{"securityvulns": [{"lastseen": "2018-08-31T11:10:27", "bulletinFamily": "software", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ----------------------------------------------------------------------\r\nDebian Security Advisory DSA-1630-1 security@debian.org\r\nhttp://www.debian.org/security/ dann frazier\r\nAug 21, 2008 http://www.debian.org/security/faq\r\n- ----------------------------------------------------------------------\r\n\r\nPackage : linux-2.6\r\nVulnerability : denial of service/information leak\r\nProblem type : several\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2007-6282 CVE-2008-0598 CVE-2008-2729 CVE-2008-2812\r\n CVE-2008-2826 CVE-2008-2931 CVE-2008-3272 CVE-2008-3275\r\n\r\nSeveral vulnerabilities have been discovered in the Linux kernel that may\r\nlead to a denial of service or arbitrary code execution. The Common\r\nVulnerabilities and Exposures project identifies the following\r\nproblems:\r\n\r\nCVE-2007-6282\r\n\r\n Dirk Nehring discovered a vulnerability in the IPsec code that allows\r\n remote users to cause a denial of service by sending a specially crafted\r\n ESP packet.\r\n\r\nCVE-2008-0598\r\n\r\n Tavis Ormandy discovered a vulnerability that allows local users to access\r\n uninitialized kernel memory, possibly leaking sensitive data. This issue\r\n is specific to the amd64-flavour kernel images.\r\n\r\nCVE-2008-2729\r\n\r\n Andi Kleen discovered an issue where uninitialized kernel memory\r\n was being leaked to userspace during an exception. This issue may allow\r\n local users to gain access to sensitive data. Only the amd64-flavour\r\n Debian kernel images are affected.\r\n\r\nCVE-2008-2812\r\n\r\n Alan Cox discovered an issue in multiple tty drivers that allows\r\n local users to trigger a denial of service (NULL pointer dereference)\r\n and possibly obtain elevated privileges.\r\n\r\nCVE-2008-2826\r\n\r\n Gabriel Campana discovered an integer overflow in the sctp code that\r\n can be exploited by local users to cause a denial of service.\r\n\r\nCVE-2008-2931\r\n\r\n Miklos Szeredi reported a missing privilege check in the do_change_type()\r\n function. This allows local, unprivileged users to change the properties\r\n of mount points.\r\n\r\nCVE-2008-3272\r\n\r\n Tobias Klein reported a locally exploitable data leak in the\r\n snd_seq_oss_synth_make_info() function. This may allow local users\r\n to gain access to sensitive information.\r\n\r\nCVE-2008-3275\r\n\r\n Zoltan Sogor discovered a coding error in the VFS that allows local users\r\n to exploit a kernel memory leak resulting in a denial of service.\r\n\r\nFor the stable distribution (etch), this problem has been fixed in\r\nversion 2.6.18.dfsg.1-22etch2.\r\n\r\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\r\nuser-mode-linux packages.\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nThe following matrix lists additional source packages that were rebuilt for\r\ncompatability with or to take advantage of this update:\r\n\r\n Debian 4.0 (etch)\r\n fai-kernels 1.17+etch.22etch2\r\n user-mode-linux 2.6.18-1um-2etch.22etch2\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\nDebian GNU/Linux 4.0 alias etch\r\n- -------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and\r\nsparc.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.diff.gz\r\n Size/MD5 checksum: 5378366 80a876fbcded8984ff47308cf2ece776\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\r\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.dsc\r\n Size/MD5 checksum: 740 080fa46e372743186c973658347ceee1\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\r\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.dsc\r\n Size/MD5 checksum: 892 30580beb633eb4806c40d659f552cd88\r\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.dsc\r\n Size/MD5 checksum: 5672 780d93329a4cedaad9d0539c1cc400ac\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.diff.gz\r\n Size/MD5 checksum: 18180 2b9bbd3f4bcc3852320fc60d6947607e\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.tar.gz\r\n Size/MD5 checksum: 56550 01fd54902e7ac7c3035c5176f1deae3c\r\n\r\nArchitecture independent packages:\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 3718952 804c3adc75403db743f603fd1dc44fa2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 41460250 9fda57df0d76f6300b162c0765a87e32\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 1632622 6d644a3a0502065b7a9faa9a7efdb8f4\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 1087372 8ff719e7a81edaa38b5eca31a7aaee02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 3590476 b803de0252e4f027567c5c13db4afe0a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n Size/MD5 checksum: 55722 a4dd6ba664f85780bbe1ebf7f3a77b25\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23464338 df80e9f9afac5942ec8cd73c8fa2acd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 55150 c752933d6628e0ebe75dbe47f29ad4e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 268952 128bea32232629d3255799ddc83da7b3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 269648 7617546d15e940343cbe381dfecae010\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 3053804 f72f8a710f0a4da22bc8fd431d9195ee\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 268368 5c248dbb5e31cc30d4148196b1f5cef0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 55180 2a8a3e402015cf1908906180eb6f8a5f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23846050 ba3b97267e75c3d8027627b2a3ece5fb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 23485982 9ea2f705c0a99080425de75c48c66904\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 269242 1edcca9164f4eecd392897903269c1e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_alpha.deb\r\n Size/MD5 checksum: 3028978 253a048a7d3ccdf823b8e28b47e5f849\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_amd64.deb\r\n Size/MD5 checksum: 5961854 67e6d9bddf32e6ff37f15a37f9aa2b04\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55174 94bc1ab70d46a153205059b1ba2fbd9e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 279498 bf0107981fe6a603a9b72be5e94190bb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 16909690 0d7e343ec621b05fb565ed0c4b355c9e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3252530 97dc43477d90cae8fd6b4033781ce589\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 277930 b719a1156f14a870b6f0fed9fcac0e26\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55146 865ab31e1451d19f5374492c7b5cec02\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55152 811c0ed6f63166536426b3a30a0ae6a0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 1652318 1e02b1e5c1315c6775efd5a3ebb8eba0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3228660 b3491a01820796609c57ff0ca45cd991\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 1684052 214c87ec095a47ddb16cb5a0386385d0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 15370528 6429150ddfdc20c94f5dd9223ce1eefa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 16955552 08dbcfaeb394f720be04b43584cc2dca\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 277636 0c1dd9ed04830cef72a2799682cdb373\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3422414 a66a5347a66c224513912f23df6e7811\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 3397342 d69524c251013eca5cb9c2fc6ac49f08\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 278800 f808d9f0b51671184647976e61673ef7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 55126 dcc26a10c820fe676abf6d0a8f733190\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n Size/MD5 checksum: 15356684 ca635c5a74fde0c121ac8ad0dca7f3bc\r\n\r\narm architecture (ARM)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 240724 05944f6adaed3622fdbf4fa94d9e37c1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 55194 cfb4019acf8ce2b9eca9a06cde8fa6d8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 200112 db009d7e4d83679ea6bf62352e8cbe27\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 7925520 1488da3529714a8490790357b2a28d34\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 235346 8bac39d6ded885fc5247046c1a0f5c1c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 205074 8fa04e311cd6e56aa2749d4146056c77\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 55234 060e1f4e0b26b2fb42fe0be4d8078952\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 3411494 cfe4f5b7273940720e2bc1e945631f1c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 4588214 42d8698407235b46507cf2d7b992c09c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 234198 35c06e74a9f26ab8217ea98df7c01a9b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 7567632 3e4a444afcf3df3e510e2c5000a4b684\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 5010844 a3a1c62fbe80192e80bcaac498036e92\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n Size/MD5 checksum: 8872222 e1a64be9bdc5246dd1d9ef666eb0a311\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 11805014 e45047cea390fd98d4a55557414b578e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 55184 397ca7761578ce779b6ef9bacc372ffb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 10551992 1d693cdd06bb4dee92a25cd886817522\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 55158 15e7aa685aea41e29ac6c76825e99ad6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 199066 5aaf2ce6a96449673f8a8f48f36cf841\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 11400554 53c5eca027dc1015bf6423cbe65536cd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 10998698 050980b34cbc925f0842c161828aa1f7\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 197944 1d45f1fe804821cc7b8aa80b0dec4f36\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 3022526 52b6702172ceb2064dde03ea3cacca7a\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 198152 556e2b16e2988976dac562f1baad15a9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n Size/MD5 checksum: 197130 298d3e069a1f6996685c4a5a8bc1bada\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16377614 74d1938921db193d10a0ff798fe7c005\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272450 5468ca009d328fc890a6ab771ab20968\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16471330 35ea40d0f873d6c8ff819a62239623ac\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 280452 b055d4305ed580aa9603c3ff5b8c48ef\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16838150 45beacafd1a4902c055c41bd7711586a\r\n \r\nhttp://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2_i386.deb\r\n Size/MD5 checksum: 25589346 bf03c496e08b7d40f52f602011c07560\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16406940 0225f98fb843e23225875943b5179aa1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55132 28a33a24ebdcdcad85d335499397c88c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55196 16b6e16eefaeb5891ab4ba7f832d0ed3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3169128 eb405a8b5c8b6d815c95f73262a99af1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55144 3d96d807e874865af58831720adb4486\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3055432 a496fea546da3a21748b444ffd6836ec\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272846 c58bde7235a1f1ac5c8145dc1ae9346b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 55140 eee1bdfac4bbecc919d0151b2e23d24c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 14292444 19fe5544166f396830fef3a1b4e4626f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 280608 496144bbb1d620644189d012b9d6ea70\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 282902 f4145bd74ab9467b1af36da46b7666ef\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 279034 26430131dc00922da7c9b034c191eaf1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 272230 871474e9b227166f527391aa064ec971\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_i386.deb\r\n Size/MD5 checksum: 5505296 9da61c3c82edf996a6324ebd4517251c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3149672 c6cbb32f47b75db7d63a6fcf84e0df38\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 3171866 333ceba6af38b86e41a1db10fc764319\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 281062 c0c403aedd560ad15fb7d90c54ce3145\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16192240 a4a3d514e989d64042c46d3ad8d0b0ae\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 278950 9de592d811e51eeb07ebe193f8734d15\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16337664 a367c6561e7cf8ff701a731d8072dca2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 1328006 c5089d6b0fa44ce46fdbbd17140cb9c6\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 16509906 c8894d32a5f39e7512d2db9de74ddf3c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 1300920 9c42c8356ab3a07b89f2d95f47de5303\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n Size/MD5 checksum: 14281014 32f281f475d4ee1f2d67dd029231ea46\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 256640 e96b0df79e67e6049d8feeb73e63f287\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 55174 c93847739b57f47faacaf642de4ab6c1\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 256732 af4ee0bbafe50ce27d875243fe626ab9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 28181368 dff959a14317741919a7a46d73c273a8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 55146 9f30373190856528f752d21d66a88053\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 28014200 d290bc90985342dfe3b348d3e1d07922\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_ia64.deb\r\n Size/MD5 checksum: 3083012 cbb353d4e8cb3a2bfc4dbf43f4427344\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 8311782 6b24a125c1b553bd4f69d830f2d19eaa\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 6124616 ab5d97cb43f8e7d0f7cfebe2db2416df\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 55190 1cd7be3bb06e63ecf67e6c5c175aa201\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 187898 a74c79e4b6de9312c1a531b7d1c04e06\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 164036 58db324ddfe7d1b3f7086c67091c1ae3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 15654946 4c99171f6b6e8e0b06d88f65244f5a5c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 155578 71edf3d7d29b414ee8fe9c26d98afe2f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 15680482 79ca37454bab6d11c4af5621e3963e87\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 168240 0eafb18463f917510d3110c74786742d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 3415314 94c72a62a2c3c52535c3ef4936400ad9\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 9077040 581d6744c0c10ec63b06b5d058e44a87\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 55236 7c94ce0a6b000ba9abcc0bf8272e033c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\r\n Size/MD5 checksum: 188208 2356f7b9cf66b0694b1b7bb07e9e1df0\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 3351164 f15965863479e2b0eab136c912b25ebd\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 183690 e20c71f57188bc8458abb4dc212402f3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 156886 65c9aec3009d7ace0550bee15d0bd34c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 151270 92419bb4255d3989eef1b3d2e616e5a5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 9864388 2aa86c68a6c8ac36e8dc22aafcac34fb\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 183862 262a4f1a05c00b6c2752733101d2bb4b\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 6030536 1199eb8f7b6a9b4ff1a32ebccfcd7074\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 5944692 205d02fd233142d8058874e6ead00e94\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 156854 1f02416baf0082238418bba97eb8aa4f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 15028044 00f2ad06dfa6c908036349c35a5a8e39\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 55154 6b6f4c17287d5e053d716a742cb738a0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 179462 e5497abf20a5461319d8f1d7c37d19b3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 15057484 ea8ab2c273fbc3d282d0120cdbbe5c34\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 55208 f3bfa65fa08c4ad552aef1536bdd1fcc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n Size/MD5 checksum: 5928064 cad7b6b3653d205a39e876a508d4ddaf\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_powerpc.deb\r\n Size/MD5 checksum: 3367890 ad1ad713d488f9e0e0669e1293f1ccd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 254026 ae831a11ed61a4b52bb7a3043eb2f265\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16628466 1b10ecc3a4095b9f0e9cd6fa0c544308\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 3415704 ea230f1f09a4e8341e7bb24ebd037dd3\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 15160062 e41656dd2782d44ec9487138dc694722\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 17017000 04153c3611b94ae5044868407f1eaa96\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 255324 60960ac1262f6d8eabcd96d9789b27bc\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 253678 e1a1fcc0865698fca0aa46cc02c0e38d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 18295838 01cb70246fc9027dc9097964d0a7c06d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 253858 a30720b97122274208888b564c0548b5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 18354880 c82075e19802e915551cd25b04f72c76\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 3393390 246ebdc0ce319ab1b8c0022b1b69fd1d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 246546 855a95e124dcd81d26d06fced8ff9cda\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16406142 59c2543679159905e0d16445d7f5b66d\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 231148 96bb009cbc3c1c9fc00a4f84a4aa9cd5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 55156 94c052eb19ce469aabc0a9a71860f861\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 16971942 c230eb342210e9f9376783e013216695\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 252866 4b2bf2f6783bb456b5c003df3e1ea1f5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n Size/MD5 checksum: 55206 209887bf65d555135cde2cb7b1ef0b7b\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 55168 ba80b3fe0aa1ffdc92825578c4a0a8e2\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5620988 555c4bd0a4b245f267dc324c9b39d695\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 144604 bd539fa6955b9ea80a38046b1097ea6e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 145888 80f3dcbc19b2076e6a37ac8f48f1c687\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5403802 9bfc6e49de7faecc3ae013efd8a5ff85\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 2944158 7a37040db97a3a43817eea570ca29554\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 5663004 f3b7384004cd0c0c6a0478865300b9f8\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 55146 fd4df49a7d2116c1b1eb0f38211c196c\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 145096 7e0bfcc155246d4b7cb8ee00d9a370ba\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 1440072 437e3a46bda63f1ba5bb2d0b970a669f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_s390.deb\r\n Size/MD5 checksum: 2967228 a32e5147c0f741a5300c6122aade4377\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10394174 30c3164de023288678eda955e7088e89\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 166138 da9c686e82839dbecfc4d2f8d5d6ff8f\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 6412488 738092d091284463d88dcce9bc0d683e\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10694332 aa5d657822ad30eb7edf2eca35644e09\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 196630 b349a6dd56888b772577075f21229498\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 195534 c7b2e3ee30ba33f0a207fa11a5f08916\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 197330 5e9f1ad14b5b10c6012b09dcfa93acb5\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 10647804 5bab66c5cdaa22683425b4e101fea4e0\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 55156 da09f09d5c47ce3cd8666b7ba98b9a08\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 3191596 f6aee8879affc350feb8706cdffb95da\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 3169298 a6ad7bd3b6ba9d573f47c21f45b9f660\r\n \r\nhttp://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch2_sparc.deb\r\n Size/MD5 checksum: 55184 322a273cbddb53db9fdb143229104384\r\n\r\n These changes will probably be included in the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFIrZh4huANDBmkLRkRAskxAJ9J3UrvqPqj2rhy3PIXIfPUcWu8ggCggi+J\r\n3axwz1azO0SgmGCRip6WKHQ=\r\n=x8fB\r\n-----END PGP SIGNATURE-----", "modified": "2008-08-21T00:00:00", "published": "2008-08-21T00:00:00", "id": "SECURITYVULNS:DOC:20387", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:20387", "title": "[SECURITY] [DSA 1630-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:20", "bulletinFamily": "scanner", "description": "The remote host is missing an update to linux-2.6\nannounced via advisory DSA 1630-1.", "modified": "2017-07-07T00:00:00", "published": "2008-09-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=61436", "id": "OPENVAS:61436", "title": "Debian Security Advisory DSA 1630-1 (linux-2.6)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1630_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1630-1 (linux-2.6)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several vulnerabilities have been discovered in the Linux kernel that may\nlead to a denial of service or arbitrary code execution. The Common\nVulnerabilities and Exposures project identifies the following\nproblems:\n\nCVE-2007-6282\n\nDirk Nehring discovered a vulnerability in the IPsec code that allows\nremote users to cause a denial of service by sending a specially crafted\nESP packet.\n\nCVE-2008-0598\n\nTavis Ormandy discovered a vulnerability that allows local users to access\nuninitialized kernel memory, possibly leaking sensitive data. This issue\nis specific to the amd64-flavour kernel images.\n\nCVE-2008-2729\n\nAndi Kleen discovered an issue where uninitialized kernel memory\nwas being leaked to userspace during an exception. This issue may allow\nlocal users to gain access to sensitive data. Only the amd64-flavour\nDebian kernel images are affected.\n\nCVE-2008-2812\n\nAlan Cox discovered an issue in multiple tty drivers that allows\nlocal users to trigger a denial of service (NULL pointer dereference)\nand possibly obtain elevated privileges.\n\nCVE-2008-2826\n\nGabriel Campana discovered an integer overflow in the sctp code that\ncan be exploited by local users to cause a denial of service.\n\nCVE-2008-2931\n\nMiklos Szeredi reported a missing privilege check in the do_change_type()\nfunction. This allows local, unprivileged users to change the properties\nof mount points.\n\nCVE-2008-3272\n\nTobias Klein reported a locally exploitable data leak in the\nsnd_seq_oss_synth_make_info() function. This may allow local users\nto gain access to sensitive information.\n\nCVE-2008-3275\n\nZoltan Sogor discovered a coding error in the VFS that allows local users\nto exploit a kernel memory leak resulting in a denial of service.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 2.6.18.dfsg.1-22etch2.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\";\ntag_summary = \"The remote host is missing an update to linux-2.6\nannounced via advisory DSA 1630-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201630-1\";\n\n\nif(description)\n{\n script_id(61436);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 17:00:42 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2007-6282\", \"CVE-2008-0598\", \"CVE-2008-2729\", \"CVE-2008-2812\", \"CVE-2008-2826\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1630-1 (linux-2.6)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"linux-support-2.6.18-6\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-source-2.6.18\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-patch-debian-2.6.18\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-manual-2.6.18\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-doc-2.6.18\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-tree-2.6.18\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-alpha-legacy\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-alpha-generic\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver-alpha\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-alpha-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-alpha\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-alpha-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-alpha-generic\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-alpha-legacy\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"fai-kernels\", ver:\"1.17+etch.22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-xen-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xen-linux-system-2.6.18-6-xen-vserver-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-xen-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-xen-vserver-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-modules-2.6.18-6-xen-vserver-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-vserver-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-xen-vserver\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-xen\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-xen-vserver-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xen-linux-system-2.6.18-6-xen-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-modules-2.6.18-6-xen-amd64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-ixp4xx\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-rpc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-iop32x\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-iop32x\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-s3c2410\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-arm\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-rpc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-footbridge\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-footbridge\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-s3c2410\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-ixp4xx\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-parisc64-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-hppa\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-parisc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-parisc64-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-parisc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-parisc-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-parisc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-parisc-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-parisc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-vserver-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-xen-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-k7\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-k7\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"user-mode-linux\", ver:\"2.6.18-1um-2etch.22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-686-bigmem\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xen-linux-system-2.6.18-6-xen-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-i386\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-xen-vserver-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xen-linux-system-2.6.18-6-xen-vserver-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-modules-2.6.18-6-xen-vserver-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-486\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver-k7\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-686-bigmem\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-486\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-xen-vserver-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-vserver-k7\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-xen-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-modules-2.6.18-6-xen-686\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-mckinley\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-ia64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-itanium\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-mckinley\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-itanium\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-r4k-ip22\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-qemu\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-sb1a-bcm91480b\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-r4k-ip22\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-sb1a-bcm91480b\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-qemu\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-sb1-bcm91250a\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-r5k-ip32\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-r5k-ip32\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-mips\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-sb1-bcm91250a\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-r4k-kn04\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-r5k-cobalt\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-r3k-kn02\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-r3k-kn02\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-r5k-cobalt\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-mipsel\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-r4k-kn04\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-powerpc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-powerpc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-powerpc-miboot\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-vserver-powerpc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver-powerpc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-powerpc-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-powerpc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver-powerpc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-vserver-powerpc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-prep\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-prep\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-powerpc-miboot\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-powerpc-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-powerpc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-powerpc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-s390\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-s390x\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-s390\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver-s390x\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-s390\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-vserver-s390x\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-s390x\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-s390-tape\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-sparc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-sparc32\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-sparc32\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-vserver-sparc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-sparc64-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-sparc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-vserver-sparc64\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-image-2.6.18-6-sparc64-smp\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"linux-headers-2.6.18-6-all-sparc\", ver:\"2.6.18.dfsg.1-22etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:29:34", "bulletinFamily": "scanner", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-637-1", "modified": "2017-12-01T00:00:00", "published": "2009-03-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=840325", "id": "OPENVAS:840325", "title": "Ubuntu Update for linux, linux-source-2.6.15/20/22 vulnerabilities USN-637-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_637_1.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for linux, linux-source-2.6.15/20/22 vulnerabilities USN-637-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that there were multiple NULL-pointer function\n dereferences in the Linux kernel terminal handling code. A local attacker\n could exploit this to execute arbitrary code as root, or crash the system,\n leading to a denial of service. (CVE-2008-2812)\n\n The do_change_type routine did not correctly validation administrative\n users. A local attacker could exploit this to block mount points or cause\n private mounts to be shared, leading to denial of service or a possible\n loss of privacy. (CVE-2008-2931)\n \n Tobias Klein discovered that the OSS interface through ALSA did not\n correctly validate the device number. A local attacker could exploit this\n to access sensitive kernel memory, leading to a denial of service or a loss\n of privacy. (CVE-2008-3272)\n \n Zoltan Sogor discovered that new directory entries could be added to\n already deleted directories. A local attacker could exploit this, filling\n up available memory and disk space, leading to a denial of service.\n (CVE-2008-3275)\n \n In certain situations, the fix for CVE-2008-0598 from USN-623-1 was causing\n infinite loops in the writev syscall. This update corrects the mistake. We\n apologize for the inconvenience.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-637-1\";\ntag_affected = \"linux, linux-source-2.6.15/20/22 vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 7.04 ,\n Ubuntu 7.10 ,\n Ubuntu 8.