type", "hash": "1327ac71f7914948578f08c54f772b10"}]}
{"cve": [{"lastseen": "2019-05-29T18:08:14", "bulletinFamily": "NVD", "description": "The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.", "modified": "2018-10-19T15:33:00", "id": "CVE-2005-2492", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2492", "published": "2005-09-14T19:03:00", "title": "CVE-2005-2492", "type": "cve", "cvss": {"score": 3.6, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:P"}}], "nessus": [{"lastseen": "2019-11-01T02:26:30", "bulletinFamily": "scanner", "description": " - Thu Sep 22 2005 Dave Jones <davej at redhat.com>\n [2.6.12-1.1456_FC4]\n\n - Disable crash driver on Xen kernels.\n\n - Wed Sep 14 2005 Dave Jones <davej at redhat.com>\n [2.6.12-1.1455_FC4]\n\n - Fixes for CVE-2005-2490 and CVE-2005-2492\n\n - Thu Sep 8 2005 Rik van Riel <riel at redhat.com>\n\n - upgrade to a newer Xen snapshot\n\n - exclude Xen TPM bits, since those conflict with\n 2.6.12.5\n\n - enable highmem for Xen kernels (#162226)\n\n - add workaround for glibc bug on VDSO note parsing\n (Roland) (#166984)\n\n - Mon Sep 5 2005 Dave Jones <davej at redhat.com>\n\n - Fix aic7xxx issue with >4GB. (#167049)\n\n - Fri Sep 2 2005 Dave Jones <davej at redhat.com>\n\n - Various post 2.6.13 ACPI updates. (20050902)\n\n - Mon Aug 29 2005 Dave Jones <davej at redhat.com>\n\n - Fix local builds when ", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2005-906.NASL", "href": "https://www.tenable.com/plugins/nessus/19869", "published": "2005-10-05T00:00:00", "title": "Fedora Core 4 : kernel-2.6.12-1.1456_FC4 (2005-906)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2005-906.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19869);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2019/08/02 13:32:24\");\n\n script_xref(name:\"FEDORA\", value:\"2005-906\");\n\n script_name(english:\"Fedora Core 4 : kernel-2.6.12-1.1456_FC4 (2005-906)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Thu Sep 22 2005 Dave Jones <davej at redhat.com>\n [2.6.12-1.1456_FC4]\n\n - Disable crash driver on Xen kernels.\n\n - Wed Sep 14 2005 Dave Jones <davej at redhat.com>\n [2.6.12-1.1455_FC4]\n\n - Fixes for CVE-2005-2490 and CVE-2005-2492\n\n - Thu Sep 8 2005 Rik van Riel <riel at redhat.com>\n\n - upgrade to a newer Xen snapshot\n\n - exclude Xen TPM bits, since those conflict with\n 2.6.12.5\n\n - enable highmem for Xen kernels (#162226)\n\n - add workaround for glibc bug on VDSO note parsing\n (Roland) (#166984)\n\n - Mon Sep 5 2005 Dave Jones <davej at redhat.com>\n\n - Fix aic7xxx issue with >4GB. (#167049)\n\n - Fri Sep 2 2005 Dave Jones <davej at redhat.com>\n\n - Various post 2.6.13 ACPI updates. (20050902)\n\n - Mon Aug 29 2005 Dave Jones <davej at redhat.com>\n\n - Fix local builds when '-' is in the hostname.\n\n - Update ALPS driver to 2.6.13 level.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2005-September/001397.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0b44697c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-xen0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-xen0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-xenU\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-xenU-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:4\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/09/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 4.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC4\", reference:\"kernel-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", reference:\"kernel-debuginfo-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", reference:\"kernel-devel-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", reference:\"kernel-doc-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", reference:\"kernel-smp-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", reference:\"kernel-smp-devel-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", cpu:\"i386\", reference:\"kernel-xen0-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", cpu:\"i386\", reference:\"kernel-xen0-devel-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", cpu:\"i386\", reference:\"kernel-xenU-2.6.12-1.1456_FC4\")) flag++;\nif (rpm_check(release:\"FC4\", cpu:\"i386\", reference:\"kernel-xenU-devel-2.6.12-1.1456_FC4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-devel / kernel-doc / kernel-smp / etc\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-01T02:26:30", "bulletinFamily": "scanner", "description": " - Wed Sep 14 2005 Dave Jones <davej at redhat.com>\n [2.6.12-1.1378_FC3]\n\n - Fixes for CVE-2005-2490 and CVE-2005-2492\n\n - Mon Sep 5 2005 Dave Jones <davej at redhat.com>\n\n - Fix aic7xxx issue with >4GB. (#167049)\n\n - Fri Sep 2 2005 Dave Jones <davej at redhat.com>\n [2.6.12-1.1377_FC3]\n\n - Various post 2.6.13 ACPI updates. (20050902)\n\n - Mon Aug 29 2005 Dave Jones <davej at redhat.com>\n\n - Fix local builds when ", "modified": "2019-11-02T00:00:00", "id": "FEDORA_2005-905.NASL", "href": "https://www.tenable.com/plugins/nessus/19868", "published": "2005-10-05T00:00:00", "title": "Fedora Core 3 : kernel-2.6.12-1.1378_FC3 (2005-905)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2005-905.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19868);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2019/08/02 13:32:24\");\n\n script_xref(name:\"FEDORA\", value:\"2005-905\");\n\n script_name(english:\"Fedora Core 3 : kernel-2.6.12-1.1378_FC3 (2005-905)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Wed Sep 14 2005 Dave Jones <davej at redhat.com>\n [2.6.12-1.1378_FC3]\n\n - Fixes for CVE-2005-2490 and CVE-2005-2492\n\n - Mon Sep 5 2005 Dave Jones <davej at redhat.com>\n\n - Fix aic7xxx issue with >4GB. (#167049)\n\n - Fri Sep 2 2005 Dave Jones <davej at redhat.com>\n [2.6.12-1.1377_FC3]\n\n - Various post 2.6.13 ACPI updates. (20050902)\n\n - Mon Aug 29 2005 Dave Jones <davej at redhat.com>\n\n - Fix local builds when '-' is in the hostname.\n\n - Update ALPS driver to 2.6.13 level\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/announce/2005-September/001396.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c0f4506b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/09/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 3.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC3\", reference:\"kernel-2.6.12-1.1378_FC3\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"kernel-debuginfo-2.6.12-1.1378_FC3\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"kernel-doc-2.6.12-1.1378_FC3\")) flag++;\nif (rpm_check(release:\"FC3\", reference:\"kernel-smp-2.6.12-1.1378_FC3\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-doc / kernel-smp\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-11-03T12:30:43", "bulletinFamily": "scanner", "description": "Oleg Nesterov discovered a local Denial of Service vulnerability in\nthe timer handling. When a non group-leader thread called exec() to\nexecute a different program while an itimer was pending, the timer\nexpiry would signal the old group leader task, which did not exist any\nmore. This caused a kernel panic. This vulnerability only affects\nUbuntu 5.04. (CAN-2005-1913)\n\nAl Viro discovered that the sendmsg() function did not sufficiently\nvalidate its input data. By calling sendmsg() and at the same time\nmodifying the passed message in another thread, he could exploit this\nto execute arbitrary commands with kernel privileges. This only\naffects the amd64 bit platform. (CAN-2005-2490)\n\nAl Viro discovered a vulnerability in the raw_sendmsg() function. By\ncalling this function with specially crafted arguments, a local\nattacker could either read kernel memory contents (leading to\ninformation disclosure) or manipulate the hardware state by reading\ncertain IO ports. This vulnerability only affects Ubuntu 5.04.\n(CAN-2005-2492)\n\nJan Blunck discovered a Denial of Service vulnerability in the procfs\ninterface of the SCSI driver. By repeatedly reading\n/proc/scsi/sg/devices, a local attacker could eventually exhaust\nkernel memory. (CAN-2005-2800)\n\nA flaw was discovered in the handling of extended attributes on ext2\nand ext3 file systems. Under certain condidions, this could prevent\nthe enforcement of Access Control Lists, which eventually could lead\nto information disclosure, unauthorized program execution, or\nunauthorized data modification. This does not affect the standard Unix\npermissions. (CAN-2005-2801)\n\nChad Walstrom discovered a Denial of Service in the ipt_recent module,\nwhich can be used in netfilter (Firewall configuration). A remote\nattacker could exploit this to crash the kernel by sending certain\npackets (such as an SSH brute-force attack) to a host which uses the\n", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-178-1.NASL", "href": "https://www.tenable.com/plugins/nessus/20588", "published": "2006-01-15T00:00:00", "title": "Ubuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-178-1)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-178-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20588);\n script_version(\"1.20\");\n script_cvs_date(\"Date: 2019/08/02 13:33:00\");\n\n script_cve_id(\"CVE-2005-1913\", \"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2800\", \"CVE-2005-2801\", \"CVE-2005-2872\");\n script_xref(name:\"USN\", value:\"178-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.04 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities (USN-178-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Oleg Nesterov discovered a local Denial of Service vulnerability in\nthe timer handling. When a non group-leader thread called exec() to\nexecute a different program while an itimer was pending, the timer\nexpiry would signal the old group leader task, which did not exist any\nmore. This caused a kernel panic. This vulnerability only affects\nUbuntu 5.04. (CAN-2005-1913)\n\nAl Viro discovered that the sendmsg() function did not sufficiently\nvalidate its input data. By calling sendmsg() and at the same time\nmodifying the passed message in another thread, he could exploit this\nto execute arbitrary commands with kernel privileges. This only\naffects the amd64 bit platform. (CAN-2005-2490)\n\nAl Viro discovered a vulnerability in the raw_sendmsg() function. By\ncalling this function with specially crafted arguments, a local\nattacker could either read kernel memory contents (leading to\ninformation disclosure) or manipulate the hardware state by reading\ncertain IO ports. This vulnerability only affects Ubuntu 5.04.\n(CAN-2005-2492)\n\nJan Blunck discovered a Denial of Service vulnerability in the procfs\ninterface of the SCSI driver. By repeatedly reading\n/proc/scsi/sg/devices, a local attacker could eventually exhaust\nkernel memory. (CAN-2005-2800)\n\nA flaw was discovered in the handling of extended attributes on ext2\nand ext3 file systems. Under certain condidions, this could prevent\nthe enforcement of Access Control Lists, which eventually could lead\nto information disclosure, unauthorized program execution, or\nunauthorized data modification. This does not affect the standard Unix\npermissions. (CAN-2005-2801)\n\nChad Walstrom discovered a Denial of Service in the ipt_recent module,\nwhich can be used in netfilter (Firewall configuration). A remote\nattacker could exploit this to crash the kernel by sending certain\npackets (such as an SSH brute-force attack) to a host which uses the\n'recent' module. (CAN-2005-2802).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-5-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-5-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/09/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-doc-2.6.8.1\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-386\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-686\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-686-smp\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-generic\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-k8\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-k8-smp\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-5-amd64-xeon\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-386\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-686\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-686-smp\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-generic\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-k8\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-k8-smp\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-5-amd64-xeon\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-patch-debian-2.6.8.1\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-source-2.6.8.1\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-tree-2.6.8.1\", pkgver:\"2.6.8.1-16.22\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-doc-2.6.10\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-386\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-686\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-686-smp\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-generic\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-k8\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-k8-smp\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-5-amd64-xeon\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-386\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-686\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-686-smp\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-generic\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-k8\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-k8-smp\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-5-amd64-xeon\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-patch-ubuntu-2.6.10\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-source-2.6.10\", pkgver:\"2.6.10-34.5\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-tree-2.6.10\", pkgver:\"2.6.10-34.5\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.10 / linux-doc-2.6.8.1 / linux-headers-2.6 / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-11-01T02:54:58", "bulletinFamily": "scanner", "description": "Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\nand corrected in this update :\n\nA stack-based buffer overflow in the sendmsg function call in versions\nprior to 2.6.13.1 allow local users to execute arbitrary code by\ncalling sendmsg and modifying the message contents in another thread\n(CVE-2005-2490).\n\nThe raw_sendmsg function in versions prior to 2.6.13.1 allow local\nusers to cause a DoS (change hardware state) or read from arbitrary\nmemory via crafted input (CVE-2005-2492).