{"cve": [{"lastseen": "2020-10-03T11:34:57", "description": "Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.", "edition": 3, "cvss3": {}, "published": "2005-11-27T22:03:00", "title": "CVE-2005-3858", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-3858"], "modified": "2018-10-03T21:33:00", "cpe": ["cpe:/o:linux:linux_kernel:2.6.4", "cpe:/o:linux:linux_kernel:2.6.11.7", "cpe:/o:linux:linux_kernel:2.6.11.8", "cpe:/o:linux:linux_kernel:2.6.12", "cpe:/o:linux:linux_kernel:2.6.8", "cpe:/o:linux:linux_kernel:2.6.1", "cpe:/o:linux:linux_kernel:2.6.11.2", "cpe:/o:linux:linux_kernel:2.6.11.11", "cpe:/o:linux:linux_kernel:2.6.11.9", "cpe:/o:linux:linux_kernel:2.6.3", "cpe:/o:linux:linux_kernel:2.6.11.10", "cpe:/o:linux:linux_kernel:2.6.6", "cpe:/o:linux:linux_kernel:2.6.5", "cpe:/o:linux:linux_kernel:2.6.0", "cpe:/o:linux:linux_kernel:2.6.2", "cpe:/o:linux:linux_kernel:2.6.9", "cpe:/o:linux:linux_kernel:2.6.10", "cpe:/o:linux:linux_kernel:2.6.11.12", "cpe:/o:linux:linux_kernel:2.6.11", "cpe:/o:linux:linux_kernel:2.6.11.6", "cpe:/o:linux:linux_kernel:2.6.11.4", "cpe:/o:linux:linux_kernel:2.6.7", "cpe:/o:linux:linux_kernel:2.6.11.1", "cpe:/o:linux:linux_kernel:2.6.8.1", "cpe:/o:linux:linux_kernel:2.6.11.5", "cpe:/o:linux:linux_kernel:2.6.11.3"], "id": "CVE-2005-3858", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3858", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:19", "bulletinFamily": "software", "cvelist": ["CVE-2005-3858"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.ubuntulinux.org/support/documentation/usn/usn-231-1)\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1018)\n[Vendor Specific Advisory URL](http://www.debian.org/security/2006/dsa-1017)\n[Secunia Advisory ID:18510](https://secuniaresearch.flexerasoftware.com/advisories/18510/)\n[Secunia Advisory ID:19374](https://secuniaresearch.flexerasoftware.com/advisories/19374/)\n[Secunia Advisory ID:18203](https://secuniaresearch.flexerasoftware.com/advisories/18203/)\n[Secunia Advisory ID:18562](https://secuniaresearch.flexerasoftware.com/advisories/18562/)\n[Secunia Advisory ID:19038](https://secuniaresearch.flexerasoftware.com/advisories/19038/)\n[Secunia Advisory ID:19369](https://secuniaresearch.flexerasoftware.com/advisories/19369/)\nRedHat RHSA: RHSA-2006:0101\nRedHat RHSA: RHSA-2006:0140\nOther Advisory URL: http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html\nMail List Post: http://marc.theaimsgroup.com/?l=linux-kernel&m=112508479120081&w=2\nMail List Post: http://marc.theaimsgroup.com/?l=linux-kernel&m=112533899509033&w=2\n[CVE-2005-3858](https://vulners.com/cve/CVE-2005-3858)\nBugtraq ID: 16043\n", "modified": "2005-08-26T23:59:03", "published": "2005-08-26T23:59:03", "href": "https://vulners.com/osvdb/OSVDB:22507", "id": "OSVDB:22507", "type": "osvdb", "title": "Linux Kernel ip6_input_finish Function Crafted IPv6 Packet DoS", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-26T08:56:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3358", "CVE-2005-3858", "CVE-2005-3623", "CVE-2005-3356", "CVE-2005-3848"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-smp\n kernel-syms\n um-host-kernel\n kernel-default\n kernel-bigsmp\n um-host-install-initrd\n kernel-source\n kernel-um\n kernel-debug\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010939 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:65026", "href": "http://plugins.openvas.org/nasl.php?oid=65026", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5010939.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-smp\n kernel-syms\n um-host-kernel\n kernel-default\n kernel-bigsmp\n um-host-install-initrd\n kernel-source\n kernel-um\n kernel-debug\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010939 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65026);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3623\", \"CVE-2005-3848\", \"CVE-2005-3858\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.5~7.252\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:39:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3358", "CVE-2005-3858", "CVE-2005-3623", "CVE-2005-3356", "CVE-2005-3848"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-smp\n kernel-syms\n um-host-kernel\n kernel-default\n kernel-bigsmp\n um-host-install-initrd\n kernel-source\n kernel-um\n kernel-debug\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010939 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:136141256231065026", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065026", "type": "openvas", "title": "SLES9: Security update for Linux kernel", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5010939.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for Linux kernel\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n kernel-smp\n kernel-syms\n um-host-kernel\n kernel-default\n kernel-bigsmp\n um-host-install-initrd\n kernel-source\n kernel-um\n kernel-debug\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5010939 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65026\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3623\", \"CVE-2005-3848\", \"CVE-2005-3858\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"SLES9: Security update for Linux kernel\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"kernel-smp\", rpm:\"kernel-smp~2.6.5~7.252\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1018-2. For details on the issues\naddressed with this update, please visit the referenced\nadvisories.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56533", "href": "http://plugins.openvas.org/nasl.php?oid=56533", "type": "openvas", "title": "Debian Security Advisory DSA 1018-2 (kernel-source-2.4.27)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1018_2.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1018-2\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following matrix explains which kernel version for which architecture\nfix the problems referenced in this update:\n\nDebian 3.1 (sarge)\nSource 2.4.27-10sarge2\nAlpha architecture 2.4.27-10sarge2\nARM architecture 2.4.27-2sarge2\nIntel IA-32 architecture 2.4.27-10sarge2\nIntel IA-64 architecture 2.4.27-10sarge2\nMotorola 680x0 architecture 2.4.27-3sarge2\nBig endian MIPS architecture 2.4.27-10.sarge1.040815-2\nLittle endian MIPS architecture 2.4.27-10.sarge1.040815-2\nPowerPC architecture 2.4.27-10sarge2\nIBM S/390 architecture 2.4.27-2sarge2\nSun Sparc architecture 2.4.27-9sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\nDebian 3.1 (sarge)\nkernel-latest-2.4-alpha 101sarge1\nkernel-latest-2.4-i386 101sarge1\nkernel-latest-2.4-s390 2.4.27-1sarge1\nkernel-latest-2.4-sparc 42sarge2\nkernel-latest-powerpc 102sarge1\nfai-kernels 1.9.1sarge1\ni2c 1:2.9.1-1sarge1\nkernel-image-speakup-i386 2.4.27-1.1sasrge1\nlm-sensors 1:2.9.1-1sarge3\nmindi-kernel 2.4.27-2sarge1\npcmcia-modules-2.4.27-i386 3.2.5+2sarge1\nsystemimager 3.2.3-6sarge1\nalsa-modules-i386 1.0.8+2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1018-2. For details on the issues\naddressed with this update, please visit the referenced\nadvisories.