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-637-1/\");\n script_id(840325);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"637-1\");\n script_cve_id(\"CVE-2008-2812\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\", \"CVE-2008-0598\");\n script_name( \"Ubuntu Update for linux, linux-source-2.6.15/20/22 vulnerabilities USN-637-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.15-52-386_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.15-52-686_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.15-52-k7_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.15-52-server-bigiron_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.15-52-server_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.15-52_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.15-52-386_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.15-52-686_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.15-52-k7_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.15-52-server-bigiron_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.15-52-server_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.15_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-kernel-devel\", ver:\"2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source\", ver:\"2.6.15_2.6.15-52.71\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.20-17-386_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.20-17-generic_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.20-17-lowlatency_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.20-17-server-bigiron_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.20-17-server_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.20-17_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.20-17-386_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.20-17-generic_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.20-17-server-bigiron_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.20-17-server_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.20-17-386_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.20-17-generic_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.20-17-server-bigiron_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.20-17-server_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.20-17-lowlatency_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.20-17-lowlatency_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.20_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-kernel-devel\", ver:\"2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source\", ver:\"2.6.20_2.6.20-17.39\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.24-19-386_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.24-19-generic_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.24-19-openvz_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.24-19-rt_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.24-19-server_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.24-19-virtual_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.24-19-xen_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.24-19-386_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.24-19-generic_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.24-19-server_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.24-19-virtual_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.24-19-386_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.24-19-generic_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.24-19-server_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.24-19-virtual_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.24-19-openvz_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.24-19-rt_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.24-19-xen_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.24_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.24-19_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-kernel-devel\", ver:\"2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source\", ver:\"2.6.24_2.6.24-19.41\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU7.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.22-15-386_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.22-15-generic_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.22-15-rt_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.22-15-server_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.22-15-ume_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.22-15-virtual_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.22-15-xen_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.22-15-386_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.22-15-generic_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.22-15-server_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.22-15-virtual_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.22-15-386_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.22-15-generic_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.22-15-server_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-debug\", ver:\"2.6.22-15-virtual_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.22-15-rt_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.22-15-ume_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image\", ver:\"2.6.22-15-xen_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-doc\", ver:\"2.6.22_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-headers\", ver:\"2.6.22-15_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-kernel-devel\", ver:\"2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-source\", ver:\"2.6.22_2.6.22-15.58\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:39:45", "bulletinFamily": "scanner", "description": "Check for the Version of kernel", "modified": "2018-04-06T00:00:00", "published": "2009-03-06T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870087", "id": "OPENVAS:1361412562310870087", "title": "RedHat Update for kernel RHSA-2008:0885-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0885-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n Security fixes:\n \n * a missing capability check was found in the Linux kernel do_change_type\n routine. This could allow a local unprivileged user to gain privileged\n access or cause a denial of service. (CVE-2008-2931, Important)\n \n * a flaw was found in the Linux kernel Direct-IO implementation. This could\n allow a local unprivileged user to cause a denial of service.\n (CVE-2007-6716, Important)\n \n * Tobias Klein reported a missing check in the Linux kernel Open Sound\n System (OSS) implementation. This deficiency could lead to a possible\n information leak. (CVE-2008-3272, Moderate)\n \n * a deficiency was found in the Linux kernel virtual filesystem (VFS)\n implementation. This could allow a local unprivileged user to attempt file\n creation within deleted directories, possibly causing a denial of service.\n (CVE-2008-3275, Moderate)\n \n * a flaw was found in the Linux kernel tmpfs implementation. This could\n allow a local unprivileged user to read sensitive information from the\n kernel. (CVE-2007-6417, Moderate)\n \n Bug fixes:\n \n * when copying a small IPoIB packet from the original skb it was received\n in to a new, smaller skb, all fields in the new skb were not initialized.\n This may have caused a kernel oops.\n \n * previously, data may have been written beyond the end of an array,\n causing memory corruption on certain systems, resulting in hypervisor\n crashes during context switching.\n \n * a kernel crash may have occurred on heavily-used Samba servers after 24\n to 48 hours of use.\n \n * under heavy memory pressure, pages may have been swapped out from under\n the SGI Altix XPMEM driver, causing silent data corruption in the kernel.\n \n * the ixgbe driver is untested, but support was advertised for the Intel\n 82598 network card. If this card was present when the ixgbe driver was\n loaded, a NULL pointer dereference and a panic occurred.\n \n * on certain systems, if multiple InfiniBand queue pairs simultaneously\n fell into an error state, an overrun may have occurred, stopping traffic.\n \n * with bridging, when forward delay was set to zero, setting an interface\n to the forwarding state was delayed by one or possibly two timers,\n depending on whether STP was enabled. This may have caused long delays in\n moving an interface to the forwarding state. This issue caused packet loss\n when migrating virtual machines, preventing them from being migrated\n without interrupting applications.\n \n * on certain multinode systems, IPMI device nodes ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-September/msg00013.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870087\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0885-01\");\n script_cve_id(\"CVE-2008-2931\", \"CVE-2008-3275\", \"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-3272\");\n script_name( \"RedHat Update for kernel RHSA-2008:0885-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:16", "bulletinFamily": "scanner", "description": "Oracle Linux Local Security Checks ELSA-2008-0885", "modified": "2018-09-28T00:00:00", "published": "2015-10-08T00:00:00", "id": "OPENVAS:1361412562310122555", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122555", "title": "Oracle Linux Local Check: ELSA-2008-0885", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2008-0885.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122555\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:47:54 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2008-0885\");\n script_tag(name:\"insight\", value:\"ELSA-2008-0885 - kernel security and bug fix update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2008-0885\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2008-0885.html\");\n script_cve_id(\"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.13.0.1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.13.0.1.el5~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.13.0.1.el5PAE~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.13.0.1.el5debug~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"ocfs2\", rpm:\"ocfs2~2.6.18~92.1.13.0.1.el5xen~1.2.9~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.13.0.1.el5~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.13.0.1.el5PAE~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.13.0.1.el5debug~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"oracleasm\", rpm:\"oracleasm~2.6.18~92.1.13.0.1.el5xen~2.0.4~1.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-27T10:56:04", "bulletinFamily": "scanner", "description": "Check for the Version of kernel", "modified": "2017-07-12T00:00:00", "published": "2009-03-06T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=870087", "id": "OPENVAS:870087", "title": "RedHat Update for kernel RHSA-2008:0885-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for kernel RHSA-2008:0885-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The kernel packages contain the Linux kernel, the core of any Linux\n operating system.\n\n Security fixes:\n \n * a missing capability check was found in the Linux kernel do_change_type\n routine. This could allow a local unprivileged user to gain privileged\n access or cause a denial of service. (CVE-2008-2931, Important)\n \n * a flaw was found in the Linux kernel Direct-IO implementation. This could\n allow a local unprivileged user to cause a denial of service.\n (CVE-2007-6716, Important)\n \n * Tobias Klein reported a missing check in the Linux kernel Open Sound\n System (OSS) implementation. This deficiency could lead to a possible\n information leak. (CVE-2008-3272, Moderate)\n \n * a deficiency was found in the Linux kernel virtual filesystem (VFS)\n implementation. This could allow a local unprivileged user to attempt file\n creation within deleted directories, possibly causing a denial of service.\n (CVE-2008-3275, Moderate)\n \n * a flaw was found in the Linux kernel tmpfs implementation. This could\n allow a local unprivileged user to read sensitive information from the\n kernel. (CVE-2007-6417, Moderate)\n \n Bug fixes:\n \n * when copying a small IPoIB packet from the original skb it was received\n in to a new, smaller skb, all fields in the new skb were not initialized.\n This may have caused a kernel oops.\n \n * previously, data may have been written beyond the end of an array,\n causing memory corruption on certain systems, resulting in hypervisor\n crashes during context switching.\n \n * a kernel crash may have occurred on heavily-used Samba servers after 24\n to 48 hours of use.\n \n * under heavy memory pressure, pages may have been swapped out from under\n the SGI Altix XPMEM driver, causing silent data corruption in the kernel.\n \n * the ixgbe driver is untested, but support was advertised for the Intel\n 82598 network card. If this card was present when the ixgbe driver was\n loaded, a NULL pointer dereference and a panic occurred.\n \n * on certain systems, if multiple InfiniBand queue pairs simultaneously\n fell into an error state, an overrun may have occurred, stopping traffic.\n \n * with bridging, when forward delay was set to zero, setting an interface\n to the forwarding state was delayed by one or possibly two timers,\n depending on whether STP was enabled. This may have caused long delays in\n moving an interface to the forwarding state. This issue caused packet loss\n when migrating virtual machines, preventing them from being migrated\n without interrupting applications.\n \n * on certain multinode systems, IPMI device nodes ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_affected = \"kernel on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-September/msg00013.html\");\n script_id(870087);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0885-01\");\n script_cve_id(\"CVE-2008-2931\", \"CVE-2008-3275\", \"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-3272\");\n script_name( \"RedHat Update for kernel RHSA-2008:0885-01\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE\", rpm:\"kernel-PAE~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-debuginfo\", rpm:\"kernel-PAE-debuginfo~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-PAE-devel\", rpm:\"kernel-PAE-devel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common\", rpm:\"kernel-debuginfo-common~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-debuginfo\", rpm:\"kernel-xen-debuginfo~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen-devel\", rpm:\"kernel-xen-devel~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.18~92.1.13.el5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:55:41", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-13T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=65920", "id": "OPENVAS:65920", "title": "SLES10: Security update for Linux Kernel (x86)", "type": "openvas", "sourceData": "#\n#VID slesp2-kernel-5565\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Linux Kernel (x86)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_id(65920);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES10: Security update for Linux Kernel (x86)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump\", rpm:\"kernel-kdump~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmi\", rpm:\"kernel-vmi~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmipae\", rpm:\"kernel-vmipae~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:38:39", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-13T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065920", "id": "OPENVAS:136141256231065920", "title": "SLES10: Security update for Linux Kernel (x86)", "type": "openvas", "sourceData": "#\n#VID slesp2-kernel-5565\n# OpenVAS Vulnerability Test\n# $\n# Description: Security update for Linux Kernel (x86)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-kdump\n kernel-smp\n kernel-source\n kernel-syms\n kernel-vmi\n kernel-vmipae\n kernel-xen\n kernel-xenpae\n\n\nMore details may also be found by searching for the SuSE\nEnterprise Server 10 patch database located at\nhttp://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65920\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-13 18:25:40 +0200 (Tue, 13 Oct 2009)\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES10: Security update for Linux Kernel (x86)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-kdump\", rpm:\"kernel-kdump~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmi\", rpm:\"kernel-vmi~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-vmipae\", rpm:\"kernel-vmipae~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.16.60~0.29\", rls:\"SLES10.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-12T11:19:56", "bulletinFamily": "scanner", "description": "Check for the Version of kernel", "modified": "2017-12-08T00:00:00", "published": "2009-01-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=850019", "id": "OPENVAS:850019", "title": "SuSE Update for kernel SUSE-SA:2008:048", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2008_048.nasl 8050 2017-12-08 09:34:29Z santu $\n#\n# SuSE Update for kernel SUSE-SA:2008:048\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"This kernel security update for SUSE Linux Enterprise 10 Service Pack\n 2 fixes lots of bugs and some security issues:\n\n CVE-2008-0598: Fixed an information leak in the x86_64 version of\n the string copy routines.\n\n CVE-2008-1673: Fixed range checking in previous ASN.1 fixes for CIFS\n and SNMP NAT netfilter module.\n\n CVE-2008-3272: Fixed range checking in the snd_seq OSS ioctl, which\n could be used to leak information from the kernel.\n\n CVE-2008-3275: Fixed a memory leak when looking up deleted directories\n which could be used to run the system out of memory.\n\n The full amount of changes can be reviewed in the RPM changelog.\";\n\ntag_impact = \"remote denial of service\";\ntag_affected = \"kernel on SLE SDK 10 SP2, SUSE Linux Enterprise Desktop 10 SP2, SUSE Linux Enterprise 10 SP2 DEBUGINFO, SUSE Linux Enterprise Server 10 SP2\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_id(850019);\n script_version(\"$Revision: 8050 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-08 10:34:29 +0100 (Fri, 08 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-23 16:44:26 +0100 (Fri, 23 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"SUSE-SA\", value: \"2008-048\");\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_name( \"SuSE Update for kernel SUSE-SA:2008:048\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"LES10SP2\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.30\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.30\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.30\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.30\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.30\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.16.60~0.29\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.29\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.29\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.29\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.29\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.29\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.16.60~0.29\", rls:\"LES10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"SLESDK10SP2\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.30\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.30\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.30\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.30\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.30\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.16.60~0.29\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.29\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.29\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.29\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.29\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.29\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.16.60~0.29\", rls:\"SLESDK10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"SLESDk10SP2\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.16.60~0.30\", rls:\"SLESDk10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.16.60~0.30\", rls:\"SLESDk10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.16.60~0.30\", rls:\"SLESDk10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.16.60~0.30\", rls:\"SLESDk10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.16.60~0.30\", rls:\"SLESDk10SP2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-12T11:20:11", "bulletinFamily": "scanner", "description": "Check for the Version of kernel", "modified": "2017-12-08T00:00:00", "published": "2009-01-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=850008", "id": "OPENVAS:850008", "title": "SuSE Update for kernel SUSE-SA:2008:047", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2008_047.nasl 8050 2017-12-08 09:34:29Z santu $\n#\n# SuSE Update for kernel SUSE-SA:2008:047\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Linux kernel in the SUSE Linux Enterprise Server 9\n Service Pack 4 was released to fix various bugs and also some security\n problems:\n\n CVE-2007-6716: Zero the struct dio with kzalloc instead of doing\n it member-wise, this could have leaked information from the kernel.\n\n CVE-2008-3525: Added missing capability checks in sbni_ioctl().\n\n CVE-2008-0598: On AMD64 some string operations could leak kernel\n information into user space.\n\n CVE-2008-1673: Added range checking in ASN.1 handling for the CIFS and\n SNMP NAT netfilter modules.\n\n CVE-2008-3272: Fixed range checking in the snd_seq OSS ioctl, which\n could be used to leak information from the kernel.\n\n CVE-2008-2812: Various NULL ptr checks have been added to tty op\n functions, which might have been used by local attackers to execute\n code. We think that this affects only devices openable by root, so the\n impact is limited.\n\n More details are available in the package changelog.\";\n\ntag_impact = \"remote denial of service\";\ntag_affected = \"kernel on SUSE SLES 9, Novell Linux Desktop 9, Open Enterprise Server, Novell Linux POS 9\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_id(850008);\n script_version(\"$Revision: 8050 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-08 10:34:29 +0100 (Fri, 08 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-23 16:44:26 +0100 (Fri, 23 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"SUSE-SA\", value: \"2008-047\");\n script_cve_id(\"CVE-2007-6716\", \"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-2812\", \"CVE-2008-3272\", \"CVE-2008-3525\");\n script_name( \"SuSE Update for kernel SUSE-SA:2008:047\");\n\n script_summary(\"Check for the Version of kernel\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"OES\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-um\", rpm:\"kernel-um~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"um-host-install-initrd\", rpm:\"um-host-install-initrd~1.0~48.28\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"um-host-kernel\", rpm:\"um-host-kernel~2.6.5~7.314\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"NLDk9\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-um\", rpm:\"kernel-um~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xen\", rpm:\"kernel-xen~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-xenpae\", rpm:\"kernel-xenpae~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"um-host-install-initrd\", rpm:\"um-host-install-initrd~1.0~48.28\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"um-host-kernel\", rpm:\"um-host-kernel~2.6.5~7.314\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:37:09", "bulletinFamily": "scanner", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-smp\n kernel-source\n kernel-syms\n kernel-um\n kernel-xen\n kernel-xenpae\n um-host-install-initrd\n um-host-kernel\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5036146 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065175", "id": "OPENVAS:136141256231065175", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5036146.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-bigsmp\n kernel-debug\n kernel-default\n kernel-smp\n kernel-source\n kernel-syms\n kernel-um\n kernel-xen\n kernel-xenpae\n um-host-install-initrd\n um-host-kernel\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5036146 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65175\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2007-6716\", \"CVE-2008-3525\", \"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-3272\", \"CVE-2008-2812\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-bigsmp\", rpm:\"kernel-bigsmp~2.6.5~7.314\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2019-11-01T02:21:02", "bulletinFamily": "scanner", "description": "Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service or arbitrary code execution. The\nCommon Vulnerabilities and Exposures project identifies the following\nproblems :\n\n - CVE-2007-6282\n Dirk Nehring discovered a vulnerability in the IPsec\n code that allows remote users to cause a denial of\n service by sending a specially crafted ESP packet.\n\n - CVE-2008-0598\n Tavis Ormandy discovered a vulnerability that allows\n local users to access uninitialized kernel memory,\n possibly leaking sensitive data. This issue is specific\n to the amd64-flavour kernel images.\n\n - CVE-2008-2729\n Andi Kleen discovered an issue where uninitialized\n kernel memory was being leaked to userspace during an\n exception. This issue may allow local users to gain\n access to sensitive data. Only the amd64-flavour Debian\n kernel images are affected.\n\n - CVE-2008-2812\n Alan Cox discovered an issue in multiple tty drivers\n that allows local users to trigger a denial of service\n (NULL pointer dereference) and possibly obtain elevated\n privileges.\n\n - CVE-2008-2826\n Gabriel Campana discovered an integer overflow in the\n sctp code that can be exploited by local users to cause\n a denial of service.\n\n - CVE-2008-2931\n Miklos Szeredi reported a missing privilege check in the\n do_change_type() function. This allows local,\n unprivileged users to change the properties of mount\n points.\n\n - CVE-2008-3272\n Tobias Klein reported a locally exploitable data leak in\n the snd_seq_oss_synth_make_info() function. This may\n allow local users to gain access to sensitive\n information.\n\n - CVE-2008-3275\n Zoltan Sogor discovered a coding error in the VFS that\n allows local users to exploit a kernel memory leak\n resulting in a denial of service.", "modified": "2019-11-02T00:00:00", "id": "DEBIAN_DSA-1630.NASL", "href": "https://www.tenable.com/plugins/nessus/34032", "published": "2008-08-24T00:00:00", "title": "Debian DSA-1630-1 : linux-2.6 - denial of service/information leak", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1630. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(34032);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/08/02 13:32:21\");\n\n script_cve_id(\"CVE-2007-6282\", \"CVE-2008-0598\", \"CVE-2008-2729\", \"CVE-2008-2812\", \"CVE-2008-2826\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_bugtraq_id(29081, 29942, 30076, 30126, 30559, 30647);\n script_xref(name:\"DSA\", value:\"1630\");\n\n script_name(english:\"Debian DSA-1630-1 : linux-2.6 - denial of service/information leak\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service or arbitrary code execution. The\nCommon Vulnerabilities and Exposures project identifies the following\nproblems :\n\n - CVE-2007-6282\n Dirk Nehring discovered a vulnerability in the IPsec\n code that allows remote users to cause a denial of\n service by sending a specially crafted ESP packet.\n\n - CVE-2008-0598\n Tavis Ormandy discovered a vulnerability that allows\n local users to access uninitialized kernel memory,\n possibly leaking sensitive data. This issue is specific\n to the amd64-flavour kernel images.\n\n - CVE-2008-2729\n Andi Kleen discovered an issue where uninitialized\n kernel memory was being leaked to userspace during an\n exception. This issue may allow local users to gain\n access to sensitive data. Only the amd64-flavour Debian\n kernel images are affected.\n\n - CVE-2008-2812\n Alan Cox discovered an issue in multiple tty drivers\n that allows local users to trigger a denial of service\n (NULL pointer dereference) and possibly obtain elevated\n privileges.\n\n - CVE-2008-2826\n Gabriel Campana discovered an integer overflow in the\n sctp code that can be exploited by local users to cause\n a denial of service.\n\n - CVE-2008-2931\n Miklos Szeredi reported a missing privilege check in the\n do_change_type() function. This allows local,\n unprivileged users to change the properties of mount\n points.\n\n - CVE-2008-3272\n Tobias Klein reported a locally exploitable data leak in\n the snd_seq_oss_synth_make_info() function. This may\n allow local users to gain access to sensitive\n information.\n\n - CVE-2008-3275\n Zoltan Sogor discovered a coding error in the VFS that\n allows local users to exploit a kernel memory leak\n resulting in a denial of service.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-6282\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-0598\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-2729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-2812\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-2826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-2931\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3272\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-3275\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2008/dsa-1630\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the linux-2.6, fai-kernels, and user-mode-linux packages.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 2.6.18.dfsg.1-22etch2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(16, 20, 189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:linux-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/08/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/08/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"4.0\", prefix:\"fai-kernels\", reference:\"1.17+etch.22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-doc-2.6.18\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-486\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-686-bigmem\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-alpha\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-arm\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-hppa\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-i386\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-ia64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-mips\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-mipsel\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-powerpc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-s390\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-all-sparc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-alpha-generic\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-alpha-legacy\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-alpha-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-footbridge\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-iop32x\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-itanium\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-ixp4xx\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-k7\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-mckinley\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-parisc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-parisc-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-parisc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-parisc64-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-powerpc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-powerpc-miboot\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-powerpc-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-powerpc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-prep\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-qemu\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-r3k-kn02\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-r4k-ip22\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-r4k-kn04\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-r5k-cobalt\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-r5k-ip32\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-rpc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-s390\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-s390x\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-s3c2410\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-sb1-bcm91250a\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-sb1a-bcm91480b\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-sparc32\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-sparc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-sparc64-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver-alpha\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver-k7\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver-powerpc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver-powerpc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver-s390x\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-vserver-sparc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-xen\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-xen-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-xen-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-xen-vserver\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-xen-vserver-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-headers-2.6.18-6-xen-vserver-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-486\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-686-bigmem\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-alpha-generic\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-alpha-legacy\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-alpha-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-footbridge\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-iop32x\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-itanium\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-ixp4xx\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-k7\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-mckinley\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-parisc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-parisc-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-parisc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-parisc64-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-powerpc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-powerpc-miboot\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-powerpc-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-powerpc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-prep\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-qemu\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-r3k-kn02\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-r4k-ip22\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-r4k-kn04\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-r5k-cobalt\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-r5k-ip32\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-rpc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-s390\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-s390-tape\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-s390x\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-s3c2410\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-sb1-bcm91250a\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-sb1a-bcm91480b\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-sparc32\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-sparc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-sparc64-smp\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-vserver-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-vserver-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-vserver-k7\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-vserver-powerpc\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-vserver-powerpc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-vserver-s390x\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-vserver-sparc64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-xen-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-xen-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-xen-vserver-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-image-2.6.18-6-xen-vserver-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-manual-2.6.18\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-modules-2.6.18-6-xen-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-modules-2.6.18-6-xen-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-modules-2.6.18-6-xen-vserver-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-modules-2.6.18-6-xen-vserver-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-patch-debian-2.6.18\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-source-2.6.18\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-support-2.6.18-6\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"linux-tree-2.6.18\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"user-mode-linux\", reference:\"2.6.18-1um-2etch.22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"xen-linux-system-2.6.18-6-xen-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"xen-linux-system-2.6.18-6-xen-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"xen-linux-system-2.6.18-6-xen-vserver-686\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"xen-linux-system-2.6.18-6-xen-vserver-amd64\", reference:\"2.6.18.dfsg.1-22etch2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:38:16", "bulletinFamily": "scanner", "description": "It was discovered that there were multiple NULL pointer function\ndereferences in the Linux kernel terminal handling code. A local\nattacker could exploit this to execute arbitrary code as root, or\ncrash the system, leading to a denial of service. (CVE-2008-2812)\n\nThe do_change_type routine did not correctly validation administrative\nusers. A local attacker could exploit this to block mount points or\ncause private mounts to be shared, leading to denial of service or a\npossible loss of privacy. (CVE-2008-2931)\n\nTobias Klein discovered that the OSS interface through ALSA did not\ncorrectly validate the device number. A local attacker could exploit\nthis to access sensitive kernel memory, leading to a denial of service\nor a loss of privacy. (CVE-2008-3272)\n\nZoltan Sogor discovered that new directory entries could be added to\nalready deleted directories. A local attacker could exploit this,\nfilling up available memory and disk space, leading to a denial of\nservice. (CVE-2008-3275)\n\nIn certain situations, the fix for CVE-2008-0598 from USN-623-1 was\ncausing infinite loops in the writev syscall. This update corrects the\nmistake. We apologize for the inconvenience.