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly\nperform certain tests when the jiffies value is greater than LONG_MAX,\nwhich can cause ipt_recent netfilter rules to block too early\n(CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local\nusers to cause a DoS (oops from null dereference) via fput in a 32bit\nioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\nfunction on 64-bit systems (CVE-2005-3044).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\nvia a userspace process that issues a USB Request Block (URB) to a USB\ndevice and terminates before the URB is finished, which leads to a\nstale pointer reference (CVE-2005-3055).\n\ndrm.c in version 2.6.13 and earlier creates a debug file in sysfs with\nworld-readable and world-writable permissions, allowing local users to\nenable DRM debugging and obtain sensitive information (CVE-2005-3179).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear\nmemory from a previously used packet whose length is increased,\nallowing remote attackers to obtain sensitive information\n(CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use\nan incorrect function to free names_cache memory, preventing the\nmemory from being tracked by AUDITSYSCALL code and leading to a memory\nleak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use\ncertain IOCTLs on terminals of other users and gain privileges\n(CVE-2005-3257).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\nrunning on SMP systems, allows local users to cause a DoS (null\ndereference) by causing a connection timer to expire while the\nconnection table is being flushed before the appropriate lock is\nacquired (CVE-2005-3274).\n\nThe provided packages are patched to fix these vulnerabilities. All\nusers are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate", "modified": "2019-11-02T00:00:00", "id": "MANDRAKE_MDKSA-2005-235.NASL", "href": "https://www.tenable.com/plugins/nessus/20466", "published": "2006-01-15T00:00:00", "title": "Mandrake Linux Security Advisory : kernel (MDKSA-2005:235)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2005:235. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20466);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2019/08/02 13:32:48\");\n\n script_cve_id(\"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2873\", \"CVE-2005-3044\", \"CVE-2005-3055\", \"CVE-2005-3179\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3274\");\n script_xref(name:\"MDKSA\", value:\"2005:235\");\n\n script_name(english:\"Mandrake Linux Security Advisory : kernel (MDKSA-2005:235)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\nand corrected in this update :\n\nA stack-based buffer overflow in the sendmsg function call in versions\nprior to 2.6.13.1 allow local users to execute arbitrary code by\ncalling sendmsg and modifying the message contents in another thread\n(CVE-2005-2490).\n\nThe raw_sendmsg function in versions prior to 2.6.13.1 allow local\nusers to cause a DoS (change hardware state) or read from arbitrary\nmemory via crafted input (CVE-2005-2492).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly\nperform certain tests when the jiffies value is greater than LONG_MAX,\nwhich can cause ipt_recent netfilter rules to block too early\n(CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local\nusers to cause a DoS (oops from null dereference) via fput in a 32bit\nioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\nfunction on 64-bit systems (CVE-2005-3044).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\nvia a userspace process that issues a USB Request Block (URB) to a USB\ndevice and terminates before the URB is finished, which leads to a\nstale pointer reference (CVE-2005-3055).\n\ndrm.c in version 2.6.13 and earlier creates a debug file in sysfs with\nworld-readable and world-writable permissions, allowing local users to\nenable DRM debugging and obtain sensitive information (CVE-2005-3179).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear\nmemory from a previously used packet whose length is increased,\nallowing remote attackers to obtain sensitive information\n(CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use\nan incorrect function to free names_cache memory, preventing the\nmemory from being tracked by AUDITSYSCALL code and leading to a memory\nleak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use\ncertain IOCTLs on terminals of other users and gain privileges\n(CVE-2005-3257).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\nrunning on SMP systems, allows local users to cause a DoS (null\ndereference) by causing a connection timer to expire while the\nconnection table is being flushed before the appropriate lock is\nacquired (CVE-2005-3274).\n\nThe provided packages are patched to fix these vulnerabilities. All\nusers are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at :\n\nhttp://www.mandriva.com/en/security/kernelupdate\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-i586-up-1GB-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-smp-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-source-stripped-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xbox-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xen0-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:kernel-xenU-2.6.12.14mdk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2006\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-i586-up-1GB-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-i686-up-4GB-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-smp-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-source-2.6-2.6.12-14mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", reference:\"kernel-source-stripped-2.6-2.6.12-14mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xbox-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xen0-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK2006.0\", cpu:\"i386\", reference:\"kernel-xenU-2.6.12.14mdk-1-1mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-11-01T02:15:03", "bulletinFamily": "scanner", "description": "Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 4. This is the\nsecond regular update.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the second regular kernel update to Red Hat Enterprise Linux\n4.\n\nNew features introduced in this update include: - Audit support -\nsystemtap - kprobes, relayfs - Keyring support - iSCSI Initiator -\niscsi_sfnet 4:0.1.11-1 - Device mapper multipath support - Intel dual\ncore support - esb2 chipset support - Increased exec-shield coverage -\nDirty page tracking for HA systems - Diskdump -- allow partial\ndiskdumps and directing to swap\n\nThere were several bug fixes in various parts of the kernel. The\nongoing effort to resolve these problems has resulted in a marked\nimprovement in the reliability and scalability of Red Hat Enterprise\nLinux 4.\n\nThe following security bugs were fixed in this update, detailed below\nwith corresponding CAN names available from the Common Vulnerabilities\nand Exposures project (cve.mitre.org) :\n\n - flaws in ptrace() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-0756, CVE-2005-1761, CVE-2005-1762,\n CVE-2005-1763)\n\n - flaws in IPSEC network handling that allowed a local\n user to cause a denial of service or potentially gain\n privileges (CVE-2005-2456, CVE-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2490)\n\n - a flaw in sendmsg() syscall handling that allowed a\n local user to cause a denial of service by altering\n hardware state (CVE-2005-2492)\n\n - a flaw that prevented the topdown allocator from\n allocating mmap areas all the way down to address zero\n (CVE-2005-1265)\n\n - flaws dealing with keyrings that could cause a local\n denial of service (CVE-2005-2098, CVE-2005-2099)\n\n - a flaw in the 4GB split patch that could allow a local\n denial of service (CVE-2005-2100)\n\n - a xattr sharing bug in the ext2 and ext3 file systems\n that could cause default ACLs to disappear\n (CVE-2005-2801)\n\n - a flaw in the ipt_recent module on 64-bit architectures\n which could allow a remote denial of service\n (CVE-2005-2872)\n\nThe following device drivers have been upgraded to new versions :\n\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2 qla2200 ---------\n8.00.00b21-k to 8.01.00b5-rh2 qla2300 --------- 8.00.00b21-k to\n8.01.00b5-rh2 qla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2 qla2xxx\n--------- 8.00.00b21-k to 8.01.00b5-rh2 qla6312 --------- 8.00.00b21-k\nto 8.01.00b5-rh2 megaraid_mbox --- 2.20.4.5 to 2.20.4.6 megaraid_mm\n----- 2.20.2.5 to 2.20.2.6 lpfc ------------ 0:8.0.16.6_x2 to\n0:8.0.16.17 cciss ----------- 2.6.4 to 2.6.6 ipw2100 --------- 1.0.3\nto 1.1.0 tg3 ------------- 3.22-rh to 3.27-rh e100 ------------\n3.3.6-k2-NAPI to 3.4.8-k2-NAPI e1000 ----------- 5.6.10.1-k2-NAPI to\n6.0.54-k2-NAPI 3c59x ----------- LK1.1.19 mptbase --------- 3.01.16 to\n3.02.18 ixgb ------------ 1.0.66 to 1.0.95-k2-NAPI libata ----------\n1.10 to 1.11 sata_via -------- 1.0 to 1.1 sata_ahci ------- 1.00 to\n1.01 sata_qstor ------ 0.04 sata_sil -------- 0.8 to 0.9 sata_svw\n-------- 1.05 to 1.06 s390: crypto ---- 1.31 to 1.57 s390: zfcp ------\ns390: CTC-MPC --- s390: dasd ------- s390: cio ------- s390: qeth\n------\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2005-514.NASL", "href": "https://www.tenable.com/plugins/nessus/21943", "published": "2006-07-05T00:00:00", "title": "CentOS 4 : kernel (CESA-2005:514)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:514 and \n# CentOS Errata and Security Advisory 2005:514 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21943);\n script_version(\"1.18\");\n script_cvs_date(\"Date: 2019/10/25 13:36:02\");\n\n script_cve_id(\"CVE-2005-0756\", \"CVE-2005-1265\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1763\", \"CVE-2005-2098\", \"CVE-2005-2099\", \"CVE-2005-2100\", \"CVE-2005-2456\", \"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2555\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3105\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-4886\", \"CVE-2006-5871\");\n script_xref(name:\"RHSA\", value:\"2005:514\");\n\n script_name(english:\"CentOS 4 : kernel (CESA-2005:514)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 4. This is the\nsecond regular update.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the second regular kernel update to Red Hat Enterprise Linux\n4.\n\nNew features introduced in this update include: - Audit support -\nsystemtap - kprobes, relayfs - Keyring support - iSCSI Initiator -\niscsi_sfnet 4:0.1.11-1 - Device mapper multipath support - Intel dual\ncore support - esb2 chipset support - Increased exec-shield coverage -\nDirty page tracking for HA systems - Diskdump -- allow partial\ndiskdumps and directing to swap\n\nThere were several bug fixes in various parts of the kernel. The\nongoing effort to resolve these problems has resulted in a marked\nimprovement in the reliability and scalability of Red Hat Enterprise\nLinux 4.\n\nThe following security bugs were fixed in this update, detailed below\nwith corresponding CAN names available from the Common Vulnerabilities\nand Exposures project (cve.mitre.org) :\n\n - flaws in ptrace() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-0756, CVE-2005-1761, CVE-2005-1762,\n CVE-2005-1763)\n\n - flaws in IPSEC network handling that allowed a local\n user to cause a denial of service or potentially gain\n privileges (CVE-2005-2456, CVE-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2490)\n\n - a flaw in sendmsg() syscall handling that allowed a\n local user to cause a denial of service by altering\n hardware state (CVE-2005-2492)\n\n - a flaw that prevented the topdown allocator from\n allocating mmap areas all the way down to address zero\n (CVE-2005-1265)\n\n - flaws dealing with keyrings that could cause a local\n denial of service (CVE-2005-2098, CVE-2005-2099)\n\n - a flaw in the 4GB split patch that could allow a local\n denial of service (CVE-2005-2100)\n\n - a xattr sharing bug in the ext2 and ext3 file systems\n that could cause default ACLs to disappear\n (CVE-2005-2801)\n\n - a flaw in the ipt_recent module on 64-bit architectures\n which could allow a remote denial of service\n (CVE-2005-2872)\n\nThe following device drivers have been upgraded to new versions :\n\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2 qla2200 ---------\n8.00.00b21-k to 8.01.00b5-rh2 qla2300 --------- 8.00.00b21-k to\n8.01.00b5-rh2 qla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2 qla2xxx\n--------- 8.00.00b21-k to 8.01.00b5-rh2 qla6312 --------- 8.00.00b21-k\nto 8.01.00b5-rh2 megaraid_mbox --- 2.20.4.5 to 2.20.4.6 megaraid_mm\n----- 2.20.2.5 to 2.20.2.6 lpfc ------------ 0:8.0.16.6_x2 to\n0:8.0.16.17 cciss ----------- 2.6.4 to 2.6.6 ipw2100 --------- 1.0.3\nto 1.1.0 tg3 ------------- 3.22-rh to 3.27-rh e100 ------------\n3.3.6-k2-NAPI to 3.4.8-k2-NAPI e1000 ----------- 5.6.10.1-k2-NAPI to\n6.0.54-k2-NAPI 3c59x ----------- LK1.1.19 mptbase --------- 3.01.16 to\n3.02.18 ixgb ------------ 1.0.66 to 1.0.95-k2-NAPI libata ----------\n1.10 to 1.11 sata_via -------- 1.0 to 1.1 sata_ahci ------- 1.00 to\n1.01 sata_qstor ------ 0.04 sata_sil -------- 0.8 to 0.9 sata_svw\n-------- 1.05 to 1.06 s390: crypto ---- 1.31 to 1.57 s390: zfcp ------\ns390: CTC-MPC --- s390: dasd ------- s390: cio ------- s390: qeth\n------\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2005-October/012244.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cea8ff41\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/06/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"ia64\", reference:\"kernel-2.6.9-22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"ia64\", reference:\"kernel-devel-2.6.9-22.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"ia64\", reference:\"kernel-doc-2.6.9-22.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-11-01T03:20:11", "bulletinFamily": "scanner", "description": "Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 4. This is the\nsecond regular update.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the second regular kernel update to Red Hat Enterprise Linux\n4.\n\nNew features introduced in this update include: - Audit support -\nsystemtap - kprobes, relayfs - Keyring support - iSCSI Initiator -\niscsi_sfnet 4:0.1.11-1 - Device mapper multipath support - Intel dual\ncore support - esb2 chipset support - Increased exec-shield coverage -\nDirty page tracking for HA systems - Diskdump -- allow partial\ndiskdumps and directing to swap\n\nThere were several bug fixes in various parts of the kernel. The\nongoing effort to resolve these problems has resulted in a marked\nimprovement in the reliability and scalability of Red Hat Enterprise\nLinux 4.