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-637-1.NASL", "href": "https://www.tenable.com/plugins/nessus/34048", "published": "2008-08-26T00:00:00", "title": "Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : linux, linux-source-2.6.15/20/22 vulnerabilities (USN-637-1)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-637-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(34048);\n script_version(\"1.22\");\n script_cvs_date(\"Date: 2019/08/02 13:33:02\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-2812\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_bugtraq_id(30076, 30126, 30559, 30647);\n script_xref(name:\"USN\", value:\"637-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : linux, linux-source-2.6.15/20/22 vulnerabilities (USN-637-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that there were multiple NULL pointer function\ndereferences in the Linux kernel terminal handling code. A local\nattacker could exploit this to execute arbitrary code as root, or\ncrash the system, leading to a denial of service. (CVE-2008-2812)\n\nThe do_change_type routine did not correctly validation administrative\nusers. A local attacker could exploit this to block mount points or\ncause private mounts to be shared, leading to denial of service or a\npossible loss of privacy. (CVE-2008-2931)\n\nTobias Klein discovered that the OSS interface through ALSA did not\ncorrectly validate the device number. A local attacker could exploit\nthis to access sensitive kernel memory, leading to a denial of service\nor a loss of privacy. (CVE-2008-3272)\n\nZoltan Sogor discovered that new directory entries could be added to\nalready deleted directories. A local attacker could exploit this,\nfilling up available memory and disk space, leading to a denial of\nservice. (CVE-2008-3275)\n\nIn certain situations, the fix for CVE-2008-0598 from USN-623-1 was\ncausing infinite loops in the writev syscall. This update corrects the\nmistake. We apologize for the inconvenience.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/637-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.20\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.22\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.24\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-openvz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-ume\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-cell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-lpiacompat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-openvz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-ume\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-debug-2.6-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-libc-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.20\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.22\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.24\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/08/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/08/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06|7\\.04|7\\.10|8\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 7.04 / 7.10 / 8.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2008-0598\", \"CVE-2008-2812\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-637-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-doc-2.6.15\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-headers-2.6.15-52\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-headers-2.6.15-52-386\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-headers-2.6.15-52-686\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-headers-2.6.15-52-amd64-generic\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-headers-2.6.15-52-amd64-k8\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-headers-2.6.15-52-amd64-server\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-headers-2.6.15-52-amd64-xeon\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-headers-2.6.15-52-server\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-image-2.6.15-52-386\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-image-2.6.15-52-686\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-image-2.6.15-52-amd64-generic\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-image-2.6.15-52-amd64-k8\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-image-2.6.15-52-amd64-server\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-image-2.6.15-52-amd64-xeon\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-image-2.6.15-52-server\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-kernel-devel\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"linux-source-2.6.15\", pkgver:\"2.6.15-52.71\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-doc-2.6.20\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-headers-2.6.20-17\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-headers-2.6.20-17-386\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-headers-2.6.20-17-generic\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-headers-2.6.20-17-lowlatency\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-headers-2.6.20-17-server\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-image-2.6.20-17-386\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-image-2.6.20-17-generic\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-image-2.6.20-17-lowlatency\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-image-2.6.20-17-server\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-image-debug-2.6.20-17-386\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-image-debug-2.6.20-17-generic\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-image-debug-2.6.20-17-lowlatency\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-image-debug-2.6.20-17-server\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-kernel-devel\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-libc-dev\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"linux-source-2.6.20\", pkgver:\"2.6.20-17.39\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-doc-2.6.22\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-headers-2.6.22-15\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-headers-2.6.22-15-386\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-headers-2.6.22-15-generic\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-headers-2.6.22-15-rt\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-headers-2.6.22-15-server\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-headers-2.6.22-15-ume\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-headers-2.6.22-15-virtual\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-headers-2.6.22-15-xen\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-386\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-cell\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-generic\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-lpia\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-lpiacompat\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-rt\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-server\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-ume\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-virtual\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-2.6.22-15-xen\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-debug-2.6.22-15-386\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-debug-2.6.22-15-generic\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-debug-2.6.22-15-server\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-image-debug-2.6.22-15-virtual\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-kernel-devel\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-libc-dev\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"linux-source-2.6.22\", pkgver:\"2.6.22-15.58\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-doc-2.6.24\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-19\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-19-386\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-19-generic\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-19-openvz\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-19-rt\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-19-server\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-19-virtual\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-headers-2.6.24-19-xen\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-386\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-generic\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-lpia\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-lpiacompat\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-openvz\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-rt\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-server\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-virtual\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-2.6.24-19-xen\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-debug-2.6.24-19-386\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-debug-2.6.24-19-generic\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-debug-2.6.24-19-server\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-image-debug-2.6.24-19-virtual\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-kernel-devel\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-libc-dev\", pkgver:\"2.6.24-19.41\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"linux-source-2.6.24\", pkgver:\"2.6.24-19.41\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.15 / linux-doc-2.6.20 / linux-doc-2.6.22 / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:30:02", "bulletinFamily": "scanner", "description": "This update of the SUSE Linux Enterprise 10 Service Pack 1 kernel\ncontains lots of bugfixes and several security fixes :\n\n - Added missing capability checks in sbni_ioctl().\n (CVE-2008-3525)\n\n - On AMD64 some string operations could leak kernel\n information into userspace. (CVE-2008-0598)\n\n - Added range checking in ASN.1 handling for the CIFS and\n SNMP NAT netfilter modules. (CVE-2008-1673)\n\n - Fixed range checking in the snd_seq OSS ioctl, which\n could be used to leak information from the kernel.\n (CVE-2008-3272)\n\n - Fixed a memory leak when looking up deleted directories\n which could be used to run the system out of memory.\n (CVE-2008-3275)\n\n - The do_change_type function in fs/namespace.c did not\n verify that the caller has the CAP_SYS_ADMIN capability,\n which allows local users to gain privileges or cause a\n denial of service by modifying the properties of a\n mountpoint. (CVE-2008-2931)\n\n - Various NULL ptr checks have been added to tty op\n functions, which might have been used by local attackers\n to execute code. We think that this affects only devices\n openable by root, so the impact is limited.\n (CVE-2008-2812)", "modified": "2019-11-02T00:00:00", "id": "SUSE_KERNEL-5566.NASL", "href": "https://www.tenable.com/plugins/nessus/34331", "published": "2008-10-02T00:00:00", "title": "SuSE 10 Security Update : the Linux Kernel (x86) (ZYPP Patch Number 5566)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(34331);\n script_version (\"1.18\");\n script_cvs_date(\"Date: 2019/10/25 13:36:32\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-2812\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\", \"CVE-2008-3525\");\n\n script_name(english:\"SuSE 10 Security Update : the Linux Kernel (x86) (ZYPP Patch Number 5566)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update of the SUSE Linux Enterprise 10 Service Pack 1 kernel\ncontains lots of bugfixes and several security fixes :\n\n - Added missing capability checks in sbni_ioctl().\n (CVE-2008-3525)\n\n - On AMD64 some string operations could leak kernel\n information into userspace. (CVE-2008-0598)\n\n - Added range checking in ASN.1 handling for the CIFS and\n SNMP NAT netfilter modules. (CVE-2008-1673)\n\n - Fixed range checking in the snd_seq OSS ioctl, which\n could be used to leak information from the kernel.\n (CVE-2008-3272)\n\n - Fixed a memory leak when looking up deleted directories\n which could be used to run the system out of memory.\n (CVE-2008-3275)\n\n - The do_change_type function in fs/namespace.c did not\n verify that the caller has the CAP_SYS_ADMIN capability,\n which allows local users to gain privileges or cause a\n denial of service by modifying the properties of a\n mountpoint. (CVE-2008-2931)\n\n - Various NULL ptr checks have been added to tty op\n functions, which might have been used by local attackers\n to execute code. We think that this affects only devices\n openable by root, so the impact is limited.\n (CVE-2008-2812)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-0598.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-1673.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-2812.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-2931.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3272.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3275.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3525.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 5566.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(20, 119, 189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/10/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"i586\", reference:\"kernel-bigsmp-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"i586\", reference:\"kernel-default-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"i586\", reference:\"kernel-smp-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"i586\", reference:\"kernel-source-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"i586\", reference:\"kernel-syms-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"i586\", reference:\"kernel-xen-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"i586\", reference:\"kernel-xenpae-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-bigsmp-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-debug-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-default-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-kdump-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-smp-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-source-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-syms-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-xen-2.6.16.54-0.2.10\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"i586\", reference:\"kernel-xenpae-2.6.16.54-0.2.10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:30:02", "bulletinFamily": "scanner", "description": "This update of the SUSE Linux Enterprise 10 Service Pack 1 kernel\ncontains lots of bugfixes and several security fixes :\n\n - Added missing capability checks in sbni_ioctl().\n (CVE-2008-3525)\n\n - On AMD64 some string operations could leak kernel\n information into userspace. (CVE-2008-0598)\n\n - Added range checking in ASN.1 handling for the CIFS and\n SNMP NAT netfilter modules. (CVE-2008-1673)\n\n - Fixed range checking in the snd_seq OSS ioctl, which\n could be used to leak information from the kernel.\n (CVE-2008-3272)\n\n - Fixed a memory leak when looking up deleted directories\n which could be used to run the system out of memory.\n (CVE-2008-3275)\n\n - The do_change_type function in fs/namespace.c did not\n verify that the caller has the CAP_SYS_ADMIN capability,\n which allows local users to gain privileges or cause a\n denial of service by modifying the properties of a\n mountpoint. (CVE-2008-2931)\n\n - Various NULL ptr checks have been added to the tty ops\n functions, which might have been used by local attackers\n to execute code. We think that this affects only devices\n openable by root, so the impact is limited.\n (CVE-2008-2812)", "modified": "2019-11-02T00:00:00", "id": "SUSE_KERNEL-5608.NASL", "href": "https://www.tenable.com/plugins/nessus/59131", "published": "2012-05-17T00:00:00", "title": "SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5608)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59131);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/10/25 13:36:32\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-2812\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\", \"CVE-2008-3525\");\n\n script_name(english:\"SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5608)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update of the SUSE Linux Enterprise 10 Service Pack 1 kernel\ncontains lots of bugfixes and several security fixes :\n\n - Added missing capability checks in sbni_ioctl().\n (CVE-2008-3525)\n\n - On AMD64 some string operations could leak kernel\n information into userspace. (CVE-2008-0598)\n\n - Added range checking in ASN.1 handling for the CIFS and\n SNMP NAT netfilter modules. (CVE-2008-1673)\n\n - Fixed range checking in the snd_seq OSS ioctl, which\n could be used to leak information from the kernel.\n (CVE-2008-3272)\n\n - Fixed a memory leak when looking up deleted directories\n which could be used to run the system out of memory.\n (CVE-2008-3275)\n\n - The do_change_type function in fs/namespace.c did not\n verify that the caller has the CAP_SYS_ADMIN capability,\n which allows local users to gain privileges or cause a\n denial of service by modifying the properties of a\n mountpoint. (CVE-2008-2931)\n\n - Various NULL ptr checks have been added to the tty ops\n functions, which might have been used by local attackers\n to execute code. We think that this affects only devices\n openable by root, so the impact is limited.\n (CVE-2008-2812)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-0598.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-1673.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-2812.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-2931.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3272.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3275.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3525.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 5608.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(20, 119, 189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/05/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"kernel-debug-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"kernel-kdump-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.54-0.2.11\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.54-0.2.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:12:47", "bulletinFamily": "scanner", "description": "Security fixes :\n\n - a missing capability check was found in the Linux kernel\n do_change_type routine. This could allow a local\n unprivileged user to gain privileged access or cause a\n denial of service. (CVE-2008-2931, Important)\n\n - a flaw was found in the Linux kernel Direct-IO\n implementation. This could allow a local unprivileged\n user to cause a denial of service. (CVE-2007-6716,\n Important)\n\n - Tobias Klein reported a missing check in the Linux\n kernel Open Sound System (OSS) implementation. This\n deficiency could lead to a possible information leak.\n (CVE-2008-3272, Moderate)\n\n - a deficiency was found in the Linux kernel virtual\n filesystem (VFS) implementation. This could allow a\n local unprivileged user to attempt file creation within\n deleted directories, possibly causing a denial of\n service. (CVE-2008-3275, Moderate)\n\n - a flaw was found in the Linux kernel tmpfs\n implementation. This could allow a local unprivileged\n user to read sensitive information from the kernel.\n (CVE-2007-6417, Moderate)\n\nBug fixes :\n\n - when copying a small IPoIB packet from the original skb\n it was received in to a new, smaller skb, all fields in\n the new skb were not initialized. This may have caused a\n kernel oops.\n\n - previously, data may have been written beyond the end of\n an array, causing memory corruption on certain systems,\n resulting in hypervisor crashes during context\n switching.\n\n - a kernel crash may have occurred on heavily-used Samba\n servers after 24 to 48 hours of use.\n\n - under heavy memory pressure, pages may have been swapped\n out from under the SGI Altix XPMEM driver, causing\n silent data corruption in the kernel.\n\n - the ixgbe driver is untested, but support was advertised\n for the Intel 82598 network card. If this card was\n present when the ixgbe driver was loaded, a NULL pointer\n dereference and a panic occurred.\n\n - on certain systems, if multiple InfiniBand queue pairs\n simultaneously fell into an error state, an overrun may\n have occurred, stopping traffic.\n\n - with bridging, when forward delay was set to zero,\n setting an interface to the forwarding state was delayed\n by one or possibly two timers, depending on whether STP\n was enabled. This may have caused long delays in moving\n an interface to the forwarding state. This issue caused\n packet loss when migrating virtual machines, preventing\n them from being migrated without interrupting\n applications.\n\n - on certain multinode systems, IPMI device nodes were\n created in reverse order of where they physically\n resided.\n\n - process hangs may have occurred while accessing\n application data files via asynchronous direct I/O\n system calls.\n\n - on systems with heavy lock traffic, a possible deadlock\n may have caused anything requiring locks over NFS to\n stop, or be very slow. Errors such as ", "modified": "2019-11-02T00:00:00", "id": "SL_20080924_KERNEL_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60477", "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : kernel on SL5.x i386/x86_64", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(60477);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/10/25 13:36:17\");\n\n script_cve_id(\"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n\n script_name(english:\"Scientific Linux Security Update : kernel on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security fixes :\n\n - a missing capability check was found in the Linux kernel\n do_change_type routine. This could allow a local\n unprivileged user to gain privileged access or cause a\n denial of service. (CVE-2008-2931, Important)\n\n - a flaw was found in the Linux kernel Direct-IO\n implementation. This could allow a local unprivileged\n user to cause a denial of service. (CVE-2007-6716,\n Important)\n\n - Tobias Klein reported a missing check in the Linux\n kernel Open Sound System (OSS) implementation. This\n deficiency could lead to a possible information leak.\n (CVE-2008-3272, Moderate)\n\n - a deficiency was found in the Linux kernel virtual\n filesystem (VFS) implementation. This could allow a\n local unprivileged user to attempt file creation within\n deleted directories, possibly causing a denial of\n service. (CVE-2008-3275, Moderate)\n\n - a flaw was found in the Linux kernel tmpfs\n implementation. This could allow a local unprivileged\n user to read sensitive information from the kernel.\n (CVE-2007-6417, Moderate)\n\nBug fixes :\n\n - when copying a small IPoIB packet from the original skb\n it was received in to a new, smaller skb, all fields in\n the new skb were not initialized. This may have caused a\n kernel oops.\n\n - previously, data may have been written beyond the end of\n an array, causing memory corruption on certain systems,\n resulting in hypervisor crashes during context\n switching.\n\n - a kernel crash may have occurred on heavily-used Samba\n servers after 24 to 48 hours of use.\n\n - under heavy memory pressure, pages may have been swapped\n out from under the SGI Altix XPMEM driver, causing\n silent data corruption in the kernel.\n\n - the ixgbe driver is untested, but support was advertised\n for the Intel 82598 network card. If this card was\n present when the ixgbe driver was loaded, a NULL pointer\n dereference and a panic occurred.\n\n - on certain systems, if multiple InfiniBand queue pairs\n simultaneously fell into an error state, an overrun may\n have occurred, stopping traffic.\n\n - with bridging, when forward delay was set to zero,\n setting an interface to the forwarding state was delayed\n by one or possibly two timers, depending on whether STP\n was enabled. This may have caused long delays in moving\n an interface to the forwarding state. This issue caused\n packet loss when migrating virtual machines, preventing\n them from being migrated without interrupting\n applications.\n\n - on certain multinode systems, IPMI device nodes were\n created in reverse order of where they physically\n resided.\n\n - process hangs may have occurred while accessing\n application data files via asynchronous direct I/O\n system calls.\n\n - on systems with heavy lock traffic, a possible deadlock\n may have caused anything requiring locks over NFS to\n stop, or be very slow. Errors such as 'lockd: server\n [IP] not responding, timed out' were logged on client\n systems.\n\n - unexpected removals of USB devices may have caused a\n NULL pointer dereference in kobject_get_path.\n\n - on Itanium-based systems, repeatedly creating and\n destroying Windows guests may have caused Dom0 to crash,\n due to the 'XENMEM_add_to_physmap' hypercall, used by\n para-virtualized drivers on HVM, being SMP-unsafe.\n\n - when using an MD software RAID, crashes may have\n occurred when devices were removed or changed while\n being iterated through. Correct locking is now used.\n\n - break requests had no effect when using 'Serial Over\n Lan' with the Intel 82571 network card. This issue may\n have caused log in problems.\n\n - on Itanium-based systems, module_free() referred the\n first parameter before checking it was valid. This may\n have caused a kernel panic when exiting SystemTap.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0809&L=scientific-linux-errata&T=0&P=805\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?92d7044b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/12/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"kernel-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-debug-devel-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-devel-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-doc-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"kernel-xen-devel-2.6.18-92.1.13.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:18:43", "bulletinFamily": "scanner", "description": "The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - CVE-2008-2931: missing check before setting mount\n propagation\n\n - CVE-2007-6716: dio: use kzalloc to zero out struct dio\n\n - CVE-2008-3272: snd_seq_oss_synth_make_info leak\n\n - CVE-2008-3275: vfs: fix lookup on deleted directory\n\n - CVE-2007-6417: tmpfs: restore missing clear_highpage", "modified": "2019-11-02T00:00:00", "id": "ORACLEVM_OVMSA-2008-2006.NASL", "href": "https://www.tenable.com/plugins/nessus/79448", "published": "2014-11-26T00:00:00", "title": "OracleVM 2.1 : kernel (OVMSA-2008-2006)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2008-2006.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(79448);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/10/25 13:36:06\");\n\n script_cve_id(\"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_bugtraq_id(27694, 30126, 30559, 30647, 31515);\n\n script_name(english:\"OracleVM 2.1 : kernel (OVMSA-2008-2006)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - CVE-2008-2931: missing check before setting mount\n propagation\n\n - CVE-2007-6716: dio: use kzalloc to zero out struct dio\n\n - CVE-2008-3272: snd_seq_oss_synth_make_info leak\n\n - CVE-2008-3275: vfs: fix lookup on deleted directory\n\n - CVE-2007-6417: tmpfs: restore missing clear_highpage\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2008-September/000004.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6b54f55b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-BOOT-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-ovs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-ovs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:2.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/12/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/11/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"2\\.1\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 2.1\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS2.1\", reference:\"kernel-BOOT-2.6.18-8.1.15.1.20.el5\")) flag++;\nif (rpm_check(release:\"OVS2.1\", reference:\"kernel-BOOT-devel-2.6.18-8.1.15.1.20.el5\")) flag++;\nif (rpm_check(release:\"OVS2.1\", reference:\"kernel-kdump-2.6.18-8.1.15.1.20.el5\")) flag++;\nif (rpm_check(release:\"OVS2.1\", reference:\"kernel-kdump-devel-2.6.18-8.1.15.1.20.el5\")) flag++;\nif (rpm_check(release:\"OVS2.1\", reference:\"kernel-ovs-2.6.18-8.1.15.1.20.el5\")) flag++;\nif (rpm_check(release:\"OVS2.1\", reference:\"kernel-ovs-devel-2.6.18-8.1.15.1.20.el5\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-BOOT / kernel-BOOT-devel / kernel-kdump / kernel-kdump-devel / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T02:15:08", "bulletinFamily": "scanner", "description": "Updated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* a missing capability check was found in the Linux kernel\ndo_change_type routine. This could allow a local unprivileged user to\ngain privileged access or cause a denial of service. (CVE-2008-2931,\nImportant)\n\n* a flaw was found in the Linux kernel Direct-IO implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2007-6716, Important)\n\n* Tobias Klein reported a missing check in the Linux kernel Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to attempt\nfile creation within deleted directories, possibly causing a denial of\nservice. (CVE-2008-3275, Moderate)\n\n* a flaw was found in the Linux kernel tmpfs implementation. This\ncould allow a local unprivileged user to read sensitive information\nfrom the kernel. (CVE-2007-6417, Moderate)\n\nBug fixes :\n\n* when copying a small IPoIB packet from the original skb it was\nreceived in to a new, smaller skb, all fields in the new skb were not\ninitialized. This may have caused a kernel oops.\n\n* previously, data may have been written beyond the end of an array,\ncausing memory corruption on certain systems, resulting in hypervisor\ncrashes during context switching.\n\n* a kernel crash may have occurred on heavily-used Samba servers after\n24 to 48 hours of use.\n\n* under heavy memory pressure, pages may have been swapped out from\nunder the SGI Altix XPMEM driver, causing silent data corruption in\nthe kernel.\n\n* the ixgbe driver is untested, but support was advertised for the\nIntel 82598 network card. If this card was present when the ixgbe\ndriver was loaded, a NULL pointer dereference and a panic occurred.\n\n* on certain systems, if multiple InfiniBand queue pairs\nsimultaneously fell into an error state, an overrun may have occurred,\nstopping traffic.\n\n* with bridging, when forward delay was set to zero, setting an\ninterface to the forwarding state was delayed by one or possibly two\ntimers, depending on whether STP was enabled. This may have caused\nlong delays in moving an interface to the forwarding state. This issue\ncaused packet loss when migrating virtual machines, preventing them\nfrom being migrated without interrupting applications.\n\n* on certain multinode systems, IPMI device nodes were created in\nreverse order of where they physically resided.\n\n* process hangs may have occurred while accessing application data\nfiles via asynchronous direct I/O system calls.\n\n* on systems with heavy lock traffic, a possible deadlock may have\ncaused anything requiring locks over NFS to stop, or be very slow.\nErrors such as ", "modified": "2019-11-02T00:00:00", "id": "CENTOS_RHSA-2008-0885.NASL", "href": "https://www.tenable.com/plugins/nessus/43710", "published": "2010-01-06T00:00:00", "title": "CentOS 5 : kernel (CESA-2008:0885)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0885 and \n# CentOS Errata and Security Advisory 2008:0885 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(43710);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/10/25 13:36:04\");\n\n script_cve_id(\"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_bugtraq_id(27694, 30647, 31515);\n script_xref(name:\"RHSA\", value:\"2008:0885\");\n\n script_name(english:\"CentOS 5 : kernel (CESA-2008:0885)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* a missing capability check was found in the Linux kernel\ndo_change_type routine. This could allow a local unprivileged user to\ngain privileged access or cause a denial of service. (CVE-2008-2931,\nImportant)\n\n* a flaw was found in the Linux kernel Direct-IO implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2007-6716, Important)\n\n* Tobias Klein reported a missing check in the Linux kernel Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to attempt\nfile creation within deleted directories, possibly causing a denial of\nservice. (CVE-2008-3275, Moderate)\n\n* a flaw was found in the Linux kernel tmpfs implementation. This\ncould allow a local unprivileged user to read sensitive information\nfrom the kernel. (CVE-2007-6417, Moderate)\n\nBug fixes :\n\n* when copying a small IPoIB packet from the original skb it was\nreceived in to a new, smaller skb, all fields in the new skb were not\ninitialized. This may have caused a kernel oops.\n\n* previously, data may have been written beyond the end of an array,\ncausing memory corruption on certain systems, resulting in hypervisor\ncrashes during context switching.\n\n* a kernel crash may have occurred on heavily-used Samba servers after\n24 to 48 hours of use.