\n\nThe following security bugs were fixed in this update, detailed below\nwith corresponding CAN names available from the Common Vulnerabilities\nand Exposures project (cve.mitre.org) :\n\n - flaws in ptrace() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-0756, CVE-2005-1761, CVE-2005-1762,\n CVE-2005-1763)\n\n - flaws in IPSEC network handling that allowed a local\n user to cause a denial of service or potentially gain\n privileges (CVE-2005-2456, CVE-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2490)\n\n - a flaw in sendmsg() syscall handling that allowed a\n local user to cause a denial of service by altering\n hardware state (CVE-2005-2492)\n\n - a flaw that prevented the topdown allocator from\n allocating mmap areas all the way down to address zero\n (CVE-2005-1265)\n\n - flaws dealing with keyrings that could cause a local\n denial of service (CVE-2005-2098, CVE-2005-2099)\n\n - a flaw in the 4GB split patch that could allow a local\n denial of service (CVE-2005-2100)\n\n - a xattr sharing bug in the ext2 and ext3 file systems\n that could cause default ACLs to disappear\n (CVE-2005-2801)\n\n - a flaw in the ipt_recent module on 64-bit architectures\n which could allow a remote denial of service\n (CVE-2005-2872)\n\nThe following device drivers have been upgraded to new versions :\n\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2 qla2200 ---------\n8.00.00b21-k to 8.01.00b5-rh2 qla2300 --------- 8.00.00b21-k to\n8.01.00b5-rh2 qla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2 qla2xxx\n--------- 8.00.00b21-k to 8.01.00b5-rh2 qla6312 --------- 8.00.00b21-k\nto 8.01.00b5-rh2 megaraid_mbox --- 2.20.4.5 to 2.20.4.6 megaraid_mm\n----- 2.20.2.5 to 2.20.2.6 lpfc ------------ 0:8.0.16.6_x2 to\n0:8.0.16.17 cciss ----------- 2.6.4 to 2.6.6 ipw2100 --------- 1.0.3\nto 1.1.0 tg3 ------------- 3.22-rh to 3.27-rh e100 ------------\n3.3.6-k2-NAPI to 3.4.8-k2-NAPI e1000 ----------- 5.6.10.1-k2-NAPI to\n6.0.54-k2-NAPI 3c59x ----------- LK1.1.19 mptbase --------- 3.01.16 to\n3.02.18 ixgb ------------ 1.0.66 to 1.0.95-k2-NAPI libata ----------\n1.10 to 1.11 sata_via -------- 1.0 to 1.1 sata_ahci ------- 1.00 to\n1.01 sata_qstor ------ 0.04 sata_sil -------- 0.8 to 0.9 sata_svw\n-------- 1.05 to 1.06 s390: crypto ---- 1.31 to 1.57 s390: zfcp ------\ns390: CTC-MPC --- s390: dasd ------- s390: cio ------- s390: qeth\n------\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2005-514.NASL", "href": "https://www.tenable.com/plugins/nessus/19989", "published": "2005-10-11T00:00:00", "title": "RHEL 4 : kernel (RHSA-2005:514)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2005:514. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19989);\n script_version (\"1.26\");\n script_cvs_date(\"Date: 2019/10/25 13:36:11\");\n\n script_cve_id(\"CVE-2005-0756\", \"CVE-2005-1265\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1763\", \"CVE-2005-2098\", \"CVE-2005-2099\", \"CVE-2005-2100\", \"CVE-2005-2456\", \"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2555\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3105\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-4886\", \"CVE-2006-5871\");\n script_xref(name:\"RHSA\", value:\"2005:514\");\n\n script_name(english:\"RHEL 4 : kernel (RHSA-2005:514)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 4. This is the\nsecond regular update.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThis is the second regular kernel update to Red Hat Enterprise Linux\n4.\n\nNew features introduced in this update include: - Audit support -\nsystemtap - kprobes, relayfs - Keyring support - iSCSI Initiator -\niscsi_sfnet 4:0.1.11-1 - Device mapper multipath support - Intel dual\ncore support - esb2 chipset support - Increased exec-shield coverage -\nDirty page tracking for HA systems - Diskdump -- allow partial\ndiskdumps and directing to swap\n\nThere were several bug fixes in various parts of the kernel. The\nongoing effort to resolve these problems has resulted in a marked\nimprovement in the reliability and scalability of Red Hat Enterprise\nLinux 4.\n\nThe following security bugs were fixed in this update, detailed below\nwith corresponding CAN names available from the Common Vulnerabilities\nand Exposures project (cve.mitre.org) :\n\n - flaws in ptrace() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-0756, CVE-2005-1761, CVE-2005-1762,\n CVE-2005-1763)\n\n - flaws in IPSEC network handling that allowed a local\n user to cause a denial of service or potentially gain\n privileges (CVE-2005-2456, CVE-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2490)\n\n - a flaw in sendmsg() syscall handling that allowed a\n local user to cause a denial of service by altering\n hardware state (CVE-2005-2492)\n\n - a flaw that prevented the topdown allocator from\n allocating mmap areas all the way down to address zero\n (CVE-2005-1265)\n\n - flaws dealing with keyrings that could cause a local\n denial of service (CVE-2005-2098, CVE-2005-2099)\n\n - a flaw in the 4GB split patch that could allow a local\n denial of service (CVE-2005-2100)\n\n - a xattr sharing bug in the ext2 and ext3 file systems\n that could cause default ACLs to disappear\n (CVE-2005-2801)\n\n - a flaw in the ipt_recent module on 64-bit architectures\n which could allow a remote denial of service\n (CVE-2005-2872)\n\nThe following device drivers have been upgraded to new versions :\n\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2 qla2200 ---------\n8.00.00b21-k to 8.01.00b5-rh2 qla2300 --------- 8.00.00b21-k to\n8.01.00b5-rh2 qla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2 qla2xxx\n--------- 8.00.00b21-k to 8.01.00b5-rh2 qla6312 --------- 8.00.00b21-k\nto 8.01.00b5-rh2 megaraid_mbox --- 2.20.4.5 to 2.20.4.6 megaraid_mm\n----- 2.20.2.5 to 2.20.2.6 lpfc ------------ 0:8.0.16.6_x2 to\n0:8.0.16.17 cciss ----------- 2.6.4 to 2.6.6 ipw2100 --------- 1.0.3\nto 1.1.0 tg3 ------------- 3.22-rh to 3.27-rh e100 ------------\n3.3.6-k2-NAPI to 3.4.8-k2-NAPI e1000 ----------- 5.6.10.1-k2-NAPI to\n6.0.54-k2-NAPI 3c59x ----------- LK1.1.19 mptbase --------- 3.01.16 to\n3.02.18 ixgb ------------ 1.0.66 to 1.0.95-k2-NAPI libata ----------\n1.10 to 1.11 sata_via -------- 1.0 to 1.1 sata_ahci ------- 1.00 to\n1.01 sata_qstor ------ 0.04 sata_sil -------- 0.8 to 0.9 sata_svw\n-------- 1.05 to 1.06 s390: crypto ---- 1.31 to 1.57 s390: zfcp ------\ns390: CTC-MPC --- s390: dasd ------- s390: cio ------- s390: qeth\n------\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-0756\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-1265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-1761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-1762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-1763\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2098\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2099\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2100\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2456\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2490\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2492\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3105\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3275\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-4886\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2006-5871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2005:514\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20, 189);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/06/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/10/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2005-0756\", \"CVE-2005-1265\", \"CVE-2005-1761\", \"CVE-2005-1762\", \"CVE-2005-1763\", \"CVE-2005-2098\", \"CVE-2005-2099\", \"CVE-2005-2100\", \"CVE-2005-2456\", \"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2555\", \"CVE-2005-2801\", \"CVE-2005-2872\", \"CVE-2005-3105\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-4886\", \"CVE-2006-5871\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2005:514\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2005:514\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-2.6.9-22.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-devel-2.6.9-22.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-doc-2.6.9-22.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-2.6.9-22.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-devel-2.6.9-22.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-2.6.9-22.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-devel-2.6.9-22.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-10-29T13:44:45", "bulletinFamily": "scanner", "description": "Multiple vulnerabilities in the Linux 2.6 kernel have been discovered and corrected in this update:\n\nThe kernel on x86_64 platforms does not use a guard page for the 47-bit address page to protect against an AMD K8 bug which allows a local user to cause a DoS (CVE-2005-1764).\n\nThe KEYCTL_JOIN_SESSION_KEYRING operation in versions prior to 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a DoS (semaphore hang) via a new session keyring with an empty name string, a long name string, the key quota reached, or ENOMEM (CVE-2005-2098).\n\nKernels prior to 2.6.12.5 do not properly destroy a keyring that is not instantiated properly, allowing a local user or remote attacker to cause a DoS (oops) via a keyring with a payload that is not empty (CVE-2005-2099).\n\nAn array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c allows local users to cause a DoS (oops or deadlock) and possibly execute arbitrary code (CVE-2005-2456).\n\nThe zisofs driver in versions prior to 2.6.12.5 allows local users and remove attackers to cause a DoS (crash) via a crafted compressed ISO filesystem (CVE-2005-2457).\n\ninflate.c in the zlib routines in versions prior to 2.6.12.5 allow remove attackers to cause a DoS (crash) via a compressed file with 'improper tables' (CVE-2005-2458).\n\nThe huft_build function in inflate.c in the zlib routines in versions prior to 2.6.12.5 returns the wrong value, allowing remote attackers to cause a DoS (crash) via a certain compressed file that leads to a NULL pointer dereference (CVE-2005-2459).\n\nA stack-based buffer overflow in the sendmsg function call in versions prior to 2.6.13.1 allow local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread (CVE-2005-2490).\n\nThe raw_sendmsg function in versions prior to 2.6.13.1 allow local users to cause a DoS (change hardware state) or read from arbitrary memory via crafted input (CVE-2005-2492).\n\nA memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in 2.6.13 and earlier allows a local user to cause a DoS (memory consumption) via certain repeated reads from /proc/scsi/gs/devices file which is not properly handled when the next() interator returns NULL or an error (CVE-2005-2800).\n\nThe ipt_recent module in versions prior to 2.6.12 when running on 64bit processors allows remote attackers to cause a DoS (kernel panic) via certain attacks such as SSH brute force (CVE-2005-2872).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly perform certain tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early (CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local users to cause a DoS (oops from NULL dereference) via fput in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl function on 64-bit systems (CVE-2005-3044).\n\nThe sys_set_mempolicy function in mempolicy.c allows local users to cause a DoS via a negative first argument (CVE-2005-3053).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference (CVE-2005-3055).\n\ndrm.c in version 2.6.13 and earlier creates a debug file in sysfs with world-readable and world-writable permissions, allowing local users to enable DRM debugging and obtain sensitive information (CVE-2005-3179).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, allowing remote attackers to obtain sensitive information (CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an incorrect function to free names_cache memory, preventing the memory from being tracked by AUDITSYSCALL code and leading to a memory leak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use certain IOCTLs on terminals of other users and gain privileges (CVE-2005-3257).\n\nExec does not properly clear posix-timers in multi-threaded environments, which result in a resource leak and could allow a large number of multiple local users to cause a DoS by using more posix- timers than specified by the quota for a single user (CVE-2005-3271).\n\nThe rose_rt_ioctl function rose_route.c in versions prior to 2.6.12 does not properly verify the ndigis argument for a new route, allowing an attacker to trigger array out-of-bounds errors with a large number of digipeats (CVE-2005-3273).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13, when running on SMP systems, allows local users to cause a DoS (NULL dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired (CVE-2005-3274).\n\nThe NAT code in versions prior to 2.6.13 incorrectly declares a variable to be static, allowing remote attackers to cause a DoS (memory corruption) by causing two packets for the same protocol to be NATed at the same time (CVE-2005-3275).\n\nThe sys_get_thread_area function in process.c in versions prior to 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which may allow a user process to obtain sensitive information (CVE-2005-3276).\n\nThe provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at:\n\nhttp://www.mandriva.com/en/security/kernelupdate", "modified": "2014-08-22T00:00:00", "published": "2006-01-15T00:00:00", "id": "MANDRAKE_MDKSA-2005-220.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=20451", "type": "nessus", "title": "MDKSA-2005:220 : kernel", "sourceData": "# @DEPRECATED@\n#\n# This script has been deprecated as the associated update is not\n# for a supported release of Mandrake / Mandriva Linux.\n#\n# Disabled on 2012/09/06.\n#\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# This script was automatically generated from\n# Mandrake Linux Security Advisory MDKSA-2005:220.\n#\n\nif (!defined_func(\"bn_random\")) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20451);\n script_version (\"$Revision: 1.11 $\"); \n script_cvs_date(\"$Date: 2014/08/22 19:56:33 $\");\n\n script_cve_id(\"CVE-2005-1764\", \"CVE-2005-2098\", \"CVE-2005-2099\", \"CVE-2005-2456\", \"CVE-2005-2457\", \"CVE-2005-2458\", \"CVE-2005-2459\", \"CVE-2005-2490\", \"CVE-2005-2492\", \"CVE-2005-2800\", \"CVE-2005-2872\", \"CVE-2005-2873\", \"CVE-2005-3044\", \"CVE-2005-3053\", \"CVE-2005-3055\", \"CVE-2005-3179\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3271\", \"CVE-2005-3273\", \"CVE-2005-3274\", \"CVE-2005-3275\", \"CVE-2005-3276\");\n\n script_name(english:\"MDKSA-2005:220 : kernel\");\n script_summary(english:\"Checks for patch(es) in 'rpm -qa' output\");\n\n script_set_attribute(attribute:\"synopsis\", value: \n\"The remote Mandrake host is missing one or more security-related\npatches.\");\n script_set_attribute(attribute:\"description\", value:\n\"Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\nand corrected in this update:\n\nThe kernel on x86_64 platforms does not use a guard page for the\n47-bit address page to protect against an AMD K8 bug which allows a\nlocal user to cause a DoS (CVE-2005-1764).\n\nThe KEYCTL_JOIN_SESSION_KEYRING operation in versions prior to\n2.6.12.5 contains an error path that does not properly release the\nsession management semaphore, which allows local users or remote\nattackers to cause a DoS (semaphore hang) via a new session keyring\nwith an empty name string, a long name string, the key quota reached,\nor ENOMEM (CVE-2005-2098).\n\nKernels prior to 2.6.12.5 do not properly destroy a keyring that is\nnot instantiated properly, allowing a local user or remote attacker\nto cause a DoS (oops) via a keyring with a payload that is not empty\n(CVE-2005-2099).\n\nAn array index overflow in the xfrm_sk_policy_insert function in\nxfrm_user.c allows local users to cause a DoS (oops or deadlock) and\npossibly execute arbitrary code (CVE-2005-2456).\n\nThe zisofs driver in versions prior to 2.6.12.5 allows local users\nand remove attackers to cause a DoS (crash) via a crafted compressed\nISO filesystem (CVE-2005-2457).\n\ninflate.c in the zlib routines in versions prior to 2.6.12.5 allow\nremove attackers to cause a DoS (crash) via a compressed file with\n'improper tables' (CVE-2005-2458).\n\nThe huft_build function in inflate.c in the zlib routines in versions\nprior to 2.6.12.5 returns the wrong value, allowing remote attackers\nto cause a DoS (crash) via a certain compressed file that leads to a\nNULL pointer dereference (CVE-2005-2459).\n\nA stack-based buffer overflow in the sendmsg function call in\nversions prior to 2.6.13.1 allow local users to execute arbitrary\ncode by calling sendmsg and modifying the message contents in another\nthread (CVE-2005-2490).\n\nThe raw_sendmsg function in versions prior to 2.6.13.1 allow local\nusers to cause a DoS (change hardware state) or read from arbitrary\nmemory via crafted input (CVE-2005-2492).\n\nA memory leak in the seq_file implementation in the SCSI procfs\ninterface (sg.c) in 2.6.13 and earlier allows a local user to cause a\nDoS (memory consumption) via certain repeated reads from\n/proc/scsi/gs/devices file which is not properly handled when the\nnext() interator returns NULL or an error (CVE-2005-2800).\n\nThe ipt_recent module in versions prior to 2.6.12 when running on\n64bit processors allows remote attackers to cause a DoS (kernel\npanic) via certain attacks such as SSH brute force (CVE-2005-2872).\n\nThe ipt_recent module in versions prior to 2.6.12 does not properly\nperform certain tests when the jiffies value is greater than\nLONG_MAX, which can cause ipt_recent netfilter rules to block too\nearly (CVE-2005-2873).\n\nMultiple vulnerabilities in versions prior to 2.6.13.2 allow local\nusers to cause a DoS (oops from NULL dereference) via fput in a 32bit\nioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\nfunction on 64-bit systems (CVE-2005-3044).\n\nThe sys_set_mempolicy function in mempolicy.c allows local users to\ncause a DoS via a negative first argument (CVE-2005-3053).\n\nVersions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\nvia a userspace process that issues a USB Request Block (URB) to a\nUSB device and terminates before the URB is finished, which leads to\na stale pointer reference (CVE-2005-3055).\n\ndrm.c in version 2.6.13 and earlier creates a debug file in sysfs\nwith world-readable and world-writable permissions, allowing local\nusers to enable DRM debugging and obtain sensitive information\n(CVE-2005-3179).\n\nThe Orinoco driver in 2.6.13 and earlier does not properly clear\nmemory from a previously used packet whose length is increased,\nallowing remote attackers to obtain sensitive information\n(CVE-2005-3180).\n\nKernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use\nan incorrect function to free names_cache memory, preventing the\nmemory from being tracked by AUDITSYSCALL code and leading to a\nmemory leak (CVE-2005-3181).\n\nThe VT implementation in version 2.6.12 allows local users to use\ncertain IOCTLs on terminals of other users and gain privileges\n(CVE-2005-3257).\n\nExec does not properly clear posix-timers in multi-threaded\nenvironments, which result in a resource leak and could allow a large\nnumber of multiple local users to cause a DoS by using more posix-\ntimers than specified by the quota for a single user (CVE-2005-3271).\n\nThe rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\ndoes not properly verify the ndigis argument for a new route,\nallowing an attacker to trigger array out-of-bounds errors with a\nlarge number of digipeats (CVE-2005-3273).\n\nA race condition in ip_vs_conn_flush in versions prior to 2.6.13,\nwhen running on SMP systems, allows local users to cause a DoS (NULL\ndereference) by causing a connection timer to expire while the\nconnection table is being flushed before the appropriate lock is\nacquired (CVE-2005-3274).\n\nThe NAT code in versions prior to 2.6.13 incorrectly declares a\nvariable to be static, allowing remote attackers to cause a DoS\n(memory corruption) by causing two packets for the same protocol to\nbe NATed at the same time (CVE-2005-3275).\n\nThe sys_get_thread_area function in process.c in versions prior to\n2.6.12.4 and 2.6.13 does not clear a data structure before copying it\nto userspace, which may allow a user process to obtain sensitive\ninformation (CVE-2005-3276).\n\nThe provided packages are patched to fix these vulnerabilities. All\nusers are encouraged to upgrade to these updated kernels.\n\nTo update your kernel, please follow the directions located at:\n\nhttp://www.mandriva.com/en/security/kernelupdate\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220\");\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package(s).\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_cwe_id(399);\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/11/30\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2006/01/15\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Mandriva Local Security Checks\");\n \n script_copyright(english:\"This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n# Deprecated.\nexit(0, \"The associated update is not currently for a supported release of Mandrake / Mandriva Linux.\");\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/Mandrake/release\")) exit(0, \"The host is not running Mandrake Linux.\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) exit(1, \"Could not get the list of packages.\");\n\nflag = 0;\n\nif (rpm_check(reference:\"kernel-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-i586-up-1GB-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-i686-up-4GB-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-smp-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-source-2.6-2.6.11-13mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-source-stripped-2.6-2.6.11-13mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\nif (rpm_check(reference:\"kernel-xbox-2.6.11.13mdk-1-1mdk\", release:\"MDK10.2\", cpu:\"i386\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse \n{\n if (rpm_exists(rpm:\"kernel-\", release:\"MDK10.2\"))\n {\n set_kb_item(name:\"CVE-2005-1764\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2098\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2099\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2456\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2457\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2458\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2459\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2490\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2492\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2800\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2872\", value:TRUE);\n set_kb_item(name:\"CVE-2005-2873\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3044\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3053\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3055\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3179\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3180\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3181\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3257\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3271\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3273\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3274\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3275\", value:TRUE);\n set_kb_item(name:\"CVE-2005-3276\", value:TRUE);\n }\n\n exit(0, \"The host is not affected.\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "description": "===========================================================\r\nUbuntu Security Notice USN-178-1 September 09, 2005\r\nlinux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities\r\nCAN-2005-1913, CAN-2005-2490, CAN-2005-2492, CAN-2005-2800,\r\nCAN-2005-2801, CAN-2005-2802\r\n===========================================================\r\n\r\nA security issue affects the following Ubuntu releases:\r\n\r\nUbuntu 4.10 (Warty Warthog)\r\nUbuntu 5.04 (Hoary Hedgehog)\r\n\r\nThe following packages are affected:\r\n\r\nlinux-image-2.6.10-5-386\r\nlinux-image-2.6.10-5-686\r\nlinux-image-2.6.10-5-686-smp\r\nlinux-image-2.6.10-5-amd64-generic\r\nlinux-image-2.6.10-5-amd64-k8\r\nlinux-image-2.6.10-5-amd64-k8-smp\r\nlinux-image-2.6.10-5-amd64-xeon\r\nlinux-image-2.6.10-5-itanium\r\nlinux-image-2.6.10-5-itanium-smp\r\nlinux-image-2.6.10-5-k7\r\nlinux-image-2.6.10-5-k7-smp\r\nlinux-image-2.6.10-5-mckinley\r\nlinux-image-2.6.10-5-mckinley-smp\r\nlinux-image-2.6.10-5-power3\r\nlinux-image-2.6.10-5-power3-smp\r\nlinux-image-2.6.10-5-power4\r\nlinux-image-2.6.10-5-power4-smp\r\nlinux-image-2.6.10-5-powerpc\r\nlinux-image-2.6.10-5-powerpc-smp\r\nlinux-image-2.6.8.1-5-386\r\nlinux-image-2.6.8.1-5-686\r\nlinux-image-2.6.8.1-5-686-smp\r\nlinux-image-2.6.8.1-5-amd64-generic\r\nlinux-image-2.6.8.1-5-amd64-k8\r\nlinux-image-2.6.8.1-5-amd64-k8-smp\r\nlinux-image-2.6.8.1-5-amd64-xeon\r\nlinux-image-2.6.8.1-5-k7\r\nlinux-image-2.6.8.1-5-k7-smp\r\nlinux-image-2.6.8.1-5-power3\r\nlinux-image-2.6.8.1-5-power3-smp\r\nlinux-image-2.6.8.1-5-power4\r\nlinux-image-2.6.8.1-5-power4-smp\r\nlinux-image-2.6.8.1-5-powerpc\r\nlinux-image-2.6.8.1-5-powerpc-smp\r\nlinux-patch-debian-2.6.8.1\r\nlinux-patch-ubuntu-2.6.10\r\n\r\nThe problem can be corrected by upgrading the affected package to\r\nversion 2.6.8.1-16.22 (for Ubuntu 4.10), or 2.6.10-34.5 (for Ubuntu\r\n5.04). After a standard system upgrade you need to reboot your\r\ncomputer to effect the necessary changes.\r\n\r\nDetails follow:\r\n\r\nOleg Nesterov discovered a local Denial of Service vulnerability in\r\nthe timer handling. When a non group-leader thread called exec() to\r\nexecute a different program while an itimer was pending, the timer\r\nexpiry would signal the old group leader task, which did not exist any\r\nmore. This caused a kernel panic. This vulnerability only affects\r\nUbuntu 5.04. (CAN-2005-1913)\r\n\r\nAl Viro discovered that the sendmsg() function did not sufficiently\r\nvalidate its input data. By calling sendmsg() and at the same time\r\nmodifying the passed message in another thread, he could exploit this\r\nto execute arbitrary commands with kernel privileges. This only\r\naffects the amd64 bit platform. (CAN-2005-2490)\r\n\r\nAl Viro discovered a vulnerability in the raw_sendmsg() function. By\r\ncalling this function with specially crafted arguments, a local\r\nattacker could either read kernel memory contents (leading to\r\ninformation disclosure) or manipulate the hardware state by reading\r\ncertain IO ports. This vulnerability only affects Ubuntu 5.04.