\n\n* under heavy memory pressure, pages may have been swapped out from\nunder the SGI Altix XPMEM driver, causing silent data corruption in\nthe kernel.\n\n* the ixgbe driver is untested, but support was advertised for the\nIntel 82598 network card. If this card was present when the ixgbe\ndriver was loaded, a NULL pointer dereference and a panic occurred.\n\n* on certain systems, if multiple InfiniBand queue pairs\nsimultaneously fell into an error state, an overrun may have occurred,\nstopping traffic.\n\n* with bridging, when forward delay was set to zero, setting an\ninterface to the forwarding state was delayed by one or possibly two\ntimers, depending on whether STP was enabled. This may have caused\nlong delays in moving an interface to the forwarding state. This issue\ncaused packet loss when migrating virtual machines, preventing them\nfrom being migrated without interrupting applications.\n\n* on certain multinode systems, IPMI device nodes were created in\nreverse order of where they physically resided.\n\n* process hangs may have occurred while accessing application data\nfiles via asynchronous direct I/O system calls.\n\n* on systems with heavy lock traffic, a possible deadlock may have\ncaused anything requiring locks over NFS to stop, or be very slow.\nErrors such as 'lockd: server [IP] not responding, timed out' were\nlogged on client systems.\n\n* unexpected removals of USB devices may have caused a NULL pointer\ndereference in kobject_get_path.\n\n* on Itanium-based systems, repeatedly creating and destroying Windows\nguests may have caused Dom0 to crash, due to the\n'XENMEM_add_to_physmap' hypercall, used by para-virtualized drivers on\nHVM, being SMP-unsafe.\n\n* when using an MD software RAID, crashes may have occurred when\ndevices were removed or changed while being iterated through. Correct\nlocking is now used.\n\n* break requests had no effect when using 'Serial Over Lan' with the\nIntel 82571 network card. This issue may have caused log in problems.\n\n* on Itanium-based systems, module_free() referred the first parameter\nbefore checking it was valid. This may have caused a kernel panic when\nexiting SystemTap.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-September/015273.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d39467ab\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-September/015274.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?979197fc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/12/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-debug-devel-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-devel-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-doc-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-headers-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-2.6.18-92.1.13.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"kernel-xen-devel-2.6.18-92.1.13.el5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:20:19", "bulletinFamily": "scanner", "description": "Updated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* a missing capability check was found in the Linux kernel\ndo_change_type routine. This could allow a local unprivileged user to\ngain privileged access or cause a denial of service. (CVE-2008-2931,\nImportant)\n\n* a flaw was found in the Linux kernel Direct-IO implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2007-6716, Important)\n\n* Tobias Klein reported a missing check in the Linux kernel Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to attempt\nfile creation within deleted directories, possibly causing a denial of\nservice. (CVE-2008-3275, Moderate)\n\n* a flaw was found in the Linux kernel tmpfs implementation. This\ncould allow a local unprivileged user to read sensitive information\nfrom the kernel. (CVE-2007-6417, Moderate)\n\nBug fixes :\n\n* when copying a small IPoIB packet from the original skb it was\nreceived in to a new, smaller skb, all fields in the new skb were not\ninitialized. This may have caused a kernel oops.\n\n* previously, data may have been written beyond the end of an array,\ncausing memory corruption on certain systems, resulting in hypervisor\ncrashes during context switching.\n\n* a kernel crash may have occurred on heavily-used Samba servers after\n24 to 48 hours of use.\n\n* under heavy memory pressure, pages may have been swapped out from\nunder the SGI Altix XPMEM driver, causing silent data corruption in\nthe kernel.\n\n* the ixgbe driver is untested, but support was advertised for the\nIntel 82598 network card. If this card was present when the ixgbe\ndriver was loaded, a NULL pointer dereference and a panic occurred.\n\n* on certain systems, if multiple InfiniBand queue pairs\nsimultaneously fell into an error state, an overrun may have occurred,\nstopping traffic.\n\n* with bridging, when forward delay was set to zero, setting an\ninterface to the forwarding state was delayed by one or possibly two\ntimers, depending on whether STP was enabled. This may have caused\nlong delays in moving an interface to the forwarding state. This issue\ncaused packet loss when migrating virtual machines, preventing them\nfrom being migrated without interrupting applications.\n\n* on certain multinode systems, IPMI device nodes were created in\nreverse order of where they physically resided.\n\n* process hangs may have occurred while accessing application data\nfiles via asynchronous direct I/O system calls.\n\n* on systems with heavy lock traffic, a possible deadlock may have\ncaused anything requiring locks over NFS to stop, or be very slow.\nErrors such as ", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2008-0885.NASL", "href": "https://www.tenable.com/plugins/nessus/34288", "published": "2008-09-25T00:00:00", "title": "RHEL 5 : kernel (RHSA-2008:0885)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0885. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(34288);\n script_version (\"1.28\");\n script_cvs_date(\"Date: 2019/10/25 13:36:13\");\n\n script_cve_id(\"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_bugtraq_id(27694, 30647, 31515);\n script_xref(name:\"RHSA\", value:\"2008:0885\");\n\n script_name(english:\"RHEL 5 : kernel (RHSA-2008:0885)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* a missing capability check was found in the Linux kernel\ndo_change_type routine. This could allow a local unprivileged user to\ngain privileged access or cause a denial of service. (CVE-2008-2931,\nImportant)\n\n* a flaw was found in the Linux kernel Direct-IO implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2007-6716, Important)\n\n* Tobias Klein reported a missing check in the Linux kernel Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to attempt\nfile creation within deleted directories, possibly causing a denial of\nservice. (CVE-2008-3275, Moderate)\n\n* a flaw was found in the Linux kernel tmpfs implementation. This\ncould allow a local unprivileged user to read sensitive information\nfrom the kernel. (CVE-2007-6417, Moderate)\n\nBug fixes :\n\n* when copying a small IPoIB packet from the original skb it was\nreceived in to a new, smaller skb, all fields in the new skb were not\ninitialized. This may have caused a kernel oops.\n\n* previously, data may have been written beyond the end of an array,\ncausing memory corruption on certain systems, resulting in hypervisor\ncrashes during context switching.\n\n* a kernel crash may have occurred on heavily-used Samba servers after\n24 to 48 hours of use.\n\n* under heavy memory pressure, pages may have been swapped out from\nunder the SGI Altix XPMEM driver, causing silent data corruption in\nthe kernel.\n\n* the ixgbe driver is untested, but support was advertised for the\nIntel 82598 network card. If this card was present when the ixgbe\ndriver was loaded, a NULL pointer dereference and a panic occurred.\n\n* on certain systems, if multiple InfiniBand queue pairs\nsimultaneously fell into an error state, an overrun may have occurred,\nstopping traffic.\n\n* with bridging, when forward delay was set to zero, setting an\ninterface to the forwarding state was delayed by one or possibly two\ntimers, depending on whether STP was enabled. This may have caused\nlong delays in moving an interface to the forwarding state. This issue\ncaused packet loss when migrating virtual machines, preventing them\nfrom being migrated without interrupting applications.\n\n* on certain multinode systems, IPMI device nodes were created in\nreverse order of where they physically resided.\n\n* process hangs may have occurred while accessing application data\nfiles via asynchronous direct I/O system calls.\n\n* on systems with heavy lock traffic, a possible deadlock may have\ncaused anything requiring locks over NFS to stop, or be very slow.\nErrors such as 'lockd: server [IP] not responding, timed out' were\nlogged on client systems.\n\n* unexpected removals of USB devices may have caused a NULL pointer\ndereference in kobject_get_path.\n\n* on Itanium-based systems, repeatedly creating and destroying Windows\nguests may have caused Dom0 to crash, due to the\n'XENMEM_add_to_physmap' hypercall, used by para-virtualized drivers on\nHVM, being SMP-unsafe.\n\n* when using an MD software RAID, crashes may have occurred when\ndevices were removed or changed while being iterated through. Correct\nlocking is now used.\n\n* break requests had no effect when using 'Serial Over Lan' with the\nIntel 82571 network card. This issue may have caused log in problems.\n\n* on Itanium-based systems, module_free() referred the first parameter\nbefore checking it was valid. This may have caused a kernel panic when\nexiting SystemTap.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-6417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-6716\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-2931\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-3272\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-3275\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2008:0885\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/12/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/09/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2008:0885\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2008:0885\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-PAE-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"kernel-doc-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"kernel-headers-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-headers-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i686\", reference:\"kernel-xen-devel-2.6.18-92.1.13.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"kernel-xen-devel-2.6.18-92.1.13.el5\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-PAE / kernel-PAE-devel / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:14:12", "bulletinFamily": "scanner", "description": "From Red Hat Security Advisory 2008:0885 :\n\nUpdated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* a missing capability check was found in the Linux kernel\ndo_change_type routine. This could allow a local unprivileged user to\ngain privileged access or cause a denial of service. (CVE-2008-2931,\nImportant)\n\n* a flaw was found in the Linux kernel Direct-IO implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2007-6716, Important)\n\n* Tobias Klein reported a missing check in the Linux kernel Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to attempt\nfile creation within deleted directories, possibly causing a denial of\nservice. (CVE-2008-3275, Moderate)\n\n* a flaw was found in the Linux kernel tmpfs implementation. This\ncould allow a local unprivileged user to read sensitive information\nfrom the kernel. (CVE-2007-6417, Moderate)\n\nBug fixes :\n\n* when copying a small IPoIB packet from the original skb it was\nreceived in to a new, smaller skb, all fields in the new skb were not\ninitialized. This may have caused a kernel oops.\n\n* previously, data may have been written beyond the end of an array,\ncausing memory corruption on certain systems, resulting in hypervisor\ncrashes during context switching.\n\n* a kernel crash may have occurred on heavily-used Samba servers after\n24 to 48 hours of use.\n\n* under heavy memory pressure, pages may have been swapped out from\nunder the SGI Altix XPMEM driver, causing silent data corruption in\nthe kernel.\n\n* the ixgbe driver is untested, but support was advertised for the\nIntel 82598 network card. If this card was present when the ixgbe\ndriver was loaded, a NULL pointer dereference and a panic occurred.\n\n* on certain systems, if multiple InfiniBand queue pairs\nsimultaneously fell into an error state, an overrun may have occurred,\nstopping traffic.\n\n* with bridging, when forward delay was set to zero, setting an\ninterface to the forwarding state was delayed by one or possibly two\ntimers, depending on whether STP was enabled. This may have caused\nlong delays in moving an interface to the forwarding state. This issue\ncaused packet loss when migrating virtual machines, preventing them\nfrom being migrated without interrupting applications.\n\n* on certain multinode systems, IPMI device nodes were created in\nreverse order of where they physically resided.\n\n* process hangs may have occurred while accessing application data\nfiles via asynchronous direct I/O system calls.\n\n* on systems with heavy lock traffic, a possible deadlock may have\ncaused anything requiring locks over NFS to stop, or be very slow.\nErrors such as ", "modified": "2019-11-02T00:00:00", "id": "ORACLELINUX_ELSA-2008-0885.NASL", "href": "https://www.tenable.com/plugins/nessus/67747", "published": "2013-07-12T00:00:00", "title": "Oracle Linux 5 : kernel (ELSA-2008-0885)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2008:0885 and \n# Oracle Linux Security Advisory ELSA-2008-0885 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(67747);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/10/25 13:36:07\");\n\n script_cve_id(\"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n script_bugtraq_id(27694, 30647, 31515);\n script_xref(name:\"RHSA\", value:\"2008:0885\");\n\n script_name(english:\"Oracle Linux 5 : kernel (ELSA-2008-0885)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2008:0885 :\n\nUpdated kernel packages that fix various security issues and several\nbugs are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes :\n\n* a missing capability check was found in the Linux kernel\ndo_change_type routine. This could allow a local unprivileged user to\ngain privileged access or cause a denial of service. (CVE-2008-2931,\nImportant)\n\n* a flaw was found in the Linux kernel Direct-IO implementation. This\ncould allow a local unprivileged user to cause a denial of service.\n(CVE-2007-6716, Important)\n\n* Tobias Klein reported a missing check in the Linux kernel Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to attempt\nfile creation within deleted directories, possibly causing a denial of\nservice. (CVE-2008-3275, Moderate)\n\n* a flaw was found in the Linux kernel tmpfs implementation. This\ncould allow a local unprivileged user to read sensitive information\nfrom the kernel. (CVE-2007-6417, Moderate)\n\nBug fixes :\n\n* when copying a small IPoIB packet from the original skb it was\nreceived in to a new, smaller skb, all fields in the new skb were not\ninitialized. This may have caused a kernel oops.\n\n* previously, data may have been written beyond the end of an array,\ncausing memory corruption on certain systems, resulting in hypervisor\ncrashes during context switching.\n\n* a kernel crash may have occurred on heavily-used Samba servers after\n24 to 48 hours of use.\n\n* under heavy memory pressure, pages may have been swapped out from\nunder the SGI Altix XPMEM driver, causing silent data corruption in\nthe kernel.\n\n* the ixgbe driver is untested, but support was advertised for the\nIntel 82598 network card. If this card was present when the ixgbe\ndriver was loaded, a NULL pointer dereference and a panic occurred.\n\n* on certain systems, if multiple InfiniBand queue pairs\nsimultaneously fell into an error state, an overrun may have occurred,\nstopping traffic.\n\n* with bridging, when forward delay was set to zero, setting an\ninterface to the forwarding state was delayed by one or possibly two\ntimers, depending on whether STP was enabled. This may have caused\nlong delays in moving an interface to the forwarding state. This issue\ncaused packet loss when migrating virtual machines, preventing them\nfrom being migrated without interrupting applications.\n\n* on certain multinode systems, IPMI device nodes were created in\nreverse order of where they physically resided.\n\n* process hangs may have occurred while accessing application data\nfiles via asynchronous direct I/O system calls.\n\n* on systems with heavy lock traffic, a possible deadlock may have\ncaused anything requiring locks over NFS to stop, or be very slow.\nErrors such as 'lockd: server [IP] not responding, timed out' were\nlogged on client systems.\n\n* unexpected removals of USB devices may have caused a NULL pointer\ndereference in kobject_get_path.\n\n* on Itanium-based systems, repeatedly creating and destroying Windows\nguests may have caused Dom0 to crash, due to the\n'XENMEM_add_to_physmap' hypercall, used by para-virtualized drivers on\nHVM, being SMP-unsafe.\n\n* when using an MD software RAID, crashes may have occurred when\ndevices were removed or changed while being iterated through. Correct\nlocking is now used.\n\n* break requests had no effect when using 'Serial Over Lan' with the\nIntel 82571 network card. This issue may have caused log in problems.\n\n* on Itanium-based systems, module_free() referred the first parameter\nbefore checking it was valid. This may have caused a kernel panic when\nexiting SystemTap.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these\nupdated packages, which contain backported patches to resolve these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2008-September/000742.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(189, 200, 264, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-PAE-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/12/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2007-6417\", \"CVE-2007-6716\", \"CVE-2008-2931\", \"CVE-2008-3272\", \"CVE-2008-3275\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2008-0885\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"2.6\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-PAE-devel-2.6.18\") && rpm_check(release:\"EL5\", cpu:\"i386\", reference:\"kernel-PAE-devel-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-debug-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-debug-devel-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-devel-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-doc-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-doc-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-headers-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-headers-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-2.6.18-92.1.13.0.1.el5\")) flag++;\nif (rpm_exists(release:\"EL5\", rpm:\"kernel-xen-devel-2.6.18\") && rpm_check(release:\"EL5\", reference:\"kernel-xen-devel-2.6.18-92.1.13.0.1.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:30:02", "bulletinFamily": "scanner", "description": "This kernel security update fixes lots of bugs and some", "modified": "2019-11-02T00:00:00", "id": "SUSE_KERNEL-5605.NASL", "href": "https://www.tenable.com/plugins/nessus/59130", "published": "2012-05-17T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5605)", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(59130);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/10/25 13:36:32\");\n\n script_cve_id(\"CVE-2008-0598\", \"CVE-2008-1673\", \"CVE-2008-3272\", \"CVE-2008-3275\");\n\n script_name(english:\"SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5605)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\"This kernel security update fixes lots of bugs and some\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-0598.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-1673.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3272.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2008-3275.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 5605.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119, 189, 200, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/06/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/09/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/05/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-debug-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-default-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-kdump-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-smp-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-source-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-syms-2.6.16.60-0.30\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:2, cpu:\"x86_64\", reference:\"kernel-xen-2.6.16.60-0.30\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2019-05-30T02:23:09", "bulletinFamily": "unix", "description": "- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1630-1 security@debian.org\nhttp://www.debian.org/security/ dann frazier\nAug 21, 2008 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : denial of service/information leak\nProblem type : several\nDebian-specific: no\nCVE Id(s) : CVE-2007-6282 CVE-2008-0598 CVE-2008-2729 CVE-2008-2812\n CVE-2008-2826 CVE-2008-2931 CVE-2008-3272 CVE-2008-3275\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may\nlead to a denial of service or arbitrary code execution. The Common\nVulnerabilities and Exposures project identifies the following\nproblems:\n\nCVE-2007-6282\n\n Dirk Nehring discovered a vulnerability in the IPsec code that allows\n remote users to cause a denial of service by sending a specially crafted\n ESP packet.\n\nCVE-2008-0598\n\n Tavis Ormandy discovered a vulnerability that allows local users to access\n uninitialized kernel memory, possibly leaking sensitive data. This issue\n is specific to the amd64-flavour kernel images.\n\nCVE-2008-2729\n\n Andi Kleen discovered an issue where uninitialized kernel memory\n was being leaked to userspace during an exception. This issue may allow\n local users to gain access to sensitive data. Only the amd64-flavour\n Debian kernel images are affected.\n\nCVE-2008-2812\n\n Alan Cox discovered an issue in multiple tty drivers that allows\n local users to trigger a denial of service (NULL pointer dereference)\n and possibly obtain elevated privileges.\n\nCVE-2008-2826\n\n Gabriel Campana discovered an integer overflow in the sctp code that\n can be exploited by local users to cause a denial of service.\n\nCVE-2008-2931\n\n Miklos Szeredi reported a missing privilege check in the do_change_type()\n function. This allows local, unprivileged users to change the properties\n of mount points.\n\nCVE-2008-3272\n\n Tobias Klein reported a locally exploitable data leak in the\n snd_seq_oss_synth_make_info() function. This may allow local users\n to gain access to sensitive information.\n\nCVE-2008-3275\n\n Zoltan Sogor discovered a coding error in the VFS that allows local users\n to exploit a kernel memory leak resulting in a denial of service.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 2.6.18.dfsg.1-22etch2.\n\nWe recommend that you upgrade your linux-2.6, fai-kernels, and\nuser-mode-linux packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nThe following matrix lists additional source packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch.22etch2\n user-mode-linux 2.6.18-1um-2etch.22etch2\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.diff.gz\n Size/MD5 checksum: 5378366 80a876fbcded8984ff47308cf2ece776\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz\n Size/MD5 checksum: 14435 4d10c30313e11a24621f7218c31f3582\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.dsc\n Size/MD5 checksum: 740 080fa46e372743186c973658347ceee1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.dsc\n Size/MD5 checksum: 892 30580beb633eb4806c40d659f552cd88\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-22etch2.dsc\n Size/MD5 checksum: 5672 780d93329a4cedaad9d0539c1cc400ac\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2.diff.gz\n Size/MD5 checksum: 18180 2b9bbd3f4bcc3852320fc60d6947607e\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2.tar.gz\n Size/MD5 checksum: 56550 01fd54902e7ac7c3035c5176f1deae3c\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 3718952 804c3adc75403db743f603fd1dc44fa2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 41460250 9fda57df0d76f6300b162c0765a87e32\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 1632622 6d644a3a0502065b7a9faa9a7efdb8f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 1087372 8ff719e7a81edaa38b5eca31a7aaee02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 3590476 b803de0252e4f027567c5c13db4afe0a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\n Size/MD5 checksum: 55722 a4dd6ba664f85780bbe1ebf7f3a77b25\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23464338 df80e9f9afac5942ec8cd73c8fa2acd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 55150 c752933d6628e0ebe75dbe47f29ad4e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 268952 128bea32232629d3255799ddc83da7b3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 269648 7617546d15e940343cbe381dfecae010\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 3053804 f72f8a710f0a4da22bc8fd431d9195ee\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 268368 5c248dbb5e31cc30d4148196b1f5cef0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 55180 2a8a3e402015cf1908906180eb6f8a5f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23846050 ba3b97267e75c3d8027627b2a3ece5fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 23485982 9ea2f705c0a99080425de75c48c66904\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 269242 1edcca9164f4eecd392897903269c1e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_alpha.deb\n Size/MD5 checksum: 3028978 253a048a7d3ccdf823b8e28b47e5f849\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_amd64.deb\n Size/MD5 checksum: 5961854 67e6d9bddf32e6ff37f15a37f9aa2b04\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55174 94bc1ab70d46a153205059b1ba2fbd9e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 279498 bf0107981fe6a603a9b72be5e94190bb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 16909690 0d7e343ec621b05fb565ed0c4b355c9e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3252530 97dc43477d90cae8fd6b4033781ce589\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 277930 b719a1156f14a870b6f0fed9fcac0e26\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55146 865ab31e1451d19f5374492c7b5cec02\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55152 811c0ed6f63166536426b3a30a0ae6a0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 1652318 1e02b1e5c1315c6775efd5a3ebb8eba0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3228660 b3491a01820796609c57ff0ca45cd991\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 1684052 214c87ec095a47ddb16cb5a0386385d0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 15370528 6429150ddfdc20c94f5dd9223ce1eefa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 16955552 08dbcfaeb394f720be04b43584cc2dca\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 277636 0c1dd9ed04830cef72a2799682cdb373\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3422414 a66a5347a66c224513912f23df6e7811\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 3397342 d69524c251013eca5cb9c2fc6ac49f08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 278800 f808d9f0b51671184647976e61673ef7\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 55126 dcc26a10c820fe676abf6d0a8f733190\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\n Size/MD5 checksum: 15356684 ca635c5a74fde0c121ac8ad0dca7f3bc\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 240724 05944f6adaed3622fdbf4fa94d9e37c1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 55194 cfb4019acf8ce2b9eca9a06cde8fa6d8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 200112 db009d7e4d83679ea6bf62352e8cbe27\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 7925520 1488da3529714a8490790357b2a28d34\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 235346 8bac39d6ded885fc5247046c1a0f5c1c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 205074 8fa04e311cd6e56aa2749d4146056c77\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 55234 060e1f4e0b26b2fb42fe0be4d8078952\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 3411494 cfe4f5b7273940720e2bc1e945631f1c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 4588214 42d8698407235b46507cf2d7b992c09c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 234198 35c06e74a9f26ab8217ea98df7c01a9b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 7567632 3e4a444afcf3df3e510e2c5000a4b684\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 5010844 a3a1c62fbe80192e80bcaac498036e92\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\n Size/MD5 checksum: 8872222 e1a64be9bdc5246dd1d9ef666eb0a311\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 11805014 e45047cea390fd98d4a55557414b578e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 55184 397ca7761578ce779b6ef9bacc372ffb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 10551992 1d693cdd06bb4dee92a25cd886817522\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 55158 15e7aa685aea41e29ac6c76825e99ad6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 199066 5aaf2ce6a96449673f8a8f48f36cf841\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 11400554 53c5eca027dc1015bf6423cbe65536cd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 10998698 050980b34cbc925f0842c161828aa1f7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 197944 1d45f1fe804821cc7b8aa80b0dec4f36\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 3022526 52b6702172ceb2064dde03ea3cacca7a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 198152 556e2b16e2988976dac562f1baad15a9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\n Size/MD5 checksum: 197130 298d3e069a1f6996685c4a5a8bc1bada\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16377614 74d1938921db193d10a0ff798fe7c005\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272450 5468ca009d328fc890a6ab771ab20968\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16471330 35ea40d0f873d6c8ff819a62239623ac\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 280452 b055d4305ed580aa9603c3ff5b8c48ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16838150 45beacafd1a4902c055c41bd7711586a\n http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch2_i386.deb\n Size/MD5 checksum: 25589346 bf03c496e08b7d40f52f602011c07560\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16406940 0225f98fb843e23225875943b5179aa1\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55132 28a33a24ebdcdcad85d335499397c88c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55196 16b6e16eefaeb5891ab4ba7f832d0ed3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3169128 eb405a8b5c8b6d815c95f73262a99af1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55144 3d96d807e874865af58831720adb4486\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3055432 a496fea546da3a21748b444ffd6836ec\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272846 c58bde7235a1f1ac5c8145dc1ae9346b\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 55140 eee1bdfac4bbecc919d0151b2e23d24c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 14292444 19fe5544166f396830fef3a1b4e4626f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 280608 496144bbb1d620644189d012b9d6ea70\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 282902 f4145bd74ab9467b1af36da46b7666ef\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 279034 26430131dc00922da7c9b034c191eaf1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 272230 871474e9b227166f527391aa064ec971\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_i386.deb\n Size/MD5 checksum: 5505296 9da61c3c82edf996a6324ebd4517251c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3149672 c6cbb32f47b75db7d63a6fcf84e0df38\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 3171866 333ceba6af38b86e41a1db10fc764319\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 281062 c0c403aedd560ad15fb7d90c54ce3145\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16192240 a4a3d514e989d64042c46d3ad8d0b0ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 278950 9de592d811e51eeb07ebe193f8734d15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16337664 a367c6561e7cf8ff701a731d8072dca2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 1328006 c5089d6b0fa44ce46fdbbd17140cb9c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 16509906 c8894d32a5f39e7512d2db9de74ddf3c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 1300920 9c42c8356ab3a07b89f2d95f47de5303\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\n Size/MD5 checksum: 14281014 32f281f475d4ee1f2d67dd029231ea46\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 256640 e96b0df79e67e6049d8feeb73e63f287\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 55174 c93847739b57f47faacaf642de4ab6c1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 256732 af4ee0bbafe50ce27d875243fe626ab9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 28181368 dff959a14317741919a7a46d73c273a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 55146 9f30373190856528f752d21d66a88053\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 28014200 d290bc90985342dfe3b348d3e1d07922\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_ia64.deb\n Size/MD5 checksum: 3083012 cbb353d4e8cb3a2bfc4dbf43f4427344\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 8311782 6b24a125c1b553bd4f69d830f2d19eaa\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 6124616 ab5d97cb43f8e7d0f7cfebe2db2416df\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 55190 1cd7be3bb06e63ecf67e6c5c175aa201\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 187898 a74c79e4b6de9312c1a531b7d1c04e06\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 164036 58db324ddfe7d1b3f7086c67091c1ae3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 15654946 4c99171f6b6e8e0b06d88f65244f5a5c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 155578 71edf3d7d29b414ee8fe9c26d98afe2f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 15680482 79ca37454bab6d11c4af5621e3963e87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 168240 0eafb18463f917510d3110c74786742d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 3415314 94c72a62a2c3c52535c3ef4936400ad9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 9077040 581d6744c0c10ec63b06b5d058e44a87\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 55236 7c94ce0a6b000ba9abcc0bf8272e033c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mips.deb\n Size/MD5 checksum: 188208 2356f7b9cf66b0694b1b7bb07e9e1df0\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 3351164 f15965863479e2b0eab136c912b25ebd\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 183690 e20c71f57188bc8458abb4dc212402f3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 156886 65c9aec3009d7ace0550bee15d0bd34c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 151270 92419bb4255d3989eef1b3d2e616e5a5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 9864388 2aa86c68a6c8ac36e8dc22aafcac34fb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 183862 262a4f1a05c00b6c2752733101d2bb4b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 6030536 1199eb8f7b6a9b4ff1a32ebccfcd7074\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 5944692 205d02fd233142d8058874e6ead00e94\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 156854 1f02416baf0082238418bba97eb8aa4f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 15028044 00f2ad06dfa6c908036349c35a5a8e39\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 55154 6b6f4c17287d5e053d716a742cb738a0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 179462 e5497abf20a5461319d8f1d7c37d19b3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 15057484 ea8ab2c273fbc3d282d0120cdbbe5c34\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 55208 f3bfa65fa08c4ad552aef1536bdd1fcc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\n Size/MD5 checksum: 5928064 cad7b6b3653d205a39e876a508d4ddaf\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.22etch2_powerpc.deb\n Size/MD5 checksum: 3367890 ad1ad713d488f9e0e0669e1293f1ccd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 254026 ae831a11ed61a4b52bb7a3043eb2f265\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16628466 1b10ecc3a4095b9f0e9cd6fa0c544308\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 3415704 ea230f1f09a4e8341e7bb24ebd037dd3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 15160062 e41656dd2782d44ec9487138dc694722\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 17017000 04153c3611b94ae5044868407f1eaa96\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 255324 60960ac1262f6d8eabcd96d9789b27bc\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 253678 e1a1fcc0865698fca0aa46cc02c0e38d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 18295838 01cb70246fc9027dc9097964d0a7c06d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 253858 a30720b97122274208888b564c0548b5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 18354880 c82075e19802e915551cd25b04f72c76\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 3393390 246ebdc0ce319ab1b8c0022b1b69fd1d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 246546 855a95e124dcd81d26d06fced8ff9cda\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16406142 59c2543679159905e0d16445d7f5b66d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 231148 96bb009cbc3c1c9fc00a4f84a4aa9cd5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 55156 94c052eb19ce469aabc0a9a71860f861\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 16971942 c230eb342210e9f9376783e013216695\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 252866 4b2bf2f6783bb456b5c003df3e1ea1f5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\n Size/MD5 checksum: 55206 209887bf65d555135cde2cb7b1ef0b7b\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 55168 ba80b3fe0aa1ffdc92825578c4a0a8e2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5620988 555c4bd0a4b245f267dc324c9b39d695\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 144604 bd539fa6955b9ea80a38046b1097ea6e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 145888 80f3dcbc19b2076e6a37ac8f48f1c687\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5403802 9bfc6e49de7faecc3ae013efd8a5ff85\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 2944158 7a37040db97a3a43817eea570ca29554\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 5663004 f3b7384004cd0c0c6a0478865300b9f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 55146 fd4df49a7d2116c1b1eb0f38211c196c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 145096 7e0bfcc155246d4b7cb8ee00d9a370ba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 1440072 437e3a46bda63f1ba5bb2d0b970a669f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_s390.deb\n Size/MD5 checksum: 2967228 a32e5147c0f741a5300c6122aade4377\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10394174 30c3164de023288678eda955e7088e89\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 166138 da9c686e82839dbecfc4d2f8d5d6ff8f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 6412488 738092d091284463d88dcce9bc0d683e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10694332 aa5d657822ad30eb7edf2eca35644e09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 196630 b349a6dd56888b772577075f21229498\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 195534 c7b2e3ee30ba33f0a207fa11a5f08916\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 197330 5e9f1ad14b5b10c6012b09dcfa93acb5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 10647804 5bab66c5cdaa22683425b4e101fea4e0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 55156 da09f09d5c47ce3cd8666b7ba98b9a08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 3191596 f6aee8879affc350feb8706cdffb95da\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 3169298 a6ad7bd3b6ba9d573f47c21f45b9f660\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch2_sparc.deb\n Size/MD5 checksum: 55184 322a273cbddb53db9fdb143229104384\n\n These changes will probably be included in the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "modified": "2008-08-21T16:40:28", "published": "2008-08-21T16:40:28", "id": "DEBIAN:DSA-1630-1:8E4BC", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00216.html", "title": "[SECURITY] [DSA 1630-1] New Linux 2.6.18 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2019-05-29T17:23:33", "bulletinFamily": "unix", "description": "It was discovered that there were multiple NULL-pointer function dereferences in the Linux kernel terminal handling code. A local attacker could exploit this to execute arbitrary code as root, or crash the system, leading to a denial of service. (CVE-2008-2812)\n\nThe do_change_type routine did not correctly validation administrative users. A local attacker could exploit this to block mount points or cause private mounts to be shared, leading to denial of service or a possible loss of privacy. (CVE-2008-2931)\n\nTobias Klein discovered that the OSS interface through ALSA did not correctly validate the device number. A local attacker could exploit this to access sensitive kernel memory, leading to a denial of service or a loss of privacy. (CVE-2008-3272)\n\nZoltan Sogor discovered that new directory entries could be added to already deleted directories. A local attacker could exploit this, filling up available memory and disk space, leading to a denial of service. (CVE-2008-3275)\n\nIn certain situations, the fix for CVE-2008-0598 from USN-623-1 was causing infinite loops in the writev syscall. This update corrects the mistake. We apologize for the inconvenience.", "modified": "2008-08-25T00:00:00", "published": "2008-08-25T00:00:00", "id": "USN-637-1", "href": "https://usn.ubuntu.com/637-1/", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T17:21:56", "bulletinFamily": "unix", "description": "Dirk Nehring discovered that the IPsec protocol stack did not correctly handle fragmented ESP packets. A remote attacker could exploit this to crash the system, leading to a denial of service. (CVE-2007-6282)\n\nJohannes Bauer discovered that the 64bit kernel did not correctly handle hrtimer updates. A local attacker could request a large expiration value and cause the system to hang, leading to a denial of service. (CVE-2007-6712)\n\nTavis Ormandy discovered that the ia32 emulation under 64bit kernels did not fully clear uninitialized data. A local attacker could read private kernel memory, leading to a loss of privacy. (CVE-2008-0598)\n\nJan Kratochvil discovered that PTRACE did not correctly handle certain calls when running under 64bit kernels. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2008-1615)\n\nWei Wang discovered that the ASN.1 decoding routines in CIFS and SNMP NAT did not correctly handle certain length values. Remote attackers could exploit this to execute arbitrary code or crash the system. (CVE-2008-1673)\n\nPaul Marks discovered that the SIT interfaces did not correctly manage allocated memory. A remote attacker could exploit this to fill all available memory, leading to a denial of service. (CVE-2008-2136)\n\nDavid Miller and Jan Lieskovsky discovered that the Sparc kernel did not correctly range-check memory regions allocated with mmap. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2008-2137)\n\nThe sys_utimensat system call did not correctly check file permissions in certain situations. A local attacker could exploit this to modify the file times of arbitrary files which could lead to a denial of service. (CVE-2008-2148)\n\nBrandon Edwards discovered that the DCCP system in the kernel did not correctly check feature lengths. A remote attacker could exploit this to execute arbitrary code. (CVE-2008-2358)\n\nA race condition was discovered between ptrace and utrace in the kernel. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2008-2365)\n\nThe copy_to_user routine in the kernel did not correctly clear memory destination addresses when running on 64bit kernels. A local attacker could exploit this to gain access to sensitive kernel memory, leading to a loss of privacy. (CVE-2008-2729)\n\nThe PPP over L2TP routines in the kernel did not correctly handle certain messages. A remote attacker could send a specially crafted packet that could crash the system or execute arbitrary code. (CVE-2008-2750)\n\nGabriel Campana discovered that SCTP routines did not correctly check for large addresses. A local user could exploit this to allocate all available memory, leading to a denial of service. (CVE-2008-2826)", "modified": "2008-07-15T00:00:00", "published": "2008-07-15T00:00:00", "id": "USN-625-1", "href": "https://usn.ubuntu.com/625-1/", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2019-05-29T18:09:02", "bulletinFamily": "NVD", "description": "The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.", "modified": "2017-09-29T01:29:00", "id": "CVE-2007-6282", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6282", "published": "2008-05-08T00:20:00", "title": "CVE-2007-6282", "type": "cve", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:09:27", "bulletinFamily": "NVD", "description": "The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service (\"overflow\" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.", "modified": "2018-10-30T16:25:00", "id": "CVE-2008-3275", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3275", "published": "2008-08-12T23:41:00", "title": "CVE-2008-3275", "type": "cve", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:09:26", "bulletinFamily": "NVD", "description": "Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.", "modified": "2017-08-08T01:31:00", "id": "CVE-2008-2826", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2826", "published": "2008-07-02T16:41:00", "title": "CVE-2008-2826", "type": "cve", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:09:27", "bulletinFamily": "NVD", "description": "The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.", "modified": "2018-10-30T16:25:00", "id": "CVE-2008-2931", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2931", "published": "2008-07-09T18:41:00", "title": "CVE-2008-2931", "type": "cve", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:09:27", "bulletinFamily": "NVD", "description": "The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.", "modified": "2018-10-30T16:25:00", "id": "CVE-2008-3272", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3272", "published": "2008-08-08T18:41:00", "title": "CVE-2008-3272", "type": "cve", "cvss": {"score": 6.6, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:C"}}, {"lastseen": "2019-05-29T18:09:26", "bulletinFamily": "NVD", "description": "The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.", "modified": "2018-10-30T16:25:00", "id": "CVE-2008-2812", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2812", "published": "2008-07-09T00:41:00", "title": "CVE-2008-2812", "type": "cve", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:09:26", "bulletinFamily": "NVD", "description": "arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.", "modified": "2017-09-29T01:31:00", "id": "CVE-2008-2729", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2729", "published": "2008-06-30T22:41:00", "title": "CVE-2008-2729", "type": "cve", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:09:25", "bulletinFamily": "NVD", "description": "Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.", "modified": "2017-09-29T01:30:00", "id": "CVE-2008-0598", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0598", "published": "2008-06-30T22:41:00", "title": "CVE-2008-0598", "type": "cve", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "suse": [{"lastseen": "2016-09-04T12:19:06", "bulletinFamily": "unix", "description": "The SUSE Linux Enterprise 10 Service Pack 1 kernel was updated to fix lots of bugs and also contains several security fixes: CVE-2008-3525: Added missing capability checks in sbni_ioctl(). CVE-2008-0598: On AMD64 some string operations could leak kernel information into userspace. CVE-2008-1673: Added range checking in ASN.1 handling for the CIFS and SNMP NAT netfilter modules. CVE-2008-3272: Fixed range checking in the snd_seq OSS ioctl, which could be used to leak information from the kernel. CVE-2008-3275: Fixed a memory leak when looking up deleted directories which could be used to run the system out of memory. CVE-2008-2931: The do_change_type function in fs/namespace.c did not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint. CVE-2008-2812: Various NULL ptr checks have been added to tty op functions, which might have been used by local attackers to execute code. We think that this affects only devices openable by root, so the impact is limited. For more information consult the RPM changelog. 2) Solution or Work-Around\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2008-10-02T11:55:46", "published": "2008-10-02T11:55:46", "id": "SUSE-SA:2008:049", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:06:22", "bulletinFamily": "unix", "description": "This kernel security update for SUSE Linux Enterprise 10 Service Pack 2 fixes lots of bugs and some security issues:\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2008-10-01T17:25:47", "published": "2008-10-01T17:25:47", "id": "SUSE-SA:2008:048", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:13:25", "bulletinFamily": "unix", "description": "The Linux kernel in the SUSE Linux Enterprise Server 9 Service Pack 4 was released to fix various bugs and also some security problems:\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2008-10-01T15:09:37", "published": "2008-10-01T15:09:37", "id": "SUSE-SA:2008:047", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:27:16", "bulletinFamily": "unix", "description": "The openSUSE 10.3 kernel was update to 2.6.22.19. This includes bugs and security fixes.\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2008-10-21T15:41:15", "published": "2008-10-21T15:41:15", "id": "SUSE-SA:2008:052", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:31:52", "bulletinFamily": "unix", "description": "The openSUSE 11.0 kernel was updated to 2.6.25.11-0.1.\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2008-07-22T17:25:31", "published": "2008-07-22T17:25:31", "id": "SUSE-SA:2008:037", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html", "title": "local privilege escalation in kernel", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:49:16", "bulletinFamily": "unix", "description": "The openSUSE 11.0 kernel was updated to 2.6.25.16.\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2008-09-11T13:24:55", "published": "2008-09-11T13:24:55", "id": "SUSE-SA:2008:044", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00001.html", "type": "suse", "title": "remote denial of service in kernel", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T11:45:04", "bulletinFamily": "unix", "description": "This is a respin of the previous Linux kernel update for SUSE Linux Enterprise 10 SP2 as announced in SUSE-SA:2008:035, which got retracted due to an IDE-CDROM regression, where any IDE CDROM access would hang or crash the system. Only this problem was fixed additionally.\n#### Solution\nThere is no known workaround, please install the update packages.", "modified": "2008-07-29T17:28:49", "published": "2008-07-29T17:28:49", "href": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html", "id": "SUSE-SA:2008:038", "title": "remote denial of service in kernel", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "centos": [{"lastseen": "2019-05-29T18:34:43", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2008:0885\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a missing capability check was found in the Linux kernel do_change_type\nroutine. This could allow a local unprivileged user to gain privileged\naccess or cause a denial of service. (CVE-2008-2931, Important)\n\n* a flaw was found in the Linux kernel Direct-IO implementation. This could\nallow a local unprivileged user to cause a denial of service.\n(CVE-2007-6716, Important)\n\n* Tobias Klein reported a missing check in the Linux kernel Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to attempt file\ncreation within deleted directories, possibly causing a denial of service.\n(CVE-2008-3275, Moderate)\n\n* a flaw was found in the Linux kernel tmpfs implementation. This could\nallow a local unprivileged user to read sensitive information from the\nkernel. (CVE-2007-6417, Moderate)\n\nBug fixes:\n\n* when copying a small IPoIB packet from the original skb it was received\nin to a new, smaller skb, all fields in the new skb were not initialized.\nThis may have caused a kernel oops.\n\n* previously, data may have been written beyond the end of an array,\ncausing memory corruption on certain systems, resulting in hypervisor\ncrashes during context switching.\n\n* a kernel crash may have occurred on heavily-used Samba servers after 24\nto 48 hours of use.\n\n* under heavy memory pressure, pages may have been swapped out from under\nthe SGI Altix XPMEM driver, causing silent data corruption in the kernel.\n\n* the ixgbe driver is untested, but support was advertised for the Intel\n82598 network card. If this card was present when the ixgbe driver was\nloaded, a NULL pointer dereference and a panic occurred.\n\n* on certain systems, if multiple InfiniBand queue pairs simultaneously\nfell into an error state, an overrun may have occurred, stopping traffic.\n\n* with bridging, when forward delay was set to zero, setting an interface\nto the forwarding state was delayed by one or possibly two timers,\ndepending on whether STP was enabled. This may have caused long delays in\nmoving an interface to the forwarding state. This issue caused packet loss\nwhen migrating virtual machines, preventing them from being migrated\nwithout interrupting applications.\n\n* on certain multinode systems, IPMI device nodes were created in reverse\norder of where they physically resided.\n\n* process hangs may have occurred while accessing application data files\nvia asynchronous direct I/O system calls.\n\n* on systems with heavy lock traffic, a possible deadlock may have caused\nanything requiring locks over NFS to stop, or be very slow. Errors such as\n\"lockd: server [IP] not responding, timed out\" were logged on client\nsystems.\n\n* unexpected removals of USB devices may have caused a NULL pointer\ndereference in kobject_get_path.\n\n* on Itanium-based systems, repeatedly creating and destroying Windows\nguests may have caused Dom0 to crash, due to the \"XENMEM_add_to_physmap\"\nhypercall, used by para-virtualized drivers on HVM, being SMP-unsafe.\n\n* when using an MD software RAID, crashes may have occurred when devices\nwere removed or changed while being iterated through. Correct locking is\nnow used.\n\n* break requests had no effect when using \"Serial Over Lan\" with the Intel\n82571 network card. This issue may have caused log in problems.\n\n* on Itanium-based systems, module_free() referred the first parameter\nbefore checking it was valid. This may have caused a kernel panic when\nexiting SystemTap.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-September/015273.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-September/015274.html\n\n**Affected packages:**\nkernel\nkernel-PAE\nkernel-PAE-devel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-xen\nkernel-xen-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0885.html", "modified": "2008-09-25T17:47:00", "published": "2008-09-25T17:46:59", "href": "http://lists.centos.org/pipermail/centos-announce/2008-September/015273.html", "id": "CESA-2008:0885", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:18", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2008:0519\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\r\noperating system.\r\n\r\nThese updated packages fix the following security issues:\r\n\r\n* A security flaw was found in the Linux kernel memory copy routines, when\r\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\r\nmemory from source to destination memory locations occurred, the copy\r\nroutines did not zero the content at the destination memory location. This\r\ncould allow a local unprivileged user to view potentially sensitive data.\r\n(CVE-2008-2729, Important)\r\n\r\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\r\n64-bit emulation. This could allow a local unprivileged user to prepare and\r\nrun a specially crafted binary, which would use this deficiency to leak\r\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\r\n\r\n* Brandon Edwards discovered a missing length validation check in the Linux\r\nkernel DCCP module reconciliation feature. This could allow a local\r\nunprivileged user to cause a heap overflow, gaining privileges for\r\narbitrary code execution. (CVE-2008-2358, Moderate)\r\n\r\nAs well, these updated packages fix the following bug:\r\n\r\n* Due to a regression, \"gettimeofday\" may have gone backwards on certain\r\nx86 hardware. This issue was quite dangerous for time-sensitive systems,\r\nsuch as those used for transaction systems and databases, and may have\r\ncaused applications to produce incorrect results, or even crash.\r\n\r\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\r\npackages, which contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-June/015036.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-June/015037.html\n\n**Affected packages:**\nkernel\nkernel-PAE\nkernel-PAE-devel\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-xen\nkernel-xen-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0519.html", "modified": "2008-06-26T11:40:24", "published": "2008-06-26T11:40:24", "href": "http://lists.centos.org/pipermail/centos-announce/2008-June/015036.html", "id": "CESA-2008:0519", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:24", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2008:0973\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update addresses the following security issues:\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local, unprivileged user to prepare\nand run a specially-crafted binary which would use this deficiency to leak\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local,\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\n* missing capability checks were found in the SBNI WAN driver which could\nallow a local user to bypass intended capability restrictions.\n(CVE-2008-3525, Important)\n\n* the do_truncate() and generic_file_splice_write() functions did not clear\nthe setuid and setgid bits. This could allow a local, unprivileged user to\nobtain access to privileged information. (CVE-2008-4210, Important)\n\n* a buffer overflow flaw was found in Integrated Services Digital Network\n(ISDN) subsystem. A local, unprivileged user could use this flaw to cause a\ndenial of service. (CVE-2007-6063, Moderate)\n\n* multiple NULL pointer dereferences were found in various Linux kernel\nnetwork drivers. These drivers were missing checks for terminal validity,\nwhich could allow privilege escalation. (CVE-2008-2812, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local, unprivileged user to attempt file\ncreation within deleted directories, possibly causing a denial of service.\n(CVE-2008-3275, Moderate)\n\nThis update also fixes the following bugs:\n\n* the incorrect kunmap function was used in nfs_xdr_readlinkres. kunmap()\nwas used where kunmap_atomic() should have been. As a consequence, if an\nNFSv2 or NFSv3 server exported a volume containing a symlink which included\na path equal to or longer than the local system's PATH_MAX, accessing the\nlink caused a kernel oops. This has been corrected in this update.\n\n* mptctl_gettargetinfo did not check if pIoc3 was NULL before using it as a\npointer. This caused a kernel panic in mptctl_gettargetinfo in some\ncircumstances. A check has been added which prevents this.\n\n* lost tick compensation code in the timer interrupt routine triggered\nwithout apparent cause. When running as a fully-virtualized client, this\nspurious triggering caused the 64-bit version of Red Hat Enterprise Linux 3\nto present highly inaccurate times. With this update the lost tick\ncompensation code is turned off when the operating system is running as a\nfully-virtualized client under Xen or VMWare\u00ae.\n\nAll Red Hat Enterprise Linux 3 users should install this updated kernel\nwhich addresses these vulnerabilities and fixes these bugs.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/015501.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-December/015502.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/015578.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/015579.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-doc\nkernel-hugemem\nkernel-hugemem-unsupported\nkernel-smp\nkernel-smp-unsupported\nkernel-source\nkernel-unsupported\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0973.html", "modified": "2009-02-04T15:09:01", "published": "2008-12-17T15:30:17", "href": "http://lists.centos.org/pipermail/centos-announce/2008-December/015501.html", "id": "CESA-2008:0973", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:34:06", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2008:0508\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux\r\noperating system.\r\n\r\nThese updated packages fix the following security issues:\r\n\r\n* A security flaw was found in the Linux kernel memory copy routines, when\r\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\r\nmemory from source to destination memory locations occurred, the copy\r\nroutines did not zero the content at the destination memory location. This\r\ncould allow a local unprivileged user to view potentially sensitive data.\r\n(CVE-2008-2729, Important)\r\n\r\n* Alexey Dobriyan discovered a race condition in the Linux kernel\r\nprocess-tracing system call, ptrace. A local unprivileged user could\r\nuse this flaw to cause a denial of service (kernel hang).\r\n(CVE-2008-2365, Important)\r\n\r\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\r\n64-bit emulation. This could allow a local unprivileged user to prepare and\r\nrun a specially crafted binary, which would use this deficiency to leak\r\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\r\n\r\n* It was discovered that the Linux kernel handled string operations in the\r\nopposite way to the GNU Compiler Collection (GCC). This could allow a local\r\nunprivileged user to cause memory corruption. (CVE-2008-1367, Low)\r\n\r\nAs well, these updated packages fix the following bug:\r\n\r\n* On systems with a large number of CPUs (more than 16), multiple\r\napplications calling the \"times()\" system call may have caused a system\r\nhang.\r\n\r\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\r\npackages, which contain backported patches to resolve these issues.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2008-June/015050.html\nhttp://lists.centos.org/pipermail/centos-announce/2008-June/015051.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-largesmp\nkernel-largesmp-devel\nkernel-smp\nkernel-smp-devel\nkernel-xenU\nkernel-xenU-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2008-0508.html", "modified": "2008-06-27T10:43:55", "published": "2008-06-27T10:43:30", "href": "http://lists.centos.org/pipermail/centos-announce/2008-June/015050.html", "id": "CESA-2008:0508", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:46:46", "bulletinFamily": "unix", "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a missing capability check was found in the Linux kernel do_change_type\nroutine. This could allow a local unprivileged user to gain privileged\naccess or cause a denial of service. (CVE-2008-2931, Important)\n\n* a flaw was found in the Linux kernel Direct-IO implementation. This could\nallow a local unprivileged user to cause a denial of service.\n(CVE-2007-6716, Important)\n\n* Tobias Klein reported a missing check in the Linux kernel Open Sound\nSystem (OSS) implementation. This deficiency could lead to a possible\ninformation leak. (CVE-2008-3272, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local unprivileged user to attempt file\ncreation within deleted directories, possibly causing a denial of service.\n(CVE-2008-3275, Moderate)\n\n* a flaw was found in the Linux kernel tmpfs implementation. This could\nallow a local unprivileged user to read sensitive information from the\nkernel. (CVE-2007-6417, Moderate)\n\nBug fixes:\n\n* when copying a small IPoIB packet from the original skb it was received\nin to a new, smaller skb, all fields in the new skb were not initialized.\nThis may have caused a kernel oops.\n\n* previously, data may have been written beyond the end of an array,\ncausing memory corruption on certain systems, resulting in hypervisor\ncrashes during context switching.\n\n* a kernel crash may have occurred on heavily-used Samba servers after 24\nto 48 hours of use.\n\n* under heavy memory pressure, pages may have been swapped out from under\nthe SGI Altix XPMEM driver, causing silent data corruption in the kernel.\n\n* the ixgbe driver is untested, but support was advertised for the Intel\n82598 network card. If this card was present when the ixgbe driver was\nloaded, a NULL pointer dereference and a panic occurred.\n\n* on certain systems, if multiple InfiniBand queue pairs simultaneously\nfell into an error state, an overrun may have occurred, stopping traffic.\n\n* with bridging, when forward delay was set to zero, setting an interface\nto the forwarding state was delayed by one or possibly two timers,\ndepending on whether STP was enabled. This may have caused long delays in\nmoving an interface to the forwarding state. This issue caused packet loss\nwhen migrating virtual machines, preventing them from being migrated\nwithout interrupting applications.\n\n* on certain multinode systems, IPMI device nodes were created in reverse\norder of where they physically resided.\n\n* process hangs may have occurred while accessing application data files\nvia asynchronous direct I/O system calls.\n\n* on systems with heavy lock traffic, a possible deadlock may have caused\nanything requiring locks over NFS to stop, or be very slow. Errors such as\n\"lockd: server [IP] not responding, timed out\" were logged on client\nsystems.\n\n* unexpected removals of USB devices may have caused a NULL pointer\ndereference in kobject_get_path.\n\n* on Itanium-based systems, repeatedly creating and destroying Windows\nguests may have caused Dom0 to crash, due to the \"XENMEM_add_to_physmap\"\nhypercall, used by para-virtualized drivers on HVM, being SMP-unsafe.\n\n* when using an MD software RAID, crashes may have occurred when devices\nwere removed or changed while being iterated through. Correct locking is\nnow used.\n\n* break requests had no effect when using \"Serial Over Lan\" with the Intel\n82571 network card. This issue may have caused log in problems.\n\n* on Itanium-based systems, module_free() referred the first parameter\nbefore checking it was valid. This may have caused a kernel panic when\nexiting SystemTap.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "modified": "2017-09-08T12:08:22", "published": "2008-09-24T04:00:00", "id": "RHSA-2008:0885", "href": "https://access.redhat.com/errata/RHSA-2008:0885", "type": "redhat", "title": "(RHSA-2008:0885) Important: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:44:56", "bulletinFamily": "unix", "description": "The kernel packages contain the Linux kernel, the core of any Linux\r\noperating system.\r\n\r\nThese updated packages fix the following security issues:\r\n\r\n* A security flaw was found in the Linux kernel memory copy routines, when\r\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\r\nmemory from source to destination memory locations occurred, the copy\r\nroutines did not zero the content at the destination memory location. This\r\ncould allow a local unprivileged user to view potentially sensitive data.\r\n(CVE-2008-2729, Important)\r\n\r\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\r\n64-bit emulation. This could allow a local unprivileged user to prepare and\r\nrun a specially crafted binary, which would use this deficiency to leak\r\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\r\n\r\n* Brandon Edwards discovered a missing length validation check in the Linux\r\nkernel DCCP module reconciliation feature. This could allow a local\r\nunprivileged user to cause a heap overflow, gaining privileges for\r\narbitrary code execution. (CVE-2008-2358, Moderate)\r\n\r\nAs well, these updated packages fix the following bug:\r\n\r\n* Due to a regression, \"gettimeofday\" may have gone backwards on certain\r\nx86 hardware. This issue was quite dangerous for time-sensitive systems,\r\nsuch as those used for transaction systems and databases, and may have\r\ncaused applications to produce incorrect results, or even crash.\r\n\r\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\r\npackages, which contain backported patches to resolve these issues.", "modified": "2017-09-08T12:09:46", "published": "2008-06-25T04:00:00", "id": "RHSA-2008:0519", "href": "https://access.redhat.com/errata/RHSA-2008:0519", "type": "redhat", "title": "(RHSA-2008:0519) Important: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:47:03", "bulletinFamily": "unix", "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimer. This could allow a local\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* the possibility of a kernel crash was found in the Linux kernel IPsec\nprotocol implementation, due to improper handling of fragmented ESP\npackets. When an attacker controlling an intermediate router fragmented\nthese packets into very small pieces, it would cause a kernel crash on the\nreceiving node during packet reassembly. (CVE-2007-6282, Important)\n\n* on 64-bit architectures, the possibility of a timer-expiration value\noverflow was found in the Linux kernel high-resolution timers\nfunctionality, hrtimer. This could allow a local unprivileged user to set\nup a large interval value, forcing the timer expiry value to become\nnegative, causing a denial of service (kernel hang). \n(CVE-2007-6712, Important)\n\n* on AMD64 architectures, the possibility of a kernel crash was discovered\nby testing the Linux kernel process-trace ability. This could allow a local\nunprivileged user to cause a denial of service (kernel crash).