\r\n(CAN-2005-2492)\r\n\r\nJan Blunck discovered a Denial of Service vulnerability in the procfs\r\ninterface of the SCSI driver. By repeatedly reading\r\n/proc/scsi/sg/devices, a local attacker could eventually exhaust\r\nkernel memory. (CAN-2005-2800)\r\n\r\nA flaw was discovered in the handling of extended attributes on ext2\r\nand ext3 file systems. Under certain condidions, this could prevent\r\nthe enforcement of Access Control Lists, which eventually could lead\r\nto information disclosure, unauthorized program execution, or\r\nunauthorized data modification. This does not affect the standard Unix\r\npermissions. (CAN-2005-2801)\r\n\r\nChad Walstrom discovered a Denial of Service in the ipt_recent module,\r\nwhich can be used in netfilter (Firewall configuration). A remote\r\nattacker could exploit this to crash the kernel by sending certain\r\npackets (such as an SSH brute force attack) to a host which uses the\r\n"recent" module. (CAN-2005-2802)\r\n\r\n\r\nUpdated packages for Ubuntu 4.10 (Warty Warthog):\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.22.diff.gz\r\n Size/MD5: 3153574 b93a4715512f8140edb7254661d3ada0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.22.dsc\r\n Size/MD5: 2121 ed803ada3c962e41cfd8bda695f2ae2e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1.orig.tar.gz\r\n Size/MD5: 44728688 79730a3ad4773ba65fab65515369df84\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-doc-2.6.8.1_2.6.8.1-16.22_all.deb\r\n Size/MD5: 6162498 8c15bf8f847edcf1dac2fc71d3d93d0c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-patch-debian-2.6.8.1_2.6.8.1-16.22_all.deb\r\n Size/MD5: 1510900 8f3d8ac833811fa85d85cbe268e51750\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-source-2.6.8.1_2.6.8.1-16.22_all.deb\r\n Size/MD5: 36723722 7d183a5c6bc309dee686999d3508af8e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-tree-2.6.8.1_2.6.8.1-16.22_all.deb\r\n Size/MD5: 309546 98743b819f50f614880908f8ea7ed4d5\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 248980 bee14ce4cd792b501d3435d185a0c4eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 244830 51be43fdeaecfb98f14593a33491de13\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 247846 cfe1256e29610819cb839be4838f3179\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 243256 50fdf047fc49e54a62e1611357da6be1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 3180726 edccc6d4579abb294b1342b0bd9725c1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 14352358 0d4ba51a6389cf12161e037f763deab7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 14829818 7dfc83b2b4cd9b6e776a435f3ac13ef2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 14864762 7aceb7d2fd868bc5c75d9f26b7d2caec\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.22_amd64.deb\r\n Size/MD5: 14686788 166984ba1fafc038bef48988b71f539c\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-386_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 278218 dd5d60b43863fbdabd961f68a44b2864\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 273298 ffd6f2057299c61db47eb796a9c796b6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-686_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 276046 b2733b8df9b8418af583da27a55ad29a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 273554 f1df8510d8b0c72037f3849fbc458de9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-k7_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 276210 81a0a41d45c5e971489f8d38fde2c7ac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 3221368 f0d4b3d1e3df6c7046fbb767dd12e19b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-386_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 15497922 69a88c086ec2aaf01c9e725f29b307c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 16346806 0b528a56199537060f1cd287ae2ddf0b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-686_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 16517346 ebb67b3ea82ce3db26c106f580b1fe05\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 16450256 7747f8438f9075e9f502181a82fec80d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-k7_2.6.8.1-16.22_i386.deb\r\n Size/MD5: 16575234 9a77e01a859130585a1f19c37356e8a2\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 214110 2a71f6bc39dc0e3cd6eb0f5582464330\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power3_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 214740 aad1be7583d13938daaedae8213d0743\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 213668 6f560dd0656d08aa957061b25e9d0b15\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-power4_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 214486 8e872a18a6d21886bd029054583517d0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 214194 7ed062e0d6f6919e1fa190d13d9bbce2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 216420 d3f832d7ead70f5d158fead1962f96ec\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-headers-2.6.8.1-5_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 3298368 cb742594f8973b9579373c326a380913\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 16370564 70a01d32865eaed429ab25f1779554df\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power3_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 15942494 3dafc6823bda2f0a3a39356cfaa3081a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 16356562 892a3432b2b56b0cc43e728074cbb564\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-power4_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 15932662 99a8b0f04eb2b1549262469dae7d736c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 16292994 0205ed5cb025a95d2cf009a2985c2643\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.22_powerpc.deb\r\n Size/MD5: 15975362 f671af6817b8010be009faaf8ad887ed\r\n\r\nUpdated packages for Ubuntu 5.04 (Hoary Hedgehog):\r\n\r\n Source archives:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.5.diff.gz\r\n Size/MD5: 6085053 b0ed04da41cb2ab7765c48bf525d17bc\r\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.5.dsc\r\n Size/MD5: 3145 24cf1603336df0eb9938422e2b54be1f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10.orig.tar.gz\r\n Size/MD5: 46244465 063a64fc0efd9c9901cf07effef1b747\r\n\r\n Architecture independent packages:\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-doc-2.6.10_2.6.10-34.5_all.deb\r\n Size/MD5: 6782128 0348bf5a6fe2b9b70d2ba7b288b64f86\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-source-2.6.10_2.6.10-34.5_all.deb\r\n Size/MD5: 37510628 3c8d717bc6977b445e3b1a80327610eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-tree-2.6.10_2.6.10-34.5_all.deb\r\n Size/MD5: 503674 ceec60f114c7b030c4e0ac518509d398\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 20824 d8370d8429cb2587e29cb43af68c9a33\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 47400 8314f360086cd8735b31ab231e65ac10\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 88892 ca37ffc2a3747f28639110e824236670\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 30012 84e3740ab27024dd8726fd668d2e4f46\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 41240 d69ce367a5cc5883aef7bb72463aad59\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 73598 1f80be784232d0c525f3d9d2e15a72eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 5742 bdd1ac08f9aa4479f31d6a672e070ee0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 34852 de01e83f0b568558248031b89eaef410\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 55180 dba0d48fa0332ad176c6c52e583c16f4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 112982 353b9b8936bbc35c066c26e6161d7ba3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 40812 fe2f7863c9c8df7abb66bcd4c76c8116\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 115708 36a6f64fce7260eb9a81f2eeca0fff3c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 174634 7ab370312a20129c258cafa4d1269664\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 82586 a65116e6cf4439bea981de1ef162813e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 1465894 02324547a232b13aeb59c15eb560d358\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-generic_2.6.10-34.5_amd64.deb\r\n Size/MD5: 285598 3968ad610a87f01030b851e1849d9bfd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8-smp_2.6.10-34.5_amd64.deb\r\n Size/MD5: 282276 6060059958d9e95ae269987832bac878\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-k8_2.6.10-34.5_amd64.deb\r\n Size/MD5: 284466 8333938fb41a208f0a7752ddd1ef471e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-amd64-xeon_2.6.10-34.5_amd64.deb\r\n Size/MD5: 279768 2c86f968ba01f2136497ff55fb28ae6e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.5_amd64.deb\r\n Size/MD5: 6136548 de585f1811aab25459fa6914c153f205\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-generic_2.6.10-34.5_amd64.deb\r\n Size/MD5: 14574394 591d27b114d1d1af00ce666fe9d4a4b2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8-smp_2.6.10-34.5_amd64.deb\r\n Size/MD5: 15121522 c5769c1110baea6152889d711e61bb72\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-k8_2.6.10-34.5_amd64.deb\r\n Size/MD5: 15087422 35a61442feb7a51db9485744f2abca97\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-amd64-xeon_2.6.10-34.5_amd64.deb\r\n Size/MD5: 14960626 f88b1d0208b0671ea7e5f474fa9c420d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.5_amd64.deb\r\n Size/MD5: 1352730 dbf148931f5ad216e9e170b6a1d35087\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 14224 a51e1e901117a35e65fdf6f8236f38e6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 178478 cdfe5fe00257afd1d702f7311b8ee4a6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 174854 592865f33bf2a227ba55df31c84d0ae1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 731032 30bd2a98393f5f42a2b3d90b432dd4b8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 780912 425526852583d6428b1371b26f8e9684\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 150014 1de424583e98267f5a698f5ee63f0b01\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 168132 7595ff0d722ddb8d6c0374650db87816\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 9554 cfe3bda4cb23a39ce72c032c0d5d6757\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 94860 4872c8e77249184bf40455c2d1ccd299\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 45720 466633b016a71cbd2d3d22d7c7db5d9a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 33160 2112c24e9cf4ca8382bc48bddbc4a175\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 55288 8d8dd01f2f7673bbd5ab11b50f5707ef\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 4662 7eaa2da6676926e340016a6a78590166\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 7838 f9f6547061e1fa3032520fdfc528465c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 53794 170f9783a3c3ea060ddca697d13dda94\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 111102 c750209b227e8c5b3111e3f66f010b8e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 10156 1ab786daeec1cde2bc7c926fbc5c3b7f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 60458 bdf0a89367ed8b58ccbfa3c6afe9bb47\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 208568 07980e1d48c960154c3773308cc1fab5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 69254 ddd5bd72c23834862524d2ff1795b38f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 394738 5086b7b18013d69dbcbcb4bfda3e6ed6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 294486 7c06374de4e883232ddf0bf7142f926e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 12072 d27a9b583c99c8507f24fa326b48a2b2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 22652 c85e2301ae1ce78fbc0137070adf5ac0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 28796 95c28547a8fae71fafa411d88b0e307b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 56786 1134da88575b6d1bfb19a24d4c566e92\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 34940 7de24a13ba25e019e12cc554e9814abe\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-amd64-generic-di_2.6.10-34.5_amd64.udeb\r\n Size/MD5: 247454 f4052dea3f739c92a2a92fc69f3f1e4c\r\n\r\n i386 architecture (x86 compatible Intel/AMD)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/acpi-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 18164 caa71092c9fa306cc4a5f6cb5f420367\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 44824 2ef7d247c56685d69ac599c6df0462ce\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 103046 7d9210b1589019a9b569b619598a0328\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 86004 99d70509c0ff8add499b932f2e2c3dc9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 29090 797f973f82b731426e52d87e5f468251\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 39772 ca78183613a6bf2ebdf55af5df909c9b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 71152 19e76fb2fd3c7dc50216881f7f67caee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 5502 0ae2c6b53d7a063b001fa11eebbf4ff2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 31582 80088b8f7058d3377c34d1fcf9e1ea7c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 52938 bae6a18bd10288e4b7ccf11dd16ca6b5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 104454 92488721fbbcfa1c7d7ac5ffa1e1ee16\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 38626 7e258150e3fc923dff018ad11cb17766\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 114512 2d7650ee1a44016e879bdc4ecf0f0813\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 190654 7482512927e32d63ff56ff2084554e9f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 86540 4abace4168752594d1232b3a666e9392\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 1389428 9d099d48fd1b645f83e4575f5b4433c5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-386_2.6.10-34.5_i386.deb\r\n Size/MD5: 313642 bdc80db73640809b25f7ccb52c1ce242\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686-smp_2.6.10-34.5_i386.deb\r\n Size/MD5: 309172 b93a3aa86d091fb56c5aa7de7655a71c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-686_2.6.10-34.5_i386.deb\r\n Size/MD5: 311448 9c687f8489e5d1b4e792cd0200bcc9da\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7-smp_2.6.10-34.5_i386.deb\r\n Size/MD5: 309516 86605c2c686baf1f8559411f2e0dcae6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-k7_2.6.10-34.5_i386.deb\r\n Size/MD5: 311764 0b97921d73997f59f727543703cde4d6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.5_i386.deb\r\n Size/MD5: 6133384 65fb79c603881d0aa48eee5529c14297\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-386_2.6.10-34.5_i386.deb\r\n Size/MD5: 15611772 a3f4169777b8d8df66c469adf91a8dd2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686-smp_2.6.10-34.5_i386.deb\r\n Size/MD5: 16188344 f8cc286f9344f4023c80e49d218ac272\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-686_2.6.10-34.5_i386.deb\r\n Size/MD5: 16606358 64dc1bc6767b8f53e3fd82b5e8ecefb5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7-smp_2.6.10-34.5_i386.deb\r\n Size/MD5: 16295486 271804f204ad0819ffccf21830839908\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-k7_2.6.10-34.5_i386.deb\r\n Size/MD5: 16672310 d21c32323e9fe9dd9ac6ec08824e8120\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.5_i386.deb\r\n Size/MD5: 1347552 2186d2185692f9c484059e36867ea517\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 14076 f81cd40fe15a693589ebffc3b83ad344\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 183174 ace7b3203d01585ad215280f19b87598\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 172736 9a56c6bd18d0b0e7adb154d25fbaba62\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 967824 8e5296af896607829bb134cf0234ab36\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 780722 d82df162f2216d5e921151580f7a341b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 140656 2d72fe65b8775bd98599dc8bc89e4106\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 167960 a360879ae8223bc56111a9304151c932\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 9346 fd35308b07cc73eefa6dfaeb8b46d211\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 89328 3b650f54b04cd18059334a135e5a7b50\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 48128 d412542033ba4859e1c63a938d1e1108\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 30880 2ccda440cf7d29a083eff699a0571618\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 65894 0e316f525515a8681cefbe26f58a8169\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 4504 126b6f44b5f05815d93d4578490d249b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 7752 ca2a476d63f4d82c227fe3b608f17809\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 50776 a7e6dc2cc767d1ccbe22bb8531221568\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 111588 25b3191b7646fbb65325eee15e86c625\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/rtc-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 