\n(CVE-2008-1615, Important)\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\n* a flaw was found in the Linux kernel utimensat system call. File\npermissions were not checked when UTIME_NOW and UTIME_OMIT combinations\nwere used. This could allow a local unprivileged user to modify file times\nof arbitrary files, possibly leading to a denial of service.\n(CVE-2008-2148, Important)\n\n* a security flaw was found in the Linux kernel memory copy routines, when\nrunning on certain AMD64 architectures. If an unsuccessful attempt to copy\nkernel memory from source to destination memory locations occurred, the\ncopy routines did not zero the content at the destination memory location.\nThis could allow a local unprivileged user to view potentially sensitive\ndata. (CVE-2008-2729, Important)\n\n* Gabriel Campana discovered a possible integer overflow flaw in the Linux \nkernel Stream Control Transmission Protocol (SCTP) implementation. This\ndeficiency could lead to privilege escalation. (CVE-2008-2826, Important)\n\n* a deficiency was found in the Linux kernel virtual memory implementation.\nThis could allow a local unprivileged user to make a large number of calls\nto the get_user_pages function, possibly causing a denial of service.\n(CVE-2008-2372, Low)\n\nAlso, these updated packages fix the following bugs:\n\n* gdb set orig_rax to 0x00000000ffffffff, which is recognized by the\nupstream kernel as \"-1\", but not by the Red Hat Enterprise MRG kernel.\n\n* if the POSIX timer was programmed to fire immediately, the timer's\nsignal was sometimes not delivered (timer does not fire).\n\n* rwlock caused crashes and application hangs.\n\n* running oprofile caused system panics.\n\n* threads releasing a mutex may have received an EPERM error.\n\n* booting the RT kernel with the \"nmi_watchdog=2\" kernel option caused a\nkernel panic, and an \"Unable to handle kernel paging request\" error.\n\n* \"echo 0 > /sys/devices/system/cpu/cpu1/online\" caused crashes.\n\n* a crash on a JTC machine.\n\n* added a new \"FUTEX_WAIT_BITSET\" system call, identical to FUTEX_WAIT,\nthat accepts absolute time as a timeout.\n\nRed Hat Enterprise MRG 1.0 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "modified": "2019-03-22T23:44:15", "published": "2008-08-26T04:00:00", "id": "RHSA-2008:0585", "href": "https://access.redhat.com/errata/RHSA-2008:0585", "type": "redhat", "title": "(RHSA-2008:0585) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:45:31", "bulletinFamily": "unix", "description": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update addresses the following security issues:\n\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\n64-bit emulation. This could allow a local, unprivileged user to prepare\nand run a specially-crafted binary which would use this deficiency to leak\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\n\n* a possible kernel memory leak was found in the Linux kernel Simple\nInternet Transition (SIT) INET6 implementation. This could allow a local,\nunprivileged user to cause a denial of service. (CVE-2008-2136, Important)\n\n* missing capability checks were found in the SBNI WAN driver which could\nallow a local user to bypass intended capability restrictions.\n(CVE-2008-3525, Important)\n\n* the do_truncate() and generic_file_splice_write() functions did not clear\nthe setuid and setgid bits. This could allow a local, unprivileged user to\nobtain access to privileged information. (CVE-2008-4210, Important)\n\n* a buffer overflow flaw was found in Integrated Services Digital Network\n(ISDN) subsystem. A local, unprivileged user could use this flaw to cause a\ndenial of service. (CVE-2007-6063, Moderate)\n\n* multiple NULL pointer dereferences were found in various Linux kernel\nnetwork drivers. These drivers were missing checks for terminal validity,\nwhich could allow privilege escalation. (CVE-2008-2812, Moderate)\n\n* a deficiency was found in the Linux kernel virtual filesystem (VFS)\nimplementation. This could allow a local, unprivileged user to attempt file\ncreation within deleted directories, possibly causing a denial of service.\n(CVE-2008-3275, Moderate)\n\nThis update also fixes the following bugs:\n\n* the incorrect kunmap function was used in nfs_xdr_readlinkres. kunmap()\nwas used where kunmap_atomic() should have been. As a consequence, if an\nNFSv2 or NFSv3 server exported a volume containing a symlink which included\na path equal to or longer than the local system's PATH_MAX, accessing the\nlink caused a kernel oops. This has been corrected in this update.\n\n* mptctl_gettargetinfo did not check if pIoc3 was NULL before using it as a\npointer. This caused a kernel panic in mptctl_gettargetinfo in some\ncircumstances. A check has been added which prevents this.\n\n* lost tick compensation code in the timer interrupt routine triggered\nwithout apparent cause. When running as a fully-virtualized client, this\nspurious triggering caused the 64-bit version of Red Hat Enterprise Linux 3\nto present highly inaccurate times. With this update the lost tick\ncompensation code is turned off when the operating system is running as a\nfully-virtualized client under Xen or VMWare\u00ae.\n\nAll Red Hat Enterprise Linux 3 users should install this updated kernel\nwhich addresses these vulnerabilities and fixes these bugs.", "modified": "2017-07-28T18:43:49", "published": "2008-12-16T05:00:00", "id": "RHSA-2008:0973", "href": "https://access.redhat.com/errata/RHSA-2008:0973", "type": "redhat", "title": "(RHSA-2008:0973) Important: kernel security and bug fix update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:03", "bulletinFamily": "unix", "description": "The kernel packages contain the Linux kernel, the core of any Linux\r\noperating system.\r\n\r\nThese updated packages fix the following security issues:\r\n\r\n* A security flaw was found in the Linux kernel memory copy routines, when\r\nrunning on certain AMD64 systems. If an unsuccessful attempt to copy kernel\r\nmemory from source to destination memory locations occurred, the copy\r\nroutines did not zero the content at the destination memory location. This\r\ncould allow a local unprivileged user to view potentially sensitive data.\r\n(CVE-2008-2729, Important)\r\n\r\n* Alexey Dobriyan discovered a race condition in the Linux kernel\r\nprocess-tracing system call, ptrace. A local unprivileged user could\r\nuse this flaw to cause a denial of service (kernel hang).\r\n(CVE-2008-2365, Important)\r\n\r\n* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and\r\n64-bit emulation. This could allow a local unprivileged user to prepare and\r\nrun a specially crafted binary, which would use this deficiency to leak\r\nuninitialized and potentially sensitive data. (CVE-2008-0598, Important)\r\n\r\n* It was discovered that the Linux kernel handled string operations in the\r\nopposite way to the GNU Compiler Collection (GCC). This could allow a local\r\nunprivileged user to cause memory corruption. (CVE-2008-1367, Low)\r\n\r\nAs well, these updated packages fix the following bug:\r\n\r\n* On systems with a large number of CPUs (more than 16), multiple\r\napplications calling the \"times()\" system call may have caused a system\r\nhang.\r\n\r\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\r\npackages, which contain backported patches to resolve these issues.", "modified": "2017-09-08T12:08:36", "published": "2008-06-25T04:00:00", "id": "RHSA-2008:0508", "href": "https://access.redhat.com/errata/RHSA-2008:0508", "type": "redhat", "title": "(RHSA-2008:0508) Important: kernel security and bug fix update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:42", "bulletinFamily": "unix", "description": "[2.6.18-92.1.13.0.1.el5]\n- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]\n- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]\n- [NET] fix netpoll race (Tina Yang) [orabugz 5791]\n[2.6.18-92.1.13.el5]\n- [md] fix crashes in iterate_rdev (Doug Ledford ) [460128 455471]\n- [sound] snd_seq_oss_synth_make_info info leak (Eugene Teo ) [458000 458001] {CVE-2008-3272}\n- [ipmi] control BMC device ordering (peterm@redhat.com ) [459071 430157]\n- [ia64] fix to check module_free parameter (Masami Hiramatsu ) [460639 457961]\n- [misc] NULL pointer dereference in kobject_get_path (Jiri Pirko ) [459776 455460]\n- [xen] ia64: SMP-unsafe with XENMEM_add_to_physmap on HVM (Tetsu Yamamoto ) [459780 457137]\n- [net] bridge: eliminate delay on carrier up (Herbert Xu ) [458783 453526]\n- [fs] dio: lock refcount operations (Jeff Moyer ) [459082 455750]\n- [misc] serial: fix break handling for i82571 over LAN (Aristeu Rozanski ) [460509 440018]\n- [fs] dio: use kzalloc to zero out struct dio (Jeff Moyer ) [461091 439918]\n- [fs] lockd: nlmsvc_lookup_host called with f_sema held (Jeff Layton ) [459083 453094]\n- [net] bnx2x: chip reset and port type fixes (Andy Gospodarek ) [441259 442026]\n[2.6.18-92.1.12.el5]\n- [mm] tmpfs: restore missing clear_highpage (Eugene Teo ) [426082 426083]{CVE-2007-6417}\n- [fs] vfs: fix lookup on deleted directory (Eugene Teo ) [457865 457866]{CVE-2008-3275}\n- [net] ixgbe: remove device ID for unsupported device (Andy Gospodarek ) [457484 454910]\n- [ppc] Event Queue overflow on eHCA adapters (Brad Peters ) [458779 446713]\n[2.6.18-92.1.11.el5]\n- [mm] xpmem: inhibit page swapping under heavy mem use (George Beshers ) [456946 456574]\n- [xen] HV: memory corruption with large number of cpus (Chris Lalancette ) [455768 449945]\n- [fs] missing check before setting mount propagation (Eugene Teo ) [454392 454393]\n- [openib] small ipoib packet can cause an oops (Doug Ledford ) [447913 445731]\n- [misc] fix race in switch_uid and user signal accounting (Vince Worthington ) [456235 441762 440830]", "modified": "2008-09-24T00:00:00", "published": "2008-09-24T00:00:00", "id": "ELSA-2008-0885", "href": "http://linux.oracle.com/errata/ELSA-2008-0885.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:11", "bulletinFamily": "unix", "description": "[2.4.21-58.0.0.0.1.EL]\n- add directio support for qla drivers (herb) [ora 6346849]\n- support PT Quad card [ora 5751043]\n- io to nfs partition hangs [ora 5088963]\n- add entropy for bnx2 nic [ora 5931647]\n- avoid large allocation-fragmentation in MTU (zab)\n- fix clear highpage (wli)\n[2.4.21-58.EL]\n- copy_user doesn't zero tail bytes on page fault (Don Howard) [433941] {CVE-2008-2729}\n- Fix long symlink support (Fabio Olive Leite) [BZ 438758]\n- Fix possible buffer overflow in ASN.1 parsing routine (Don Howard) [444461] {CVE-2008-1673}\n- Fix exploitable remote memory leak in sit (Don Howard) [446034] {CVE-2008-2136}\n- Fix possible panic in mptctl_gettargetinfo (Don Howard) [451955]\n- Add add NULL pointer checks in tty drivers (Don Howard) [453158] {CVE-2008-2812}\n- Add a kernel parameter to disable lost tick accounting on x86_64 (Don Howard) [455921]\n- Fix possible isdn_net buffer overflows (Don Howard) [456361] {CVE-2007-6063}\n- Fix lookup on deleted directory (Eugene Teo) [457862] {CVE-2008-3275}\n- Add missing capability checks in sbni_ioctl (Eugene Teo) [460404] {CVE-2008-3525}\n- Remove suid/sgid bits on ftruncate (dhoward) [463684] {CVE-2008-4210}", "modified": "2008-12-18T00:00:00", "published": "2008-12-18T00:00:00", "id": "ELSA-2008-0973", "href": "http://linux.oracle.com/errata/ELSA-2008-0973.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:39:45", "bulletinFamily": "unix", "description": "[2.6.18-92.1.10.0.1.el5]\n- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]\n- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]\n- [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]\n- [NET] fix netpoll race (Tina Yang) [orabugz 5791]\n[2.6.18-92.1.10.el5]\n- [ia64] softlock: prevent endless warnings in kdump (Neil Horman ) [456117 453200]\n[2.6.18-92.1.9.el5]\n- [misc] signaling msgrvc() should not pass back error (Jiri Pirko ) [455278 452533]\n- [ia64] properly unregister legacy interrupts (Prarit Bhargava ) [450337 445886]\n[2.6.18-92.1.8.el5]\n- [net] randomize udp port allocation (Eugene Teo ) [454571 454572]\n- [tty] add NULL pointer checks (Aristeu Rozanski ) [453425 453154] {CVE-2008-2812}\n- [net] sctp: make sure sctp_addr does not overflow (David S. Miller ) [452482 452483] {CVE-2008-2826}\n- [sys] sys_setrlimit: prevent setting RLIMIT_CPU to 0 (Neil Horman ) [437121 437122] {CVE-2008-1294}\n- [net] sit: exploitable remote memory leak (Jiri Pirko ) [446038 446039] {CVE-2008-2136}\n- [misc] ttyS1 lost interrupt, stops transmitting v2 (Brian Maly ) [455256 451157]\n- [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]\n[2.6.18-92.1.7.el5]\n- [x86_64]: extend MCE banks support for Dunnington, Nehalem (Prarit Bhargava ) [451941 446673]\n- [nfs] address nfs rewrite performance regression in RHEL5 (Eric Sandeen ) [448685 436004]\n- [mm] Make mmap() with PROT_WRITE on RHEL5 (Larry Woodman ) [450758 448978]\n- [i386]: Add check for supported_cpus in powernow_k8 driver (Prarit Bhargava ) [450866 443853]\n- [i386]: Add check for dmi_data in powernow_k8 driver (Prarit Bhargava ) [450866 443853]\n- [net] fix recv return zero (Thomas Graf ) [452231 435657]\n- [misc] kernel crashes on futex (Anton Arapov ) [450336 435178]\n- [net] Fixing bonding rtnl_lock screwups (Fabio Olive Leite ) [451939 450219]", "modified": "2008-08-05T00:00:00", "published": "2008-08-05T00:00:00", "id": "ELSA-2008-0612", "href": "http://linux.oracle.com/errata/ELSA-2008-0612.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:13", "bulletinFamily": "unix", "description": "[2.6.18-92.1.6.0.2.el5]\n- [NET] Add entropy support to e1000 and bnx2 (John Sobecki) [orabug 6045759]\n- [splice] Fix bad unlock_page() in error case (Jens Axboe) [orabug 6263574]\n- [dio] fix error-path crashes (Linus Torvalds) [orabug 6242289]\n- [NET] fix netpoll race (Tina Yang) [orabugz 5791]\n[2.6.18-92.1.6.el5]\n- [x86] sanity checking for read_tsc on i386 (Brian Maly ) [447686 443435]\n[2.6.18-92.1.5.el5]\n- [x86_64] copy_user doesn't zero tail bytes on page fault (Vitaly Mayatskikh) [451275 451276] {CVE-2008-2729}\n[2.6.18-92.1.4.el5]\n- Revert: [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]\n[2.6.18-92.1.3.el5]\n- [x86_64] fix possible data leaks in copy_from_user() routine (Anton Arapov ) [433944 433945] {CVE-2008-0598}\n[2.6.18-92.1.2.el5]\n- [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]\n- [net] DCCP sanity check feature length (Anton Arapov ) [447395 447396] {CVE-2008-2358}\n- [misc] fix possible buffer overflow in ASN.1 parsing routine (Anton Arapov ) [444464 444465] {CVE-2008-1673}", "modified": "2008-06-26T00:00:00", "published": "2008-06-26T00:00:00", "id": "ELSA-2008-0519", "href": "http://linux.oracle.com/errata/ELSA-2008-0519.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "seebug": [{"lastseen": "2017-11-19T21:42:07", "bulletinFamily": "exploit", "description": "BUGTRAQ ID: 29990\r\nCVE ID:CVE-2008-2826\r\nCNCVE ID\uff1aCNCVE-20082826\r\n\r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\nLinux kernel 'sctp_getsockopt_local_addrs_old()'\u51fd\u6570\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u4f7f\u5185\u6838\u5d29\u6e83\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\r\n\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\n\nrPath rPath Linux 2\r\nrPath rPath Linux 1\r\nrPath Appliance Platform Linux Service 2\r\nrPath Appliance Platform Linux Service 1\r\nLinux kernel 2.6.26 -rc6\r\nLinux kernel 2.6.25 .5\r\nLinux kernel 2.6.25 \r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23 \r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22 \r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20 \r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19 \r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18 \r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14 \r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12 \r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10 \r\nLinux kernel 2.6.9 \r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8 \r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7 \r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6 \r\nLinux kernel 2.6.5 \r\nLinux kernel 2.6.4 \r\nLinux kernel 2.6.3 \r\nLinux kernel 2.6.2 \r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1 \r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6 \r\nLinux kernel 2.6.8.1\r\nLinux kernel 2.6.26-rc5-git1\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\r\n\n \u5347\u7ea7\u5230\u6700\u65b0\u7684linux\u5185\u6838\uff1a\r\n<a href=http://www.kernel.org/ target=_blank>http://www.kernel.org/</a>", "modified": "2008-07-01T00:00:00", "published": "2008-07-01T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3510", "id": "SSV:3510", "type": "seebug", "title": "Linux kernel 'sctp_getsockopt_local_addrs_old()'\u51fd\u6570\u672c\u5730\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T21:25:11", "bulletinFamily": "exploit", "description": "CVE: CVE-2008-3275 \r\n\r\nThe Linux kernel is prone to a local denial-of-service vulnerability affecting the VFS behavior in UBIFS (UBI File System).\r\n\r\nAttackers can exploit this issue to cause the kernel to crash, denying service to legitimate users. \n\nUbuntu Ubuntu Linux 8.04 LTS sparc\r\nUbuntu Ubuntu Linux 8.04 LTS powerpc\r\nUbuntu Ubuntu Linux 8.04 LTS lpia\r\nUbuntu Ubuntu Linux 8.04 LTS i386\r\nUbuntu Ubuntu Linux 8.04 LTS amd64\r\nUbuntu Ubuntu Linux 7.10 sparc\r\nUbuntu Ubuntu Linux 7.10 powerpc\r\nUbuntu Ubuntu Linux 7.10 lpia\r\nUbuntu Ubuntu Linux 7.10 i386\r\nUbuntu Ubuntu Linux 7.10 amd64\r\nUbuntu Ubuntu Linux 7.04 sparc\r\nUbuntu Ubuntu Linux 7.04 powerpc\r\nUbuntu Ubuntu Linux 7.04 i386\r\nUbuntu Ubuntu Linux 7.04 amd64\r\nUbuntu Ubuntu Linux 6.06 LTS sparc\r\nUbuntu Ubuntu Linux 6.06 LTS powerpc\r\nUbuntu Ubuntu Linux 6.06 LTS i386\r\nUbuntu Ubuntu Linux 6.06 LTS amd64\r\nS.u.S.E. SUSE Linux Enterprise Server 10 SP2\r\nS.u.S.E. SUSE Linux Enterprise Server 10 SP1\r\nS.u.S.E. SUSE Linux Enterprise Desktop 10 SP2\r\nS.u.S.E. SUSE Linux Enterprise Desktop 10 SP1\r\nS.u.S.E. SUSE Linux Enterprise 10 SP2 DEBUGINFO\r\nS.u.S.E. SUSE Linux Enterprise 10 SP1 DEBUGINFO\r\nS.u.S.E. SLE SDK 10.SP1\r\nS.u.S.E. SLE SDK 10 SP2\r\nS.u.S.E. openSUSE 11.0\r\nS.u.S.E. Linux Enterprise Server 10.SP2 SP\r\nS.u.S.E. Linux Enterprise Desktop 10 SP2\r\nS.u.S.E. Linux Enterprise Desktop 10 SP1\r\nRedHat Enterprise Linux WS 4\r\nRedHat Enterprise Linux ES 4\r\nRedHat Enterprise Linux Desktop 5 client\r\nRedHat Enterprise Linux AS 4\r\nRedHat Enterprise Linux 5 server\r\nRedHat Enterprise Linux 5 server\r\nLinux kernel 2.6.25 .9\r\nLinux kernel 2.6.25 .8\r\nLinux kernel 2.6.25 .7\r\nLinux kernel 2.6.25 .6\r\nLinux kernel 2.6.25 .5\r\nLinux kernel 2.6.25 .13\r\nLinux kernel 2.6.25 .12\r\nLinux kernel 2.6.25 .11\r\nLinux kernel 2.6.25 .10\r\nLinux kernel 2.6.25 \r\nLinux kernel 2.6.25 \r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23 \r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22 \r\nLinux kernel 2.6.22 \r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.20 \r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18 \r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\nLinux kernel 2.6.15 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14 \r\nLinux kernel 2.6.14 \r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13 \r\nLinux kernel 2.6.13 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12 \r\nLinux kernel 2.6.12 \r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11 \r\nLinux kernel 2.6.11 \r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10 \r\nLinux kernel 2.6.10 \r\nLinux kernel 2.6.9 \r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8 \r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7 \r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6 \r\nLinux kernel 2.6.5 \r\nLinux kernel 2.6.4 \r\nLinux kernel 2.6.3 \r\nLinux kernel 2.6.2 \r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1 \r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6 \r\nLinux kernel 2.6.8.1\r\n+ S.u.S.E. Linux Personal 9.2 x86_64\r\n+ S.u.S.E. Linux Personal 9.2 \r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\r\nDebian Linux 4.0 sparc\r\nDebian Linux 4.0 s/390\r\nDebian Linux 4.0 powerpc\r\nDebian Linux 4.0 mipsel\r\nDebian Linux 4.0 mips\r\nDebian Linux 4.0 m68k\r\nDebian Linux 4.0 ia-64\r\nDebian Linux 4.0 ia-32\r\nDebian Linux 4.0 hppa\r\nDebian Linux 4.0 arm\r\nDebian Linux 4.0 amd64\r\nDebian Linux 4.0 alpha\r\nDebian Linux 4.0\n <a href=http://security.ubuntu.com target=_blank>http://security.ubuntu.com</a>", "modified": "2008-10-04T00:00:00", "published": "2008-10-04T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4139", "id": "SSV:4139", "type": "seebug", "title": "Linux Kernel UBIFS Orphan Inode Local Denial of Service Vulnerability", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T21:36:17", "bulletinFamily": "exploit", "description": "BUGTRAQ ID: 30076\r\nCVE ID\uff1aCVE-2008-2812\r\nCNCVE ID\uff1aCNCVE-20082812\r\n \r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\nLinux TTY\u64cd\u4f5c\u5728\u4e3b\u7ebf\u4e0a\u7684\u91cd\u5199\u5b58\u5728NULL\u6307\u9488\u5f15\u7528\u95ee\u9898\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u4f7f\u7cfb\u7edf\u5d29\u6e83\u3002\r\n\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\r\n\n\nLinux kernel 2.6.25 .5\r\nLinux kernel 2.6.25 \r\nLinux kernel 2.6.24 .2\r\nLinux kernel 2.6.24 .1\r\nLinux kernel 2.6.24 -rc5\r\nLinux kernel 2.6.24 -rc4\r\nLinux kernel 2.6.24 -rc3\r\nLinux kernel 2.6.23 .7\r\nLinux kernel 2.6.23 .6\r\nLinux kernel 2.6.23 .5\r\nLinux kernel 2.6.23 .4\r\nLinux kernel 2.6.23 .3\r\nLinux kernel 2.6.23 .2\r\nLinux kernel 2.6.23 -rc2\r\nLinux kernel 2.6.23 -rc1\r\nLinux kernel 2.6.23 \r\nLinux kernel 2.6.22 7\r\nLinux kernel 2.6.22 1\r\nLinux kernel 2.6.22 .8\r\nLinux kernel 2.6.22 .6\r\nLinux kernel 2.6.22 .5\r\nLinux kernel 2.6.22 .4\r\nLinux kernel 2.6.22 .3\r\nLinux kernel 2.6.22 .17\r\nLinux kernel 2.6.22 .16\r\nLinux kernel 2.6.22 .15\r\nLinux kernel 2.6.22 .14\r\nLinux kernel 2.6.22 .13\r\nLinux kernel 2.6.22 .12\r\nLinux kernel 2.6.22 .11\r\nLinux kernel 2.6.22 \r\nLinux kernel 2.6.21 4\r\nLinux kernel 2.6.21 .7\r\nLinux kernel 2.6.21 .6\r\nLinux kernel 2.6.21 .2\r\nLinux kernel 2.6.21 .1\r\nLinux kernel 2.6.21 \r\nLinux kernel 2.6.20 .9\r\nLinux kernel 2.6.20 .8\r\nLinux kernel 2.6.20 .5\r\nLinux kernel 2.6.20 .4\r\nLinux kernel 2.6.20 .15\r\nLinux kernel 2.6.20 \r\nLinux kernel 2.6.19 1\r\nLinux kernel 2.6.19 .2\r\nLinux kernel 2.6.19 .1\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.19 \r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18 \r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17 \r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16 \r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14 \r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12 \r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11 \r\n+ Trustix Secure Enterprise Linux 2.0 \r\n+ Trustix Secure Linux 2.2 \r\n+ Trustix Secure Linux 2.1 \r\n+ Trustix Secure Linux 2.0 \r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10 \r\nLinux kernel 2.6.9 \r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8 \r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7 \r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6 \r\nLinux kernel 2.6.5 \r\nLinux kernel 2.6.4 \r\nLinux kernel 2.6.3 \r\nLinux kernel 2.6.2 \r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1 \r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6 \r\nLinux kernel 2.6.8.1\r\n+ S.u.S.E. Linux Personal 9.2 x86_64\r\n+ S.u.S.E. Linux Personal 9.2 \r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.25.4\r\nLinux kernel 2.6.25.3\r\nLinux kernel 2.6.25.2\r\nLinux kernel 2.6.25.1\r\nLinux kernel 2.6.24.6\r\nLinux kernel 2.6.24-rc2\r\nLinux kernel 2.6.24-rc1\r\nLinux kernel 2.6.23.14\r\nLinux kernel 2.6.23.10\r\nLinux kernel 2.6.23.1\r\nLinux kernel 2.6.23.09\r\nLinux kernel 2.6.22-rc7\r\nLinux kernel 2.6.22-rc1\r\nLinux kernel 2.6.21-RC6\r\nLinux kernel 2.6.21-RC5\r\nLinux kernel 2.6.21-RC4\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.21-RC3\r\nLinux kernel 2.6.20.3\r\nLinux kernel 2.6.20.2\r\nLinux kernel 2.6.20.13\r\nLinux kernel 2.6.20.11\r\nLinux kernel 2.6.20.1\r\nLinux kernel 2.6.20-rc2\r\nLinux kernel 2.6.20-2\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\r\n\n \u5347\u7ea7\u5230\u6700\u65b0\u5185\u6838\uff1a\r\nLinux kernel 2.6.20.2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21-RC3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21-RC3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.25.3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.23.14\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.11.4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20-rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22-rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20-2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21-RC4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20.3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.8.1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test6\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test9-CVS\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test7\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6 -test9\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.1 -rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.1 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.10 rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.11 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.11 -rc3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.11 .11\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 -rc4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .12\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .22\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.12 .2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.13 -rc4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.13 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.14 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 -rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 -rc3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.15 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 .9\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 .1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 .23\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.16 -rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .5\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .7\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .13\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 .10\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.17 -rc5\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.18 .3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.19 -rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.2 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20 .15\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.20 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21 .7\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21 4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.21 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .17\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .4\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .6\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .15\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.22 .11\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.23 .7\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.23 -rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.23 -rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.24 -rc3\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.24 -rc5\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.24 .1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.25 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.25 .5\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.4 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.6 rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.7 \r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.8 rc2\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>\r\nLinux kernel 2.6.8 rc1\r\nLinux linux-2.6.25.10.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>", "modified": "2008-07-07T00:00:00", "published": "2008-07-07T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3554", "id": "SSV:3554", "title": "Linux Kernel TTY\u64cd\u4f5cNULL\u6307\u9488\u5f15\u7528\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "sourceData": "", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T21:35:24", "bulletinFamily": "exploit", "description": "BUGTRAQ ID: 30076\r\nCVE(CAN) ID: CVE-2008-2812\r\n\r\nLinux Kernel\u662f\u5f00\u653e\u6e90\u7801\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux Kernel\u6ca1\u6709\u6b63\u786e\u5730\u6267\u884ctty\u64cd\u4f5c\uff0c\u672c\u5730\u7528\u6237\u53ef\u4ee5\u5728drivers/net/\u7684\u4ee5\u4e0b\u6587\u4ef6\u4e2d\u89e6\u53d1\u7a7a\u6307\u9488\u5f15\u7528\uff0c\u5bfc\u81f4\u7cfb\u7edf\u5d29\u6e83\uff1a \r\n\r\n(1) hamradio/6pack.c\r\n(2) hamradio/mkiss.c\r\n(3) irda/irtty-sir.c\r\n(4) ppp_async.c\r\n(5) ppp_synctty.c\r\n(6) slip.c\r\n(7) wan/x25_asy.c\r\n(8) wireless/strip.c\n\nLinux kernel < 2.6.25.10\n Linux\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.25.10.tar.bz2</a>", "modified": "2008-07-14T00:00:00", "published": "2008-07-14T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3609", "id": "SSV:3609", "title": "Linux Kernel TTY\u64cd\u4f5c\u7a7a\u6307\u9488\u5f15\u7528\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "sourceData": "", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T21:25:16", "bulletinFamily": "exploit", "description": "CVE: CVE-2008-3272 \r\n\r\nThe Linux kernel is prone to an information-disclosure vulnerability.\r\n\r\nSuccessful exploits will allow attackers to obtain sensitive information that may aid in further attacks.