9894 e85e1e379791186709ad00c679d81302\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 57154 773ad374c344df1c4de8bab813882346\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 241932 191ca683591be80b8e0cfd39b83d6491\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 66232 1ec1f9e21161398608f90f2763e650c5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 436544 1ba0dbda71ff6d3c4350747a93716e46\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 485690 11503cd14dd0f1784c76bebc69028401\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 11472 77f6325c51456c8660637acb1268b682\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 21246 3595c832b3dd85923a815b7e30b4bc07\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 29528 5c41f327cb2bd735b73fb9bfee96512a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 106148 d714bebb0c794f660005f9e9b9047612\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 33824 aa26572579f36dc5a046b268cb348696\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-386-di_2.6.10-34.5_i386.udeb\r\n Size/MD5: 261340 fc89217dfcdc91a252fa5cabf3939ff7\r\n\r\n ia64 architecture (Intel Itanium)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 94098 2a80ea9614971884876c97a367b089a8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 63026 eb91ff4eccd14425bc9e080da4a9b727\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 183100 6124fa5494092eedf2de9d77ed165155\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 54712 70ca01915e8472dca2bc84aab629b1e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 45310 ea3d24ea24c03c54c0a55b5a37d80b61\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 255842 cb60e19a312eb631bc8a2c12dcf30eb7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 17488 e8e3bdecd9823adf439bebf68a41cd62\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 8424 246dec1f8037c73d625077adb7b3fece\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-core-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 103810 aa73b547d8ba6e070589a4152d4e8bb1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 249094 816cef17f6a16b1a03aa8318ea5b63c0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 98122 0df41c845c4ca7ca446cd2d8cd446991\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 273072 c63f2ec506541b487ec421259b8224e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 244398 b527254c172a702f48d92b7f7018d999\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 202578 62b1a9d8433e54087fe87daffabb2f09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 2769928 5fbb5bfe2e2ac6ab85f1e72de0a30162\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-itanium-smp_2.6.10-34.5_ia64.deb\r\n Size/MD5: 256624 6c28afa47c6ec4a5882770bcb03ea3c2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-itanium_2.6.10-34.5_ia64.deb\r\n Size/MD5: 256602 102dc0aa4d4f64785423420824a42961\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-mckinley-smp_2.6.10-34.5_ia64.deb\r\n Size/MD5: 256528 c80eeb25b1a936db38729ce4f3210914\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-mckinley_2.6.10-34.5_ia64.deb\r\n Size/MD5: 256360 bfdbcde050e311bb4a1a8e4afd4c7383\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.5_ia64.deb\r\n Size/MD5: 6179520 93ac5ad8973f31f12c1287d2aa77e2da\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-itanium-smp_2.6.10-34.5_ia64.deb\r\n Size/MD5: 24748600 0ae3877f626fae6afc741c060c6a627a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-itanium_2.6.10-34.5_ia64.deb\r\n Size/MD5: 24718606 dfe79fc86d73424d139b1baf19f15aa7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-mckinley-smp_2.6.10-34.5_ia64.deb\r\n Size/MD5: 24825116 3727ad9af9d2c3b8967a76b327814954\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-mckinley_2.6.10-34.5_ia64.deb\r\n Size/MD5: 24665196 f372db5048299f6b14e5aa0a653cba6f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.5_ia64.deb\r\n Size/MD5: 1354246 a1666f0680f34560f3581a22ad559f1a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 26246 efbd128218c7149f8fb452cb7542108d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 311748 12e1c03bfa16c35c7ca017a1a8280da0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 361304 c2913dad9773a6f3d1c55319e48ee1a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 1783846 29270df596e1010393a65430cd453f11\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 16880 b40444ad6df169a459705d19f7daf1d4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 86890 c7ca24b944a031b663a1db04b2b4c006\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ntfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 109374 ba47d7938accf10b48cdcf0125e18ab1\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/parport-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 55722 dc366aa9197f950583752d29373964fa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 112130 5c699413fee9a5f72f233f196c7ca642\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/plip-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 17806 7dd4b9b8b4a7b5ffc1a6ec1f55336d4b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 116504 ab3cdd780ccd73d6af388c1412a3641a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 284570 4e932af932ccda0aed29ff51de819b0e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 120642 9cfb6bd77d5e0fa690a90ec379c9ea38\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 112292 2406b0ff776db0f01a5bee096af8edb0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 1852148 a47dadba88ae2e56268d44e1113f7429\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 9452 3e12b794dd57550eba7acbf2633f5aed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 69838 0567b0951c01a1b06fc73879258fe688\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 223160 b8334d841c860814565a711eb5daa6a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 65146 ecc9d3fa059005edd29d89fa0d9e42fb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-itanium-smp-di_2.6.10-34.5_ia64.udeb\r\n Size/MD5: 538546 2e24292712ce2548877f293745acb19a\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5)\r\n\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 24052 f655d346a3046cacbeb91014e799ffa8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 24052 9ef94ee93e178676161f3c7127c0b027\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/affs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 24040 3705c9f7a02a9ae2cb23fd93919d1cc9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 58268 50cc94ad8c4fdb18dc82227a5f899ccc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 58278 423cfa986539c4b22c97d0a48768a4c4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/cdrom-core-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 58254 f190009487d6a9b44a980387ce05ac97\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30280 4abec3797af1625157d95913b096ac55\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30280 5417ff56ba6844848747d6d2f2a1bb94\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext2-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30262 1db0fb75463b6f9c310e2567bf95e9af\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 109244 3af7cefac8659b972efa5f0dd9db1141\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 109238 87a604640413ceca5d060f0c567f2f1c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ext3-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 109212 1c1faff4c29d5fa2e1234ea3111cfbac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35386 c10f79f81affd61d21e5bf1af612673a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35390 de155a327f31b7ae1c184c23a08f4c71\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fat-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35376 24487f69581ec9100a2e6df7c0cb10a6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30932 331f492867717ae3938a4109dd8e98eb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30934 7b84118c83e015536f697bbd8a3bf7be\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fb-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 30910 9a1403b9b6bfc6a407548b546810ae5d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 212960 7edaf9bac9e1e06e9b2c0439147dfbc2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 212944 e21d0ccc720b073d0f37392f9983ebb7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firewire-core-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 212918 0b881361f57f6e9bde5bbe7b15ebd1ed\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 6166 5f0c2ddf428d9247c01c32a4275fdea3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 6162 7f0c53cf8ab172eb5b744c6cb26c4e53\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/firmware-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 6154 5814f14f7d8dc42bd292a40872ed1ea2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 43426 3a611b6121ba203ed14939d1a64722e5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 43418 2e2a05ccdcc8efdbab89088bb4a4b2f6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/floppy-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 43418 a035a30831954a8e6b52515272a1181f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 4588 5c143924e1c2300cc85b2baacea6d3e6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 4584 378365a095f54c46be36809edd1d2d74\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/fs-common-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 4588 5f6d20a314a1396798424a0211d0da4b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 66000 2e9a78966d640cbdf731be7ab0952de7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 65994 28b6c9887e0668aa1edc19c69c868866\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/hfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 65996 917d74b8d4f3c0ce10e4e98324a8a92a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 117104 a255940b9318169380397206db7966dc\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 117106 4e48f0dfbc04596849cf62b83dee4806\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ide-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 116854 19b255f942cc154d5a6c37950f7fa17f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 66632 e4537940aef6c2c1ad5b388fdea58da2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 66628 061e2b4caee3bab979a76f96985ad8f4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/input-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 66624 43d53dae2dc5cd760a78c61f8cfe5ebb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 142072 04b41a16405163f07af9184352661983\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 142070 25e450b4b3caa247c9167262d7aedd09\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ipv6-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 142070 65fe1696a5d36b72b2bbc917a818b934\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213954 cf22b3f5f717275ed1dd84bf881d8975\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213978 b77ebf861675978d14ddd940d467f319\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/irda-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213872 a2448811810ac592e91abc51e959b9ee\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 107000 9ac815ac195972c098a0062361522adf\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 107002 166833641f88fa957d6688bb40d60403\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/jfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 107010 c3f5a47e89af5445c3aad68fa93bae29\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 1866206 8fdebbcac09eea2a839cf9cd8badc33b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 1870638 809c7e1f532e43ddeec886be923f0fc7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/kernel-image-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 1900970 2bd025ab8df3aed43bd129c24e2c0b39\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 249410 7ab8a58453dc3ae13ed54e534f2a8ec9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power3_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 248874 c4f1ebdbc9d3d259e0167a3aab744874\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 249226 7b763f11acca6277d3ec60883ae57189\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-power4_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 248674 6a49d08afe19de1ee7d6e04904bebdb7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 249726 6ef7e56b619ec904475dedad27f85ae8\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5-powerpc_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 250458 38746140799290d7c21351bc56d744ac\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-headers-2.6.10-5_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 6154392 c90a8a0d7c6b4fcf26c586c39b73ebc3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15641168 26041ccbf1af9341e202947eb33b94ca\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power3_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15206084 e19a43416a527bccd5c0b3b304487ee5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15635442 fd466bf70b86af1b96bb3476cdf92bd9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-power4_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15203326 83b25c464737a1e408e2740c1d86b67b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc-smp_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15547852 488feaa4fc48a5bf739bf4246dd729cb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-image-2.6.10-5-powerpc_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 15240076 57ddce08c411c933099c8d108a9ec19a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/linux-patch-ubuntu-2.6.10_2.6.10-34.5_powerpc.deb\r\n Size/MD5: 1347810 e4e8f8aecdb078689a1d0359f4c4d759\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 17354 f5ae566b4bff76d99bc877593fa41746\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 17352 ca96d3ce5451a6cb1915ace61d7907b9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/loop-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 17350 4c5eca50cc3968ef0e7afa2f3954a2e4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213682 f6fc102028e58f6fb2916d5b503ad046\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213688 c1efad49e8d6f32a3aa7320033326b8d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/md-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 213440 d6a9872c3316c44b326a33654b7a93c6\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 210740 bc0d0a70b4872a6ec902b4f344aab40c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 210744 7977ee766c9630ab2d5e0694e8e57b87\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 210744 9662c14552f8ec9d74026e59c33f934c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 688374 17758ef1bcd2f453b50d6212ecd1c3da\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 688344 269cdd6527a452284bfe2e46f8bc9bda\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 686856 f3089ef28e5f74e320ee362750ccb0a4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 780746 4422f5193b43b6a70808182073fd1556\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 780742 828d4603b57ba0daf57700f21de6e9a0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-firmware-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 780710 5108abef45fdf47740718078c0b89478\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 511208 947429f162dea945eed3019e187cf12a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 511192 caaae182c5276e3b991efdd463a5f136\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 510790 8d68a6c869f2bc7cf7930beb4968ef2f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 257712 8f2ed3ae2bedf97c0473e69795a25575\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 257708 15426063915d783ba3913e18078c4d12\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 256818 7a9a6ca59de49f6b792dc215e8355f4a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 84374 f6a14c0da44cfd64864af44e2c2480a5\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 84376 5197bee71f2d103b224d0bdc421b90dd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-shared-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 84356 36d62805f7d2c02ac529122bc5631f73\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 60976 e42a21b173098bc712cfcafb44878db0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 60982 8b4fe0701ed286b592d00acc2f220c5e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/nic-usb-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 60988 ef5ce9034e3bbdd959209eaeeefc4449\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 64988 6361a36f1f3631fa91f698d6efe1d20f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 64980 f8bf47897575e9a69bc2428cf5fac90f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 64984 4cf4b51cf34540a6cde1c9ea1206c567\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 5378 1e2696208d90b6a287bde467212ea9aa\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 5370 e3258cbbdf79f077f333b86f9adc4ba0\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/pcmcia-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 5366 61d610b1f09b0f01abd83c267305b300\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63270 4cec3b41422e52ae946fd263e6aff74f\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63272 ff625a958747b338747973c2c123633c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/ppp-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63232 c3cf4570e42141226844153c9f0cb7de\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 131648 2a0501fca97972ef04438a8165ec904b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 131652 cf1aca5d3ac004b42aaf31ccfd7cfd2b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/reiserfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 131662 09e20027343045bf63051acd562471b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 70974 75f16151fd25c7a8580850d89c7cd39a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 70968 913656678758fa15d630ceeb23be7c4b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/sata-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 70952 4280a28de850937fe29c27dd6183c613\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 357316 ab852ca166bb9c4b835ee8d68bc9154a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 357308 30b11d8c9f812ec7af75d57e8c4a8b42\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-common-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 357310 2392e428acb17337dfb03d8d0bb62462\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 80734 91d3d6993b4eb281aba5774b7387f0b3\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 80734 83acb0ab2ef9348d0e04817a895b1a86\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-core-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 80728 bc5907665811dbd3ff8cfc22d9c91fdb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 510968 536294e705678b660abbaf79ca6d93a9\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 510948 4b40dbd6ce72afc7b86732c8f5641c2b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-extra-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 510736 e25972efaea83bd90fa3ae1ef2265b9d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 389116 1e31db22a8c2c897d1348230a2a164d7\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 389096 8d0b766cb48d7b5353efcc0bcf668878\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/scsi-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 388950 c3e43e6393e7b22d66a0d5e5ce39246e\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63148 388f85771210644d1763e931f1d6c849\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63160 2ed21c4bb6fbf1f33c54b7cf4ae9c60d\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/serial-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 63032 cc8ada1a27d105184dc748f197897916\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 23352 fb02117d391c60c218d62044bc6f319b\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 23340 7841e03e2976c9f8556a70f5e931cd3c\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/socket-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 23106 5479974450bd1b1f2725336c4e56fafb\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35376 d30d17a9e27c27958d05330b5c894799\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35378 94c43da2eacc5eec323aacf114850ddd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.10/ufs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 35372 bef1d0e3193cee5c70b9e35369f3d628\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 135026 63bfa042a67268715539729586316416\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 135004 858dfb6325a3e4aaaa4210612b7a69fd\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 134980 bdbf5a24582a18a4b2ca97fcefbd34ea\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 42398 0702bd860def97845d49e2a61b2881e2\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 42392 2257e8bee9385807e82a97f7d0c5650a\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/usb-storage-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 42394 4b98bbcd05c09f7705283f064909c8c4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power3-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 294748 c5e1491d0d562ad2dc7b7f60645b9908\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-power4-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 294744 1b3aaa486dd0a8245db43fd53575f8b4\r\n \r\nhttp://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.10/xfs-modules-2.6.10-5-powerpc-di_2.6.10-34.5_powerpc.udeb\r\n Size/MD5: 294742 0c21521da6803566145a99bffe7f9ae7\r\n", "modified": "2005-09-10T00:00:00", "published": "2005-09-10T00:00:00", "id": "SECURITYVULNS:DOC:9691", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:9691", "title": "[USN-178-1] Linux kernel vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:15", "bulletinFamily": "software", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:235\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : December 21, 2005\r\n Affected: 2006.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n A stack-based buffer overflow in the sendmsg function call in versions\r\n prior to 2.6.13.1 allow local users to execute arbitrary code by\r\n calling sendmsg and modifying the message contents in another thread\r\n (CVE-2005-2490).\r\n \r\n The raw_sendmsg function in versions prior to 2.6.13.1 allow local\r\n users to cause a DoS (change hardware state) or read from arbitrary\r\n memory via crafted input (CVE-2005-2492).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 does not properly\r\n perform certain tests when the jiffies value is greater than LONG_MAX,\r\n which can cause ipt_recent netfilter rules to block too early\r\n (CVE-2005-2873).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n drm.c in version 2.6.13 and earlier creates a debug file in sysfs with\r\n world-readable and world-writable permissions, allowing local users to\r\n enable DRM debugging and obtain sensitive information (CVE-2005-3179).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3179\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 2006.0:\r\n a010bd5617177d007f3907e5cb1a7eaf 2006.0/RPMS/kernel-2.6.12.14mdk-1-1mdk.i586.rpm\r\n ae019c85ae823dd0045759e68e5a415f 2006.0/RPMS/kernel-i586-up-1GB-2.6.12.14mdk-1-1mdk.i586.rpm\r\n 519cffb096c4371fcdba4ea15c7af8ac 2006.0/RPMS/kernel-i686-up-4GB-2.6.12.14mdk-1-1mdk.i586.rpm\r\n 2093641b27dd2917afd50f8daa68100b 2006.0/RPMS/kernel-smp-2.6.12.14mdk-1-1mdk.i586.rpm\r\n d8532d9bc53c3abd28f530ed536ac1b1 2006.0/RPMS/kernel-source-2.6-2.6.12-14mdk.i586.rpm\r\n 8fbab680135fccd60c7da9533af72d33 2006.0/RPMS/kernel-source-stripped-2.6-2.6.12-14mdk.i586.rpm\r\n 475fc01a6bcd294890ca55b814bd0151 2006.0/RPMS/kernel-xbox-2.6.12.14mdk-1-1mdk.i586.rpm\r\n cdde86f8ae57d9b08f732268e534ef85 2006.0/RPMS/kernel-xen0-2.6.12.14mdk-1-1mdk.i586.rpm\r\n 834ddd648671714a008303f5d8be5561 2006.0/RPMS/kernel-xenU-2.6.12.14mdk-1-1mdk.i586.rpm\r\n 6bb497c8205003ffc8538e81cdc2e0f9 2006.0/SRPMS/kernel-2.6.12.14mdk-1-1mdk.src.rpm\r\n\r\n Mandriva Linux 2006.0/X86_64:\r\n 9fce74d95a1678c5c5217d6b113e08be x86_64/2006.0/RPMS/kernel-2.6.12.14mdk-1-1mdk.x86_64.rpm\r\n 5997517d826bf551567f2f7586f2f2ea x86_64/2006.0/RPMS/kernel-smp-2.6.12.14mdk-1-1mdk.x86_64.rpm\r\n 0f57a42ee8ef90cf2f60c8f3cc011f26 x86_64/2006.0/RPMS/kernel-source-2.6-2.6.12-14mdk.x86_64.rpm\r\n 26a234853ea00c0e6f29526e023c26e4 x86_64/2006.0/RPMS/kernel-source-stripped-2.6-2.6.12-14mdk.x86_64.rpm\r\n 6bb497c8205003ffc8538e81cdc2e0f9 x86_64/2006.0/SRPMS/kernel-2.6.12.14mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDqbDLmqjQ0CJFipgRArpbAKDD9dJXm9FTggU6khmIxM31QsbkigCdEd6Y\r\nrYVPJj5H9ob4JzlvsWDsQgw=\r\n=W8YT\r\n-----END PGP SIGNATURE-----\r\n_______________________________________________\r\nFull-Disclosure - We believe in it.\r\nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\r\nHosted and sponsored by Secunia - http://secunia.com/", "modified": "2005-12-22T00:00:00", "published": "2005-12-22T00:00:00", "id": "SECURITYVULNS:DOC:10801", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10801", "title": "[Full-disclosure] MDKSA-2005:235 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:14", "bulletinFamily": "software", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2005:220\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : kernel\r\n Date : November 30, 2005\r\n Affected: 10.2\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n Multiple vulnerabilities in the Linux 2.6 kernel have been discovered\r\n and corrected in this update:\r\n \r\n The kernel on x86_64 platforms does not use a guard page for the 47-bit\r\n address page to protect against an AMD K8 bug which allows a local user\r\n to cause a DoS (CVE-2005-1764).\r\n \r\n The KEYCTL_JOIN_SESSION_KEYRING operation in versions prior to 2.6.12.5\r\n contains an error path that does not properly release the session\r\n management semaphore, which allows local users or remote attackers to\r\n cause a DoS (semaphore hang) via a new session keyring with an empty\r\n name string, a long name string, the key quota reached, or ENOMEM\r\n (CVE-2005-2098).\r\n \r\n Kernels prior to 2.6.12.5 do not properly destroy a keyring that is not\r\n instantiated properly, allowing a local user or remote attacker to\r\n cause a DoS (oops) via a keyring with a payload that is not empty\r\n (CVE-2005-2099).\r\n \r\n An array index overflow in the xfrm_sk_policy_insert function in\r\n xfrm_user.c allows local users to cause a DoS (oops or deadlock) and\r\n possibly execute arbitrary code (CVE-2005-2456).\r\n \r\n The zisofs driver in versions prior to 2.6.12.5 allows local users and\r\n remove attackers to cause a DoS (crash) via a crafted compressed ISO\r\n filesystem (CVE-2005-2457).\r\n \r\n inflate.c in the zlib routines in versions prior to 2.6.12.5 allow\r\n remove attackers to cause a DoS (crash) via a compressed file with\r\n "improper tables" (CVE-2005-2458).\r\n \r\n The huft_build function in inflate.c in the zlib routines in versions\r\n prior to 2.6.12.5 returns the wrong value, allowing remote attackers to\r\n cause a DoS (crash) via a certain compressed file that leads to a null\r\n pointer dereference (CVE-2005-2459).\r\n \r\n A stack-based buffer overflow in the sendmsg function call in versions\r\n prior to 2.6.13.1 allow local users to execute arbitrary code by\r\n calling sendmsg and modifying the message contents in another thread\r\n (CVE-2005-2490).\r\n \r\n The raw_sendmsg function in versions prior to 2.6.13.1 allow local\r\n users to cause a DoS (change hardware state) or read from arbitrary\r\n memory via crafted input (CVE-2005-2492).\r\n \r\n A memory leak in the seq_file implementation in the SCSI procfs\r\n interface (sg.c) in 2.6.13 and earlier allows a local user to cause a\r\n DoS (memory consumption) via certain repeated reads from\r\n /proc/scsi/gs/devices file which is not properly handled when the\r\n next() interator returns NULL or an error (CVE-2005-2800).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 when running on 64bit\r\n processors allows remote attackers to cause a DoS (kernel panic) via\r\n certain attacks such as SSH brute force (CVE-2005-2872).\r\n \r\n The ipt_recent module in versions prior to 2.6.12 does not properly\r\n perform certain tests when the jiffies value is greater than LONG_MAX,\r\n which can cause ipt_recent netfilter rules to block too early\r\n (CVE-2005-2873).\r\n \r\n Multiple vulnerabilities in versions prior to 2.6.13.2 allow local\r\n users to cause a DoS (oops from null dereference) via fput in a 32bit\r\n ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl\r\n function on 64-bit systems (CVE-2005-3044).\r\n \r\n The sys_set_mempolicy function in mempolicy.c allows local users to\r\n cause a DoS via a negative first argument (CVE-2005-3053).\r\n \r\n Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops)\r\n via a userspace process that issues a USB Request Block (URB) to a USB\r\n device and terminates before the URB is finished, which leads to a\r\n stale pointer reference (CVE-2005-3055).