\r\n\r\nVersions prior to Linux kernel 2.6.27-rc2 are vulnerable. \n\nUbuntu Ubuntu Linux 8.04 LTS sparc\r\nUbuntu Ubuntu Linux 8.04 LTS powerpc\r\nUbuntu Ubuntu Linux 8.04 LTS lpia\r\nUbuntu Ubuntu Linux 8.04 LTS i386\r\nUbuntu Ubuntu Linux 8.04 LTS amd64\r\nUbuntu Ubuntu Linux 7.10 sparc\r\nUbuntu Ubuntu Linux 7.10 powerpc\r\nUbuntu Ubuntu Linux 7.10 lpia\r\nUbuntu Ubuntu Linux 7.10 i386\r\nUbuntu Ubuntu Linux 7.10 amd64\r\nUbuntu Ubuntu Linux 7.04 sparc\r\nUbuntu Ubuntu Linux 7.04 powerpc\r\nUbuntu Ubuntu Linux 7.04 i386\r\nUbuntu Ubuntu Linux 7.04 amd64\r\nUbuntu Ubuntu Linux 6.06 LTS sparc\r\nUbuntu Ubuntu Linux 6.06 LTS powerpc\r\nUbuntu Ubuntu Linux 6.06 LTS i386\r\nUbuntu Ubuntu Linux 6.06 LTS amd64\r\nS.u.S.E. SUSE Linux Enterprise Server 9\r\nS.u.S.E. SUSE Linux Enterprise Server 10 SP2\r\nS.u.S.E. SUSE Linux Enterprise Server 10 SP1\r\nS.u.S.E. SUSE Linux Enterprise Desktop 10 SP2\r\nS.u.S.E. SUSE Linux Enterprise Desktop 10 SP1\r\nS.u.S.E. SUSE Linux Enterprise 10 SP2 DEBUGINFO\r\nS.u.S.E. SUSE Linux Enterprise 10 SP1 DEBUGINFO\r\nS.u.S.E. SLE SDK 10.SP1\r\nS.u.S.E. SLE SDK 10 SP2\r\nS.u.S.E. openSUSE 11.0\r\nS.u.S.E. Open-Enterprise-Server 9.0 \r\nS.u.S.E. Novell Linux POS 9\r\nS.u.S.E. Novell Linux Desktop 9.0 \r\nS.u.S.E. Novell Linux Desktop 9\r\nRedHat Enterprise Linux Desktop 5 client\r\nRedHat Enterprise Linux 5 server\r\nLinux kernel 2.6.27 -rc1\r\nDebian Linux 4.0 sparc\r\nDebian Linux 4.0 s/390\r\nDebian Linux 4.0 powerpc\r\nDebian Linux 4.0 mipsel\r\nDebian Linux 4.0 mips\r\nDebian Linux 4.0 m68k\r\nDebian Linux 4.0 ia-64\r\nDebian Linux 4.0 ia-32\r\nDebian Linux 4.0 hppa\r\nDebian Linux 4.0 arm\r\nDebian Linux 4.0 amd64\r\nDebian Linux 4.0 alpha\r\nDebian Linux 4.0\r\n\n Ubuntu Ubuntu Linux 7.10 powerpc\r\n\r\nUbuntu block-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/bloc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/bloc</a> k-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu block-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/bloc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/bloc</a> k-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu block-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/bloc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/bloc</a> k-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu crypto-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cryp target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cryp</a> to-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu crypto-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cryp target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cryp</a> to-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu crypto-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cryp target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/cryp</a> to-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fat-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-</a> modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fat-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-</a> modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fat-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fat-</a> modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu firewire-core-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fire target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fire</a> wire-core-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu firewire-core-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fire target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fire</a> wire-core-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu firewire-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fire target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fire</a> wire-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb \r\n\r\nUbuntu floppy-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/flop target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/flop</a> py-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu floppy-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/flop target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/flop</a> py-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu floppy-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/flop target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/flop</a> py-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fs-core-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-c target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-c</a> ore-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fs-core-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-c target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-c</a> ore-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fs-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-c target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-c</a> ore-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fs-secondary-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-s target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-s</a> econdary-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fs-secondary-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-s target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-s</a> econdary-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu fs-secondary-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-s target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/fs-s</a> econdary-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ide-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-</a> modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ide-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-</a> modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ide-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ide-</a> modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu input-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/inpu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/inpu</a> t-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu input-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/inpu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/inpu</a> t-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu input-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/inpu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/inpu</a> t-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ipv6-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6</a> -modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ipv6-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6</a> -modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ipv6-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ipv6</a> -modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu irda-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda</a> -modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu irda-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda</a> -modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu irda-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/irda</a> -modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu kernel-image-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kern target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kern</a> el-image-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu kernel-image-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kern target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kern</a> el-image-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu kernel-image-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kern target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/kern</a> el-image-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu linux-doc-2.6.22_2.6.22-15.58_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-doc-2.6.22_2.6.22-15.58_all.deb\r\n\r\nUbuntu linux-headers-2.6.22-15-cell_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-headers-2.6.22-15-cell_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-headers-2.6.22-15-powerpc-smp_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-headers-2.6.22-15-powerpc-smp_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-headers-2.6.22-15-powerpc_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-headers-2.6.22-15-powerpc_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-headers-2.6.22-15-powerpc64-smp_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-headers-2.6.22-15-powerpc64-smp_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-headers-2.6.22-15_2.6.22-15.58_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-headers-2.6.22-15_2.6.22-15.58_all.deb\r\n\r\nUbuntu linux-image-2.6.22-15-cell_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-image-2.6.22-15-cell_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-image-2.6.22-15-powerpc-smp_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-image-2.6.22-15-powerpc-smp_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-image-2.6.22-15-powerpc_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-image-2.6.22-15-powerpc_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-image-2.6.22-15-powerpc64-smp_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-image-2.6.22-15-powerpc64-smp_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-kernel-devel_2.6.22-15.58_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-kernel-devel_2.6.22-15.58_all.deb\r\n\r\nUbuntu linux-libc-dev_2.6.22-15.58_powerpc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-libc-dev_2.6.22-15.58_powerpc.deb\r\n\r\nUbuntu linux-source-2.6.22_2.6.22-15.58_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/linu</a> x-source-2.6.22_2.6.22-15.58_all.deb\r\n\r\nUbuntu md-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-m target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-m</a> odules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu md-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-m target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-m</a> odules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu md-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-m target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/md-m</a> odules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu message-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/mess target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/mess</a> age-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu message-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/mess target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/mess</a> age-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu message-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/mess target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/mess</a> age-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nfs-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-</a> modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nfs-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-</a> modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nfs-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nfs-</a> modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> shared-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> shared-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> shared-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-usb-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> usb-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-usb-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> usb-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu nic-usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/nic-</a> usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu parport-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parp target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parp</a> ort-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu parport-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parp target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parp</a> ort-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu parport-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parp target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/parp</a> ort-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pata-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata</a> -modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pata-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata</a> -modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pata-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pata</a> -modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pcmcia-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc</a> ia-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pcmcia-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc</a> ia-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pcmcia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc</a> ia-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pcmcia-storage-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc</a> ia-storage-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pcmcia-storage-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc</a> ia-storage-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu pcmcia-storage-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/pcmc</a> ia-storage-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.ude b\r\n\r\nUbuntu plip-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip</a> -modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu plip-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip</a> -modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu plip-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/plip</a> -modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ppp-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-</a> modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ppp-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-</a> modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu ppp-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/ppp-</a> modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu sata-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata</a> -modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu sata-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata</a> -modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu sata-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sata</a> -modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu scsi-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi</a> -modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu scsi-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi</a> -modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu scsi-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/scsi</a> -modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu serial-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/seri target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/seri</a> al-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu serial-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/seri target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/seri</a> al-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu serial-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/seri target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/seri</a> al-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu socket-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sock target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sock</a> et-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu socket-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sock target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sock</a> et-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu socket-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sock target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/sock</a> et-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu storage-core-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/stor target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/stor</a> age-core-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu storage-core-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/stor target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/stor</a> age-core-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu storage-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/stor target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/stor</a> age-core-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu usb-modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-</a> modules-2.6.22-15-cell-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu usb-modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-</a> modules-2.6.22-15-powerpc-di_2.6.22-15.58_powerpc.udeb\r\n\r\nUbuntu usb-modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.22/usb-</a> modules-2.6.22-15-powerpc64-smp-di_2.6.22-15.58_powerpc.udeb\r\n\r\n\r\nDebian Linux 4.0 arm\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-doc-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-</a> 2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag</a> e-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag</a> e-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.5_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag</a> e-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.5_arm.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-manual-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manu target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manu</a> al-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patc target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patc</a> h-debian-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-sour target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-sour</a> ce-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-supp target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-supp</a> ort-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree</a> -2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\n\r\nUbuntu Ubuntu Linux 8.04 LTS powerpc\r\n\r\nUbuntu block-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-19-powe target=_blank>http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-19-powe</a> rpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu block-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-19-powe target=_blank>http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-19-powe</a> rpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu crypto-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-19-pow</a> erpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu crypto-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-19-pow</a> erpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu fat-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-19-powerp</a> c-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu fat-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-19-powerp</a> c64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu firewire-core-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24</a> -19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu firewire-core-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24</a> -19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu floppy-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-19-pow</a> erpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu floppy-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-19-pow</a> erpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu fs-core-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-19-po target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-19-po</a> werpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu fs-core-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-19-po target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-19-po</a> werpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu fs-secondary-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24- target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-</a> 19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu fs-secondary-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24- target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-</a> 19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu ide-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-19-powerp</a> c-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu ide-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-19-powerp</a> c64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu input-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-19-powe target=_blank>http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-19-powe</a> rpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu input-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-19-powe target=_blank>http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-19-powe</a> rpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu ipv6-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-19-power</a> pc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu ipv6-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-19-power</a> pc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu irda-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-19-power</a> pc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu irda-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-19-power</a> pc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu kernel-image-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-19-power</a> pc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu kernel-image-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-19-power</a> pc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu linux-doc-2.6.24_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2</a> .6.24-19.41_all.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-powerpc-smp_2.6.24-19.41_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-powe target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-powe</a> rpc-smp_2.6.24-19.41_powerpc.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-powerpc_2.6.24-19.41_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-powe target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-powe</a> rpc_2.6.24-19.41_powerpc.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-powerpc64-smp_2.6.24-19.41_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-powe target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-powe</a> rpc64-smp_2.6.24-19.41_powerpc.deb\r\n\r\nUbuntu linux-headers-2.6.24-19_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.</a> 24-19_2.6.24-19.41_all.deb\r\n\r\nUbuntu linux-image-2.6.24-19-powerpc-smp_2.6.24-19.41_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-powerp</a> c-smp_2.6.24-19.41_powerpc.deb\r\n\r\nUbuntu linux-image-2.6.24-19-powerpc_2.6.24-19.41_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-powerp</a> c_2.6.24-19.41_powerpc.deb\r\n\r\nUbuntu linux-image-2.6.24-19-powerpc64-smp_2.6.24-19.41_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-powerp</a> c64-smp_2.6.24-19.41_powerpc.deb\r\n\r\nUbuntu linux-kernel-devel_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel</a> _2.6.24-19.41_all.deb\r\n\r\nUbuntu linux-libc-dev_2.6.24-19.41_powerpc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-19.41_ target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-19.41_</a> powerpc.deb\r\n\r\nUbuntu linux-source-2.6.24_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.2</a> 4_2.6.24-19.41_all.deb\r\n\r\nUbuntu md-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-19-powerpc target=_blank>http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-19-powerpc</a> -di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu md-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-19-powerpc target=_blank>http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-19-powerpc</a> 64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu message-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-19-po target=_blank>http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-19-po</a> werpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu message-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-19-po target=_blank>http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-19-po</a> werpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nfs-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-19-powerp</a> c-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nfs-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-19-powerp</a> c64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nic-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-19-powerp</a> c-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nic-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-19-powerp</a> c64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nic-pcmcia-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-19 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-19</a> -powerpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nic-pcmcia-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-19 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-19</a> -powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-19 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-19</a> -powerpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-19 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-19</a> -powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nic-usb-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-19-po target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-19-po</a> werpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu nic-usb-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-19-po target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-19-po</a> werpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu parport-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-19-po target=_blank>http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-19-po</a> werpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu parport-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-19-po target=_blank>http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-19-po</a> werpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu pata-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-19-power</a> pc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu pata-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-19-power</a> pc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu pcmcia-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-19-pow</a> erpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu pcmcia-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-19-pow</a> erpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu pcmcia-storage-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.2 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.2</a> 4-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu pcmcia-storage-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.2 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.2</a> 4-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu plip-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-19-power</a> pc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu plip-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-19-power</a> pc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu ppp-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-19-powerp</a> c-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu ppp-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-19-powerp</a> c64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu sata-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-19-power</a> pc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu sata-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-19-power</a> pc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu scsi-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-19-power</a> pc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu scsi-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-19-power target=_blank>http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-19-power</a> pc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu serial-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-19-pow</a> erpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu serial-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-19-pow</a> erpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu socket-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-19-pow</a> erpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu socket-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-19-pow target=_blank>http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-19-pow</a> erpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu storage-core-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24- target=_blank>http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-</a> 19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu storage-core-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24- target=_blank>http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-</a> 19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu usb-modules-2.6.24-19-powerpc-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-19-powerp</a> c-di_2.6.24-19.41_powerpc.udeb\r\n\r\nUbuntu usb-modules-2.6.24-19-powerpc64-smp-di_2.6.24-19.41_powerpc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-19-powerp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-19-powerp</a> c64-smp-di_2.6.24-19.41_powerpc.udeb\r\n\r\n\r\nDebian Linux 4.0 powerpc\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-doc-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-</a> 2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.5_powerpc.deb \r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-head</a> ers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag</a> e-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag</a> e-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag</a> e-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.5_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-imag</a> e-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.5_powerpc.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-manual-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manu target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manu</a> al-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patc target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patc</a> h-debian-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-sour target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-sour</a> ce-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-supp target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-supp</a> ort-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree</a> -2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\n\r\nUbuntu Ubuntu Linux 8.04 LTS sparc\r\n\r\nUbuntu block-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-19-spar target=_blank>http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-19-spar</a> c64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu crypto-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-19-spa target=_blank>http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-19-spa</a> rc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu fat-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-19-sparc6 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-19-sparc6</a> 4-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu firewire-core-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24</a> -19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu fs-core-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-19-sp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-19-sp</a> arc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu fs-secondary-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24- target=_blank>http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-</a> 19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu ide-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-19-sparc6 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-19-sparc6</a> 4-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu input-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-19-spar target=_blank>http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-19-spar</a> c64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu ipv6-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-19-sparc target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-19-sparc</a> 64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu kernel-image-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-19-sparc target=_blank>http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-19-sparc</a> 64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu linux-doc-2.6.24_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2</a> .6.24-19.41_all.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-sparc64-smp_2.6.24-19.41_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-spar target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-spar</a> c64-smp_2.6.24-19.41_sparc.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-sparc64_2.6.24-19.41_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-spar target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-19-spar</a> c64_2.6.24-19.41_sparc.deb\r\n\r\nUbuntu linux-headers-2.6.24-19_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.</a> 24-19_2.6.24-19.41_all.deb\r\n\r\nUbuntu linux-image-2.6.24-19-sparc64-smp_2.6.24-19.41_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-sparc6 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-sparc6</a> 4-smp_2.6.24-19.41_sparc.deb\r\n\r\nUbuntu linux-image-2.6.24-19-sparc64_2.6.24-19.41_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-sparc6 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-19-sparc6</a> 4_2.6.24-19.41_sparc.deb\r\n\r\nUbuntu linux-kernel-devel_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel</a> _2.6.24-19.41_all.deb\r\n\r\nUbuntu linux-libc-dev_2.6.24-19.41_sparc.deb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-19.41_ target=_blank>http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-19.41_</a> sparc.deb\r\n\r\nUbuntu linux-source-2.6.24_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.2</a> 4_2.6.24-19.41_all.deb\r\n\r\nUbuntu md-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-19-sparc64 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-19-sparc64</a> -di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu message-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-19-sp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-19-sp</a> arc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu nfs-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-19-sparc6 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-19-sparc6</a> 4-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu nic-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-19-sparc6 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-19-sparc6</a> 4-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-19 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-19</a> -sparc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu nic-usb-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-19-sp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-19-sp</a> arc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu parport-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-19-sp target=_blank>http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-19-sp</a> arc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu pata-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-19-sparc target=_blank>http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-19-sparc</a> 64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu plip-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-19-sparc target=_blank>http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-19-sparc</a> 64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu ppp-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-19-sparc6 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-19-sparc6</a> 4-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu sata-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-19-sparc target=_blank>http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-19-sparc</a> 64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu scsi-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-19-sparc target=_blank>http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-19-sparc</a> 64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu serial-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-19-spa target=_blank>http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-19-spa</a> rc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu storage-core-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24- target=_blank>http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-</a> 19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n\r\nUbuntu usb-modules-2.6.24-19-sparc64-di_2.6.24-19.41_sparc.udeb\r\n<a href=http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-19-sparc6 target=_blank>http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-19-sparc6</a> 4-di_2.6.24-19.41_sparc.udeb\r\n\r\n\r\nDebian Linux 4.0 m68k\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-doc-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-</a> 2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-manual-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manu target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manu</a> al-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patc target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patc</a> h-debian-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-sour target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-sour</a> ce-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-supp target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-supp</a> ort-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.5_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree</a> -2.6.24_2.6.24-6~etchnhalf.5_all.deb\r\n\r\n\r\nUbuntu Ubuntu Linux 6.06 LTS sparc\r\n\r\nUbuntu cdrom-core-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdro target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdro</a> m-core-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu crc-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-</a> modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu ext2-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2</a> -modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu ext3-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3</a> -modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu fat-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-</a> modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu ide-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-</a> modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu input-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/inpu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/inpu</a> t-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu ipv6-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6</a> -modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu kernel-image-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kern target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kern</a> el-image-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu linux-doc-2.6.15_2.6.15-52.71_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu</a> x-doc-2.6.15_2.6.15-52.71_all.deb\r\n\r\nUbuntu linux-headers-2.6.15-52-sparc64-smp_2.6.15-52.71_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu</a> x-headers-2.6.15-52-sparc64-smp_2.6.15-52.71_sparc.deb\r\n\r\nUbuntu linux-headers-2.6.15-52-sparc64_2.6.15-52.71_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu</a> x-headers-2.6.15-52-sparc64_2.6.15-52.71_sparc.deb\r\n\r\nUbuntu linux-headers-2.6.15-52_2.6.15-52.71_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu</a> x-headers-2.6.15-52_2.6.15-52.71_sparc.deb\r\n\r\nUbuntu linux-image-2.6.15-52-sparc64-smp_2.6.15-52.71_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu</a> x-image-2.6.15-52-sparc64-smp_2.6.15-52.71_sparc.deb\r\n\r\nUbuntu linux-image-2.6.15-52-sparc64_2.6.15-52.71_sparc.