\r\n \r\n drm.c in version 2.6.13 and earlier creates a debug file in sysfs with\r\n world-readable and world-writable permissions, allowing local users to\r\n enable DRM debugging and obtain sensitive information (CVE-2005-3179).\r\n \r\n The Orinoco driver in 2.6.13 and earlier does not properly clear memory\r\n from a previously used packet whose length is increased, allowing\r\n remote attackers to obtain sensitive information (CVE-2005-3180).\r\n \r\n Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an\r\n incorrect function to free names_cache memory, preventing the memory\r\n from being tracked by AUDITSYSCALL code and leading to a memory leak\r\n (CVE-2005-3181).\r\n \r\n The VT implementation in version 2.6.12 allows local users to use\r\n certain IOCTLs on terminals of other users and gain privileges\r\n (CVE-2005-3257).\r\n \r\n Exec does not properly clear posix-timers in multi-threaded\r\n environments, which result in a resource leak and could allow a large\r\n number of multiple local users to cause a DoS by using more posix-\r\n timers than specified by the quota for a single user (CVE-2005-3271).\r\n \r\n The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12\r\n does not properly verify the ndigis argument for a new route, allowing\r\n an attacker to trigger array out-of-bounds errors with a large number\r\n of digipeats (CVE-2005-3273).\r\n \r\n A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when\r\n running on SMP systems, allows local users to cause a DoS (null\r\n dereference) by causing a connection timer to expire while the\r\n connection table is being flushed before the appropriate lock is\r\n acquired (CVE-2005-3274).\r\n \r\n The NAT code in versions prior to 2.6.13 incorrectly declares a\r\n variable to be static, allowing remote attackers to cause a DoS (memory\r\n corruption) by causing two packets for the same protocol to be NATed at\r\n the same time (CVE-2005-3275).\r\n \r\n The sys_get_thread_area function in process.c in versions prior to\r\n 2.6.12.4 and 2.6.13 does not clear a data structure before copying it\r\n to userspace, which may allow a user process to obtain sensitive\r\n information (CVE-2005-3276).\r\n \r\n The provided packages are patched to fix these vulnerabilities. All\r\n users are encouraged to upgrade to these updated kernels.\r\n \r\n To update your kernel, please follow the directions located at:\r\n \r\n http://www.mandriva.com/en/security/kernelupdate\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1764\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2098\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2099\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3053\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3179\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 10.2:\r\n 2c46bb090164d04e6c45a0abef9d5756 10.2/RPMS/kernel-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 1f527287a66e776825c6a665a9b62ccf 10.2/RPMS/kernel-i586-up-1GB-2.6.11.13mdk-1-1mdk.i586.rpm\r\n df151a56daf78664f6ac4dcf99ffbf4a 10.2/RPMS/kernel-i686-up-4GB-2.6.11.13mdk-1-1mdk.i586.rpm\r\n b531e97efe37e4cc41fba8fea177317b 10.2/RPMS/kernel-smp-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 243fc4fbd27117ecf95a8c9d856a22cb 10.2/RPMS/kernel-source-2.6-2.6.11-13mdk.i586.rpm\r\n 841f4b9e8f333ae07af81fbb295e7b89 10.2/RPMS/kernel-source-stripped-2.6-2.6.11-13mdk.i586.rpm\r\n dafc4f7aa34f21434ce2d1ec76b8b80f 10.2/RPMS/kernel-xbox-2.6.11.13mdk-1-1mdk.i586.rpm\r\n 7369eb7eaf212a81d56f3d3df895f909 10.2/SRPMS/kernel-2.6.11.13mdk-1-1mdk.src.rpm\r\n\r\n Mandriva Linux 10.2/X86_64:\r\n d82156477b51547a270c7cda5a8ac5a1 x86_64/10.2/RPMS/kernel-2.6.11.13mdk-1-1mdk.x86_64.rpm\r\n f7e6d8f44813da237726c757cf4a4958 x86_64/10.2/RPMS/kernel-smp-2.6.11.13mdk-1-1mdk.x86_64.rpm\r\n b0b6f0422937ce40d421cf607dd5c57b x86_64/10.2/RPMS/kernel-source-2.6-2.6.11-13mdk.x86_64.rpm\r\n 42f78955e8bc151d36ae5bb3e1493c25 x86_64/10.2/RPMS/kernel-source-stripped-2.6-2.6.11-13mdk.x86_64.rpm\r\n 7369eb7eaf212a81d56f3d3df895f909 x86_64/10.2/SRPMS/kernel-2.6.11.13mdk-1-1mdk.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.2.4 (GNU/Linux)\r\n\r\niD8DBQFDjfmdmqjQ0CJFipgRAq87AKCc30fj1YTM9/J6R1uwqUZ5bUGx5QCgiUMa\r\n9yaj33KlDIs4ThWlTKKwFJ0=\r\n=Etvq\r\n-----END PGP SIGNATURE-----", "modified": "2005-12-01T00:00:00", "published": "2005-12-01T00:00:00", "id": "SECURITYVULNS:DOC:10475", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:10475", "title": "MDKSA-2005:220 - Updated kernel packages fix numerous vulnerabilities", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2019-05-29T17:21:01", "bulletinFamily": "unix", "description": "Oleg Nesterov discovered a local Denial of Service vulnerability in the timer handling. When a non group-leader thread called exec() to execute a different program while an itimer was pending, the timer expiry would signal the old group leader task, which did not exist any more. This caused a kernel panic. This vulnerability only affects Ubuntu 5.04. (CAN-2005-1913)\n\nAl Viro discovered that the sendmsg() function did not sufficiently validate its input data. By calling sendmsg() and at the same time modifying the passed message in another thread, he could exploit this to execute arbitrary commands with kernel privileges. This only affects the amd64 bit platform. (CAN-2005-2490)\n\nAl Viro discovered a vulnerability in the raw_sendmsg() function. By calling this function with specially crafted arguments, a local attacker could either read kernel memory contents (leading to information disclosure) or manipulate the hardware state by reading certain IO ports. This vulnerability only affects Ubuntu 5.04. (CAN-2005-2492)\n\nJan Blunck discovered a Denial of Service vulnerability in the procfs interface of the SCSI driver. By repeatedly reading /proc/scsi/sg/devices, a local attacker could eventually exhaust kernel memory. (CAN-2005-2800)\n\nA flaw was discovered in the handling of extended attributes on ext2 and ext3 file systems. Under certain condidions, this could prevent the enforcement of Access Control Lists, which eventually could lead to information disclosure, unauthorized program execution, or unauthorized data modification. This does not affect the standard Unix permissions. (CAN-2005-2801)\n\nChad Walstrom discovered a Denial of Service in the ipt_recent module, which can be used in netfilter (Firewall configuration). A remote attacker could exploit this to crash the kernel by sending certain packets (such as an SSH brute force attack) to a host which uses the \u201crecent\u201d module. (CAN-2005-2802)", "modified": "2005-09-09T00:00:00", "published": "2005-09-09T00:00:00", "id": "USN-178-1", "href": "https://usn.ubuntu.com/178-1/", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "suse": [{"lastseen": "2016-09-04T11:50:28", "bulletinFamily": "unix", "description": "The Linux kernel was updated to fix several security problems and several bugs, listed below:\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2005-12-14T15:10:59", "published": "2005-12-14T15:10:59", "id": "SUSE-SA:2005:068", "href": "http://lists.opensuse.org/opensuse-security-announce/2005-12/msg00011.html", "type": "suse", "title": "denial of service in kernel", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:COMPLETE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2019-08-13T18:44:56", "bulletinFamily": "unix", "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is the second regular kernel update to Red Hat Enterprise Linux 4.\r\n\r\nNew features introduced in this update include:\r\n- Audit support\r\n- systemtap - kprobes, relayfs\r\n- Keyring support\r\n- iSCSI Initiator - iscsi_sfnet 4:0.1.11-1\r\n- Device mapper multipath support\r\n- Intel dual core support\r\n- esb2 chipset support\r\n- Increased exec-shield coverage\r\n- Dirty page tracking for HA systems\r\n- Diskdump -- allow partial diskdumps and directing to swap\r\n\r\nThere were several bug fixes in various parts of the kernel. The ongoing\r\neffort to resolve these problems has resulted in a marked improvement\r\nin the reliability and scalability of Red Hat Enterprise Linux 4. \r\n\r\nThe following security bugs were fixed in this update, detailed below with\r\ncorresponding CAN names available from the Common Vulnerabilities and\r\nExposures project (cve.mitre.org):\r\n\r\n- flaws in ptrace() syscall handling on 64-bit systems that allowed a local\r\nuser to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,\r\nCAN-2005-1762, CAN-2005-1763)\r\n\r\n- flaws in IPSEC network handling that allowed a local user to cause a\r\ndenial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)\r\n\r\n- a flaw in sendmsg() syscall handling on 64-bit systems that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CAN-2005-2490)\r\n\r\n- a flaw in sendmsg() syscall handling that allowed a local user to cause a\r\ndenial of service by altering hardware state (CAN-2005-2492)\r\n\r\n- a flaw that prevented the topdown allocator from allocating mmap areas\r\nall the way down to address zero (CAN-2005-1265)\r\n\r\n- flaws dealing with keyrings that could cause a local denial of service\r\n(CAN-2005-2098, CAN-2005-2099)\r\n\r\n- a flaw in the 4GB split patch that could allow a local denial of service\r\n(CAN-2005-2100)\r\n\r\n- a xattr sharing bug in the ext2 and ext3 file systems that could cause\r\ndefault ACLs to disappear (CAN-2005-2801)\r\n\r\n- a flaw in the ipt_recent module on 64-bit architectures which could allow\r\na remote denial of service (CAN-2005-2872)\r\n\r\nThe following device drivers have been upgraded to new versions:\r\n\r\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nmegaraid_mbox --- 2.20.4.5 to 2.20.4.6\r\nmegaraid_mm ----- 2.20.2.5 to 2.20.2.6 \r\nlpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17\r\ncciss ----------- 2.6.4 to 2.6.6\r\nipw2100 --------- 1.0.3 to 1.1.0\r\ntg3 ------------- 3.22-rh to 3.27-rh\r\ne100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI\r\ne1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI\r\n3c59x ----------- LK1.1.19\r\nmptbase --------- 3.01.16 to 3.02.18\r\nixgb ------------ 1.0.66 to 1.0.95-k2-NAPI\r\nlibata ---------- 1.10 to 1.11\r\nsata_via -------- 1.0 to 1.1\r\nsata_ahci ------- 1.00 to 1.01\r\nsata_qstor ------ 0.04\r\nsata_sil -------- 0.8 to 0.9\r\nsata_svw -------- 1.05 to 1.06\r\ns390: crypto ---- 1.31 to 1.57\r\ns390: zfcp ------ \r\ns390: CTC-MPC ---\r\ns390: dasd -------\r\ns390: cio -------\r\ns390: qeth ------\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\r\nkernels to the packages associated with their machine architectures\r\nand configurations as listed in this erratum.", "modified": "2017-09-08T11:54:13", "published": "2005-10-05T04:00:00", "id": "RHSA-2005:514", "href": "https://access.redhat.com/errata/RHSA-2005:514", "type": "redhat", "title": "(RHSA-2005:514) Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-05-29T18:34:12", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2005:514\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThis is the second regular kernel update to Red Hat Enterprise Linux 4.\r\n\r\nNew features introduced in this update include:\r\n- Audit support\r\n- systemtap - kprobes, relayfs\r\n- Keyring support\r\n- iSCSI Initiator - iscsi_sfnet 4:0.1.11-1\r\n- Device mapper multipath support\r\n- Intel dual core support\r\n- esb2 chipset support\r\n- Increased exec-shield coverage\r\n- Dirty page tracking for HA systems\r\n- Diskdump -- allow partial diskdumps and directing to swap\r\n\r\nThere were several bug fixes in various parts of the kernel. The ongoing\r\neffort to resolve these problems has resulted in a marked improvement\r\nin the reliability and scalability of Red Hat Enterprise Linux 4. \r\n\r\nThe following security bugs were fixed in this update, detailed below with\r\ncorresponding CAN names available from the Common Vulnerabilities and\r\nExposures project (cve.mitre.org):\r\n\r\n- flaws in ptrace() syscall handling on 64-bit systems that allowed a local\r\nuser to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,\r\nCAN-2005-1762, CAN-2005-1763)\r\n\r\n- flaws in IPSEC network handling that allowed a local user to cause a\r\ndenial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)\r\n\r\n- a flaw in sendmsg() syscall handling on 64-bit systems that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CAN-2005-2490)\r\n\r\n- a flaw in sendmsg() syscall handling that allowed a local user to cause a\r\ndenial of service by altering hardware state (CAN-2005-2492)\r\n\r\n- a flaw that prevented the topdown allocator from allocating mmap areas\r\nall the way down to address zero (CAN-2005-1265)\r\n\r\n- flaws dealing with keyrings that could cause a local denial of service\r\n(CAN-2005-2098, CAN-2005-2099)\r\n\r\n- a flaw in the 4GB split patch that could allow a local denial of service\r\n(CAN-2005-2100)\r\n\r\n- a xattr sharing bug in the ext2 and ext3 file systems that could cause\r\ndefault ACLs to disappear (CAN-2005-2801)\r\n\r\n- a flaw in the ipt_recent module on 64-bit architectures which could allow\r\na remote denial of service (CAN-2005-2872)\r\n\r\nThe following device drivers have been upgraded to new versions:\r\n\r\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nqla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2\r\nmegaraid_mbox --- 2.20.4.5 to 2.20.4.6\r\nmegaraid_mm ----- 2.20.2.5 to 2.20.2.6 \r\nlpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17\r\ncciss ----------- 2.6.4 to 2.6.6\r\nipw2100 --------- 1.0.3 to 1.1.0\r\ntg3 ------------- 3.22-rh to 3.27-rh\r\ne100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI\r\ne1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI\r\n3c59x ----------- LK1.1.19\r\nmptbase --------- 3.01.16 to 3.02.18\r\nixgb ------------ 1.0.66 to 1.0.95-k2-NAPI\r\nlibata ---------- 1.10 to 1.11\r\nsata_via -------- 1.0 to 1.1\r\nsata_ahci ------- 1.00 to 1.01\r\nsata_qstor ------ 0.04\r\nsata_sil -------- 0.8 to 0.9\r\nsata_svw -------- 1.05 to 1.06\r\ns390: crypto ---- 1.31 to 1.57\r\ns390: zfcp ------ \r\ns390: CTC-MPC ---\r\ns390: dasd -------\r\ns390: cio -------\r\ns390: qeth ------\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\r\nkernels to the packages associated with their machine architectures\r\nand configurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/012244.html\nhttp://lists.centos.org/pipermail/centos-announce/2005-October/012247.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2005-514.html", "modified": "2005-10-06T00:20:53", "published": "2005-10-05T16:21:56", "href": "http://lists.centos.org/pipermail/centos-announce/2005-October/012244.html", "id": "CESA-2005:514", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}]}