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu</a> x-image-2.6.15-52-sparc64_2.6.15-52.71_sparc.deb\r\n\r\nUbuntu linux-kernel-devel_2.6.15-52.71_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu</a> x-kernel-devel_2.6.15-52.71_all.deb\r\n\r\nUbuntu linux-source-2.6.15_2.6.15-52.71_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linu</a> x-source-2.6.15_2.6.15-52.71_all.deb\r\n\r\nUbuntu loop-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop</a> -modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu md-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-m target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-m</a> odules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu nfs-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-</a> modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu nic-firmware-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-</a> firmware-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu nic-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-</a> modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-</a> shared-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu parport-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parp target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parp</a> ort-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu plip-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip</a> -modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu ppp-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-</a> modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu reiserfs-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reis target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reis</a> erfs-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu scsi-core-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi</a> -core-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu scsi-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi</a> -modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu usb-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-</a> modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu usb-storage-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-</a> storage-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\nUbuntu xfs-modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-</a> modules-2.6.15-52-sparc64-di_2.6.15-52.71_sparc.udeb\r\n\r\n\r\nUbuntu Ubuntu Linux 7.04 amd64\r\n\r\nUbuntu acpi-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi</a> -modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu block-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/bloc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/bloc</a> k-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu fat-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-</a> modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu fb-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-m target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-m</a> odules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu firewire-core-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fire target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fire</a> wire-core-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu floppy-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/flop target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/flop</a> py-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu fs-core-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-c target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-c</a> ore-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu fs-secondary-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-s target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-s</a> econdary-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu ide-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-</a> modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu input-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/inpu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/inpu</a> t-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu ipv6-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6</a> -modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu irda-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda</a> -modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu kernel-image-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kern target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kern</a> el-image-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu linux-doc-2.6.20_2.6.20-17.39_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-doc-2.6.20_2.6.20-17.39_all.deb\r\n\r\nUbuntu linux-headers-2.6.20-17-generic_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-headers-2.6.20-17-generic_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-headers-2.6.20-17-lowlatency_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-headers-2.6.20-17-lowlatency_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-headers-2.6.20-17-server_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-headers-2.6.20-17-server_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-headers-2.6.20-17_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-headers-2.6.20-17_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-image-2.6.20-17-generic_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-image-2.6.20-17-generic_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-image-2.6.20-17-lowlatency_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/ target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/</a> linux-image-2.6.20-17-lowlatency_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-image-2.6.20-17-server_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-image-2.6.20-17-server_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-image-debug-2.6.20-17-generic_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-image-debug-2.6.20-17-generic_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-image-debug-2.6.20-17-lowlatency_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/ target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/</a> linux-image-debug-2.6.20-17-lowlatency_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-image-debug-2.6.20-17-server_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-image-debug-2.6.20-17-server_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-kernel-devel_2.6.20-17.39_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-kernel-devel_2.6.20-17.39_all.deb\r\n\r\nUbuntu linux-libc-dev_2.6.20-17.39_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-libc-dev_2.6.20-17.39_amd64.deb\r\n\r\nUbuntu linux-source-2.6.20_2.6.20-17.39_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linu</a> x-source-2.6.20_2.6.20-17.39_all.deb\r\n\r\nUbuntu md-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-m target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-m</a> odules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu message-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/mess target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/mess</a> age-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu nfs-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-</a> modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu nic-firmware-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-</a> firmware-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu nic-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-</a> modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu nic-pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-</a> pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-</a> shared-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu nic-usb-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-</a> usb-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu parport-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parp target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parp</a> ort-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu pata-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata</a> -modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu pcmcia-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmc</a> ia-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu pcmcia-storage-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmc target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmc</a> ia-storage-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu plip-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip</a> -modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu ppp-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-</a> modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu sata-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata</a> -modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu scsi-firmware-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi</a> -firmware-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu scsi-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi</a> -modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu serial-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/seri target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/seri</a> al-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu socket-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sock target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sock</a> et-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu speakup-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/spea target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/spea</a> kup-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu storage-core-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/stor target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/stor</a> age-core-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\nUbuntu usb-modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-</a> modules-2.6.20-17-generic-di_2.6.20-17.39_amd64.udeb\r\n\r\n\r\nUbuntu Ubuntu Linux 8.04 LTS amd64\r\n\r\nUbuntu acpi-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.2</a> 4-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu block-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.</a> 24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu crypto-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6</a> .24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu fat-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24</a> -19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu fb-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-</a> 19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu firewire-core-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modu target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modu</a> les-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu floppy-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6</a> .24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu fs-core-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.</a> 6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu fs-secondary-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modul target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modul</a> es-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu ide-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24</a> -19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu input-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.</a> 24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu ipv6-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.2</a> 4-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu irda-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.2</a> 4-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu kernel-image-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.2</a> 4-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu linux-doc-2.6.24_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2</a> .6.24-19.41_all.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-generic_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.</a> 24-19-generic_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-openvz_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.</a> 24-19-openvz_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-rt_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.</a> 24-19-rt_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-server_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.</a> 24-19-server_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-headers-2.6.24-19-xen_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.</a> 24-19-xen_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-headers-2.6.24-19_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.</a> 24-19_2.6.24-19.41_all.deb\r\n\r\nUbuntu linux-image-2.6.24-19-generic_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24</a> -19-generic_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-image-2.6.24-19-openvz_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2. target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.</a> 6.24-19-openvz_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-image-2.6.24-19-rt_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2. target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.</a> 6.24-19-rt_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-image-2.6.24-19-server_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24</a> -19-server_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-image-2.6.24-19-xen_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2. target=_blank>http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.</a> 6.24-19-xen_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-image-debug-2.6.24-19-generic_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-</a> 2.6.24-19-generic_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-image-debug-2.6.24-19-server_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-</a> 2.6.24-19-server_2.6.24-19.41_amd64.deb\r\n\r\nUbuntu linux-kernel-devel_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel</a> _2.6.24-19.41_all.deb\r\n\r\nUbuntu linux-libc-dev_2.6.24-19.41_amd64.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6</a> .24-19.41_amd64.deb\r\n\r\nUbuntu linux-source-2.6.24_2.6.24-19.41_all.deb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.2</a> 4_2.6.24-19.41_all.deb\r\n\r\nUbuntu md-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24- target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-</a> 19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu message-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.</a> 6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu nfs-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24</a> -19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu nic-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24</a> -19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu nic-pcmcia-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules</a> -2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu nic-shared-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules</a> -2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu nic-usb-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.</a> 6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu parport-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2. target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.</a> 6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu pata-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.2</a> 4-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu pcmcia-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6</a> .24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu pcmcia-storage-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-mod target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-mod</a> ules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu plip-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.2</a> 4-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu ppp-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24</a> -19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu sata-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.2</a> 4-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu scsi-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.2 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.2</a> 4-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu serial-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6</a> .24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu socket-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6</a> .24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu storage-core-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modul target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modul</a> es-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n\r\nUbuntu usb-modules-2.6.24-19-generic-di_2.6.24-19.41_amd64.udeb\r\n<a href=http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24 target=_blank>http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24</a> -19-generic-di_2.6.24-19.41_amd64.udeb", "modified": "2008-10-04T00:00:00", "published": "2008-10-04T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-4138", "id": "SSV:4138", "type": "seebug", "title": "Linux Kernel 'snd_seq_oss_synth_make_info()' Information Disclosure Vulnerability", "sourceData": "", "sourceHref": "", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T21:30:35", "bulletinFamily": "exploit", "description": "CVE-2008-3272\r\n\r\nThe Linux kernel is prone to an information-disclosure vulnerability.\r\n\r\nSuccessful exploits will allow attackers to obtain sensitive information that may aid in further attacks.\r\n\r\nVersions prior to Linux kernel 2.6.27-rc2 are vulnerable. \n\nLinux kernel 2.6.27 -rc1\r\nDebian Linux 4.0 sparc\r\nDebian Linux 4.0 s/390\r\nDebian Linux 4.0 powerpc\r\nDebian Linux 4.0 mipsel\r\nDebian Linux 4.0 mips\r\nDebian Linux 4.0 m68k\r\nDebian Linux 4.0 ia-64\r\nDebian Linux 4.0 ia-32\r\nDebian Linux 4.0 hppa\r\nDebian Linux 4.0 arm\r\nDebian Linux 4.0 amd64\r\nDebian Linux 4.0 alpha\r\nDebian Linux 4.0\n Debian Linux 4.0\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 amd64\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-xen_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules</a> -2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules</a> -2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-sys target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-sys</a> tem-2.6.18-6-xen-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\nDebian xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-sys target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-sys</a> tem-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-22etch2_amd64.deb\r\n\r\n\r\nDebian Linux 4.0 mipsel\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-mipsel_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-qemu_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-r3k-kn02_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-r4k-kn04_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-r5k-cobalt_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-22etch2_mipsel.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 ia-32\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-i386_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-xen-vserver_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-xen_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-486_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-686-bigmem_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-amd64_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-k7_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules</a> -2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules</a> -2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-sys target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-sys</a> tem-2.6.18-6-xen-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\nDebian xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-sys target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-sys</a> tem-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-22etch2_i386.deb\r\n\r\n\r\nDebian Linux 4.0 arm\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-arm_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-footbridge_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-iop32x_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-ixp4xx_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-rpc_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-s3c2410_2.6.18.dfsg.1-22etch2_arm.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 hppa\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-hppa_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-parisc-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-parisc_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-parisc64-smp_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-parisc64_2.6.18.dfsg.1-22etch2_hppa.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 sparc\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-sparc_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-sparc32_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-sparc64-smp_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-sparc64_2.6.18.dfsg.1-22etch2_sparc.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 s/390\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-s390-tape_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-image-2.6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-s390_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-s390x_2.6.18.dfsg.1-22etch2_s390.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 powerpc\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-powerpc-miboot_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-powerpc-smp_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-prep_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-powerpc_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-vserver-powerpc64_2.6.18.dfsg.1-22etch2_powerpc.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 alpha\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver-alpha_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-vserver_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-alpha-generic_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-alpha-legacy_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-alpha-smp_2.6.18.dfsg.1-22etch2_alpha.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 ia-64\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch2_ia64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-ia64_2.6.18.dfsg.1-22etch2_ia64.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_ia64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_ia64.deb\r\n\r\nDebian linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n\r\nDebian linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n\r\nDebian linux-headers-2.6.18-6_2.6.18.dfsg.1-22etch2_ia64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_ia64.deb\r\n\r\nDebian linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-itanium_2.6.18.dfsg.1-22etch2_ia64.deb\r\n\r\nDebian linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2</a> .6.18-6-mckinley_2.6.18.dfsg.1-22etch2_ia64.deb\r\n\r\nDebian linux-manual-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-patch-debian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-d</a> ebian-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-source-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source- target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-</a> 2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-support-2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support</a> -2.6.18-6_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-tree-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2. target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.</a> 6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\n\r\nDebian Linux 4.0 mips\r\n\r\nDebian linux-doc-2.6.18_2.6.18.dfsg.1-22etch2_all.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6 target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6</a> .18_2.6.18.dfsg.1-22etch2_all.deb\r\n\r\nDebian linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-22etch2_mips.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all-mips_2.6.18.dfsg.1-22etch2_mips.deb\r\n\r\nDebian linux-headers-2.6.18-6-all_2.6.18.dfsg.1-22etch2_mips.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-all_2.6.18.dfsg.1-22etch2_mips.deb\r\n\r\nDebian linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-qemu_2.6.18.dfsg.1-22etch2_mips.deb\r\n\r\nDebian linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb\r\n<a href=http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers target=_blank>http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers</a> -2.6.18-6-r4k-ip22_2.6.18.dfsg.1-22etch2_mips.deb", "modified": "2008-08-22T00:00:00", "published": "2008-08-22T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3898", "id": "SSV:3898", "title": "Linux Kernel 'snd_seq_oss_synth_make_info()' Information Disclosure Vulnerabilit", "type": "seebug", "sourceData": "", "cvss": {"score": 6.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:COMPLETE/"}, "sourceHref": ""}, {"lastseen": "2017-11-19T21:37:53", "bulletinFamily": "exploit", "description": "BUGTRAQ ID: 29943\r\nCVE ID\uff1aCVE-2008-2729\r\nCNCVE ID\uff1aCNCVE-20082729\r\n\r\nLinux\u662f\u4e00\u6b3e\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\u90e8\u5206AMD64\u7cfb\u7edf\u4e0a\u7684Linux\u5185\u6838\u5185\u5b58\u62f7\u8d1d\u51fd\u6570\u5b58\u5728\u7f3a\u9677\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u83b7\u5f97\u654f\u611f\u4fe1\u606f\u3002\r\n\u5728\u90e8\u5206AMC64\u7cfb\u7edf\u4e0a\uff0c\u5982\u679c\u4ece\u6e90\u5730\u5740\u62f7\u8d1d\u5185\u6838\u5185\u5b58\u5230\u76ee\u7684\u5185\u5b58\u5730\u5740\u4e0d\u6210\u529f\uff0c\u62f7\u8d1d\u51fd\u6570\u5728\u76ee\u7684\u5185\u5b58\u4f4d\u7f6e\u533a\u57df\u6ca1\u6709\u5bf9\u5185\u5bb9\u8fdb\u884c\u6e05\u96f6\u64cd\u4f5c\uff0c\u8fd9\u53ef\u5bfc\u81f4\u975e\u7279\u6743\u7528\u6237\u83b7\u5f97\u654f\u611f\u4fe1\u606f\u3002\n\nRedHat Enterprise Linux WS 4\r\nRedHat Enterprise Linux ES 4\r\nRedHat Enterprise Linux Desktop 5 client\r\nRedHat Enterprise Linux AS 4\r\nRedHat Enterprise Linux 5 server\r\nRedHat Desktop 4.0\r\nLinux kernel 2.6.19 -rc4\r\nLinux kernel 2.6.19 -rc3\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.19 -rc2\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.19 -rc1\r\nLinux kernel 2.6.18 .4\r\nLinux kernel 2.6.18 .3\r\nLinux kernel 2.6.18 .1\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.17 .8\r\nLinux kernel 2.6.17 .7\r\nLinux kernel 2.6.17 .6\r\nLinux kernel 2.6.17 .5\r\nLinux kernel 2.6.17 .3\r\nLinux kernel 2.6.17 .2\r\nLinux kernel 2.6.17 .14\r\nLinux kernel 2.6.17 .13\r\nLinux kernel 2.6.17 .12\r\nLinux kernel 2.6.17 .11\r\nLinux kernel 2.6.17 .10\r\nLinux kernel 2.6.17 .1\r\nLinux kernel 2.6.17 -rc5\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\nLinux kernel 2.6.17\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.16 27\r\nLinux kernel 2.6.16 13\r\nLinux kernel 2.6.16 .9\r\nLinux kernel 2.6.16 .7\r\nLinux kernel 2.6.16 .23\r\nLinux kernel 2.6.16 .19\r\nLinux kernel 2.6.16 .12\r\nLinux kernel 2.6.16 .11\r\nLinux kernel 2.6.16 .1\r\nLinux kernel 2.6.16 -rc1\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\nLinux kernel 2.6.16\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.15 .4\r\nLinux kernel 2.6.15 .3\r\nLinux kernel 2.6.15 .2\r\nLinux kernel 2.6.15 .1\r\nLinux kernel 2.6.15 -rc3\r\nLinux kernel 2.6.15 -rc2\r\nLinux kernel 2.6.15 -rc1\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\nLinux kernel 2.6.15\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.14 .5\r\nLinux kernel 2.6.14 .4\r\nLinux kernel 2.6.14 .3\r\nLinux kernel 2.6.14 .2\r\nLinux kernel 2.6.14 .1\r\nLinux kernel 2.6.14 -rc4\r\nLinux kernel 2.6.14 -rc3\r\nLinux kernel 2.6.14 -rc2\r\nLinux kernel 2.6.14 -rc1\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.14\r\nLinux kernel 2.6.13 .4\r\nLinux kernel 2.6.13 .3\r\nLinux kernel 2.6.13 .2\r\nLinux kernel 2.6.13 .1\r\nLinux kernel 2.6.13 -rc7\r\nLinux kernel 2.6.13 -rc6\r\nLinux kernel 2.6.13 -rc4\r\nLinux kernel 2.6.13 -rc1\r\nLinux kernel 2.6.13\r\nLinux kernel 2.6.13\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.12 .6\r\nLinux kernel 2.6.12 .5\r\nLinux kernel 2.6.12 .4\r\nLinux kernel 2.6.12 .3\r\nLinux kernel 2.6.12 .22\r\nLinux kernel 2.6.12 .2\r\nLinux kernel 2.6.12 .12\r\nLinux kernel 2.6.12 .1\r\nLinux kernel 2.6.12 -rc5\r\nLinux kernel 2.6.12 -rc4\r\nLinux kernel 2.6.12 -rc1\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.12\r\nLinux kernel 2.6.11 .8\r\nLinux kernel 2.6.11 .7\r\nLinux kernel 2.6.11 .6\r\nLinux kernel 2.6.11 .5\r\nLinux kernel 2.6.11 .4\r\nLinux kernel 2.6.11 .12\r\nLinux kernel 2.6.11 .11\r\nLinux kernel 2.6.11 -rc4\r\nLinux kernel 2.6.11 -rc3\r\nLinux kernel 2.6.11 -rc2\r\nLinux kernel 2.6.11\r\nLinux kernel 2.6.11\r\n+ Trustix Secure Enterprise Linux 2.0\r\n+ Trustix Secure Linux 2.2\r\n+ Trustix Secure Linux 2.1\r\n+ Trustix Secure Linux 2.0\r\nLinux kernel 2.6.10 rc2\r\nLinux kernel 2.6.10\r\n+ RedHat Fedora Core3\r\n+ RedHat Fedora Core2\r\n+ Trustix Secure Linux 3.0\r\n+ Ubuntu Ubuntu Linux 5.0 4 powerpc\r\n+ Ubuntu Ubuntu Linux 5.0 4 i386\r\n+ Ubuntu Ubuntu Linux 5.0 4 amd64\r\nLinux kernel 2.6.10\r\nLinux kernel 2.6.9\r\nLinux kernel 2.6.8 rc3\r\nLinux kernel 2.6.8 rc2\r\nLinux kernel 2.6.8 rc1\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.8\r\nLinux kernel 2.6.7 rc1\r\nLinux kernel 2.6.7\r\nLinux kernel 2.6.6 rc1\r\nLinux kernel 2.6.6\r\nLinux kernel 2.6.5\r\nLinux kernel 2.6.4\r\nLinux kernel 2.6.3\r\nLinux kernel 2.6.2\r\nLinux kernel 2.6.1 -rc2\r\nLinux kernel 2.6.1 -rc1\r\nLinux kernel 2.6.1\r\nLinux kernel 2.6 .10\r\nLinux kernel 2.6 -test9-CVS\r\nLinux kernel 2.6 -test9\r\nLinux kernel 2.6 -test8\r\nLinux kernel 2.6 -test7\r\nLinux kernel 2.6 -test6\r\nLinux kernel 2.6 -test5\r\nLinux kernel 2.6 -test4\r\nLinux kernel 2.6 -test3\r\nLinux kernel 2.6 -test2\r\nLinux kernel 2.6 -test11\r\nLinux kernel 2.6 -test10\r\nLinux kernel 2.6 -test1\r\nLinux kernel 2.6\r\nLinux kernel 2.6.8.1\r\n+ S.u.S.E. Linux Personal 9.2 x86_64\r\n+ S.u.S.E. Linux Personal 9.2\r\n+ Ubuntu Ubuntu Linux 4.1 ppc\r\n+ Ubuntu Ubuntu Linux 4.1 ia64\r\n+ Ubuntu Ubuntu Linux 4.1 ia32\r\nLinux kernel 2.6.18-8.1.8.el5\r\nLinux kernel 2.6.18-53\r\nLinux kernel 2.6.18\r\nLinux kernel 2.6.15.5\r\nLinux kernel 2.6.15.11\r\nLinux kernel 2.6.15-27.48\r\nLinux kernel 2.6.11.4\n \u5347\u7ea7\u5185\u6838\uff1a\r\nLinux kernel 2.6.15-27.48\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test6\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test9-CVS\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test7\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test9\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6 -test10\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.1 -rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.10 rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.10\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.11\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.11 -rc3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.11 .11\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.11 .7\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 -rc4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .12\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .22\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 -rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.12 .3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.13 -rc4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.13\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.13 .3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.13\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 .4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 .1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 .3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 -rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 .5\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.14 -rc3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15 -rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15 -rc3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15 .4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.15\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 .9\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 .1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 .23\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 -rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 27\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 13\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.16 .11\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .5\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .7\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .13\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .10\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 -rc5\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.17 .14\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.18 .3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.19 -rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.19 -rc3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.3\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.4\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.6 rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.6\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.7\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.8 rc2\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.8 rc1\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>\r\nLinux kernel 2.6.9\r\nCuyahoga linux-2.6.19.tar.bz2\r\n<a href=http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2 target=_blank>http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.19.tar.bz2</a>", "modified": "2008-06-29T00:00:00", "published": "2008-06-29T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-3496", "id": "SSV:3496", "type": "seebug", "title": "Linux\u5185\u6838\u5185\u5b58\u62f7\u8d1d\u5f02\u5e38\u672c\u5730\u4fe1\u606f\u6cc4\u6f0f\u6f0f\u6d1e", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}]}