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201018-2\";\n\nif(description)\n{\n script_id(56533);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-0887\", \"CVE-2004-1058\", \"CVE-2004-2607\", \"CVE-2005-0449\", \"CVE-2005-1761\", \"CVE-2005-2457\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3257\", \"CVE-2005-3783\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4618\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Debian Security Advisory DSA 1018-2 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-source\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-ia64-standard\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-i386-standard\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-source\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-common\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-doc\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4-i2c\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-client\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server-flamethrowerd\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4-lm-sensors\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-generic\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-generic\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-3\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscpc\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscstation\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-netwinder\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-lart\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bast\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k6\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k7\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-586tsc\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-686-smp\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-686-smp\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-386\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-586tsc\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mindi-kernel\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-386\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-386\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-686\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k6\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsensors-dev\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k7-smp\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-586tsc\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-686\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"sensord\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k6\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k7\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-686\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-686-smp\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k7-smp\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k7\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k7-smp\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsensors3\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme147\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-amiga\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme16x\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bvme6000\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-q40\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-atari\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mac\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-ip22\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-ip22\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-sb1-swarm-bn\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mips-tools\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-lasat\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-cobalt\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-xxs1500\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-kn04\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r3k-kn02\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-s390x\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-s390\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390x\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-s390\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390-tape\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc32\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc32-smp\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc64\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc64-smp\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc32\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc32-smp\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc64\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc64-smp\", ver:\"42sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "description": "The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1018-1. For details on the issues\naddressed with this update, please visit the referenced\nsecurity advisories.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56471", "href": "http://plugins.openvas.org/nasl.php?oid=56471", "type": "openvas", "title": "Debian Security Advisory DSA 1018-1 (kernel-source-2.4.27)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1018_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1018-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following matrix explains which kernel version for which architecture\nfix the problems addressed with this update:\n\nDebian 3.1 (sarge)\nSource 2.4.27-10sarge2\nAlpha architecture 2.4.27-10sarge2\nARM architecture 2.4.27-2sarge2\nIntel IA-32 architecture 2.4.27-10sarge2\nIntel IA-64 architecture 2.4.27-10sarge2\nMotorola 680x0 architecture 2.4.27-3sarge2\nBig endian MIPS architecture 2.4.27-10.sarge1.040815-2\nLittle endian MIPS architecture 2.4.27-10.sarge1.040815-2\nPowerPC architecture 2.4.27-10sarge2\nIBM S/390 architecture 2.4.27-2sarge2\nSun Sparc architecture 2.4.27-9sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\nDebian 3.1 (sarge)\nkernel-latest-2.4-alpha 101sarge1\nkernel-latest-2.4-i386 101sarge1\nkernel-latest-2.4-s390 2.4.27-1sarge1\nkernel-latest-2.4-sparc 42sarge1\nkernel-latest-powerpc 102sarge1\nfai-kernels 1.9.1sarge1\ni2c 1:2.9.1-1sarge1\nkernel-image-speakup-i386 2.4.27-1.1sasrge1\nlm-sensors 1:2.9.1-1sarge3\nmindi-kernel 2.4.27-2sarge1\npcmcia-modules-2.4.27-i386 3.2.5+2sarge1\nsystemimager 3.2.3-6sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.4.27\nannounced via advisory DSA 1018-1. For details on the issues\naddressed with this update, please visit the referenced\nsecurity advisories.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201018-1\";\n\nif(description)\n{\n script_id(56471);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-0887\", \"CVE-2004-1058\", \"CVE-2004-2607\", \"CVE-2005-0449\", \"CVE-2005-1761\", \"CVE-2005-2457\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3257\", \"CVE-2005-3783\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4618\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Debian Security Advisory DSA 1018-1 (kernel-source-2.4.27)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-source\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-ia64-standard\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-boot-i386-standard\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-source\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-common\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-doc\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4-i2c\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.4.27\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-client\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"systemimager-server-flamethrowerd\", ver:\"3.2.3-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4-lm-sensors\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-generic\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-generic\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-3\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscpc\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-riscstation\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-netwinder\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-lart\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bast\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k6\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k7\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-586tsc\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-686-smp\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-686-smp\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-386\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-586tsc\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-386\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mindi-kernel\", ver:\"2.4.27-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-386\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-386\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-586tsc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-686\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k6\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-586tsc\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsensors-dev\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k7-smp\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-586tsc\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-686\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"sensord\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k6\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-pcmcia-modules-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-speakup\", ver:\"2.4.27-1.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-686-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k7\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k6\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k6\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-686\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-686-smp\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"lm-sensors-2.4.27-3-k7-smp\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"i2c-2.4.27-3-k7\", ver:\"2.9.1-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pcmcia-modules-2.4.27-3-k7-smp\", ver:\"3.2.5+2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-k7\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libsensors3\", ver:\"2.9.1-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-mckinley-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-itanium-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-mckinley\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-itanium\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme147\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-amiga\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mvme16x\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-bvme6000\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-q40\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-atari\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-mac\", ver:\"2.4.27-3sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-ip22\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-ip22\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-sb1-swarm-bn\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mips-tools\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-lasat\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r5k-cobalt\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-xxs1500\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r4k-kn04\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-r3k-kn02\", ver:\"2.4.27-10.sarge2.040815-1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-small\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-apus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-powerpc-smp\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.4.27-nubus\", ver:\"2.4.27-10sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-s390x\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-s390\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390x\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-s390\", ver:\"2.4.27-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-s390-tape\", ver:\"2.4.27-2sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc32\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc64-smp\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc32-smp\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc32-smp\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4.27-3-sparc64-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-sparc64\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc64\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4.27-3-sparc32-smp\", ver:\"2.4.27-9sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc32\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4-sparc64-smp\", ver:\"42sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3358", "CVE-2006-0096", "CVE-2005-3181", "CVE-2005-3858", "CVE-2005-0124", "CVE-2005-2490", "CVE-2006-1066", "CVE-2005-3356", "CVE-2005-3053", "CVE-2005-4618", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-2800", "CVE-2004-1017", "CVE-2005-4605", "CVE-2005-2709", "CVE-2006-0095", "CVE-2006-0482", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3847", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-3055", "CVE-2005-2555"], "description": "The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1017-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:56469", "href": "http://plugins.openvas.org/nasl.php?oid=56469", "type": "openvas", "title": "Debian Security Advisory DSA 1017-1 (kernel-source-2.6.8)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1017_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1017-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. For details on the issues addressed by the missing update, please visit\nthe referenced security advisories.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\nDebian 3.1 (sarge)\nSource 2.6.8-16sarge2\nAlpha architecture 2.6.8-16sarge2\nAMD64 architecture 2.6.8-16sarge2\nHP Precision architecture 2.6.8-6sarge2\nIntel IA-32 architecture 2.6.8-16sarge2\nIntel IA-64 architecture 2.6.8-14sarge2\nMotorola 680x0 architecture 2.6.8-4sarge2\nPowerPC architecture 2.6.8-12sarge2\nIBM S/390 architecture 2.6.8-5sarge2\nSun Sparc architecture 2.6.8-15sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\nDebian 3.1 (sarge)\nkernel-latest-2.6-alpha 101sarge1\nkernel-latest-2.6-amd64 103sarge1\nkernel-latest-2.6-hppa 2.6.8-1sarge1\nkernel-latest-2.6-sparc 101sarge1\nkernel-latest-2.6-i386 101sarge1\nkernel-latest-powerpc 102sarge1\nfai-kernels 1.9.1sarge1\nhostap-modules-i386 0.3.7-1sarge1\nmol-modules-2.6.8 0.9.70+2.6.8+12sarge1\nndiswrapper-modules-i386 1.1-2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\";\ntag_summary = \"The remote host is missing an update to kernel-source-2.6.8\nannounced via advisory DSA 1017-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201017-1\";\n\nif(description)\n{\n script_id(56469);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:09:45 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2004-1017\", \"CVE-2005-0124\", \"CVE-2005-0449\", \"CVE-2005-2457\", \"CVE-2005-2490\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3053\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3847\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\", \"CVE-2005-4618\", \"CVE-2006-0095\", \"CVE-2006-0096\", \"CVE-2006-0482\", \"CVE-2006-1066\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1017-1 (kernel-source-2.6.8)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-generic\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-generic\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-k8\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-amd64-k8-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-em64t-p4\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-em64t-p4-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-generic\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-k8\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-amd64-k8-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-em64t-p4\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-em64t-p4-smp\", ver:\"103sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-k8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-amd64-k8-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-em64t-p4\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-12-em64t-p4-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-generic\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-amd64-k8-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-11-em64t-p4-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-generic\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-k8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-amd64-k8-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-em64t-p4\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-12-em64t-p4-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-386\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-686\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-686-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-k7\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-k7-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"fai-kernels\", ver:\"1.9.1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-386\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-686\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-686-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-k7\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-k7-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-386\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-686-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-k7-smp\", ver:\"2.6.8-16sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-386\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-686\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-686-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-k7\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-k7-smp\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-386\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-586tsc\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-686\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-686-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k6\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k7\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.4.27-3-k7-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-386\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-686\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-686-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-k7\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"hostap-modules-2.6.8-3-k7-smp\", ver:\"0.3.7-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-386\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-686\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-686-smp\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-k7\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ndiswrapper-modules-2.6.8-3-k7-smp\", ver:\"1.1-2sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-itanium-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-mckinley-smp\", ver:\"2.6.8-14sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-itanium\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-itanium-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-mckinley\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-mckinley-smp\", ver:\"2.6.8-14sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-32\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-32-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-64\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-64-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-32\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-32-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-64\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-64-smp\", ver:\"2.6.8-1sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-32\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-32-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-64\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-64-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-32-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-64-smp\", ver:\"2.6.8-6sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-32\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-32-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-64\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-64-smp\", ver:\"2.6.8-6sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-amiga\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-atari\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-bvme6000\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-hp\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mac\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme147\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-mvme16x\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-q40\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-sun3\", ver:\"2.6.8-4sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.4-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power3\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power3-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-power4-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power3\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power3-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power4\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-power4-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-powerpc\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-powerpc-smp\", ver:\"102sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power3\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power3-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power4\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-power4-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-powerpc\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3-powerpc-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power3\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power3-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power4\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-power4-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-powerpc\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-powerpc-smp\", ver:\"2.6.8-12sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power3-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-power4-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-powerpc-smp\", ver:\"2.6.8-12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mol-modules-2.6.8-3-powerpc\", ver:\"0.9.70+2.6.8+12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mol-modules-2.6.8-3-powerpc-smp\", ver:\"0.9.70+2.6.8+12sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390-tape\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-s390x\", ver:\"2.6.8-5sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390-tape\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-s390x\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc32\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc64\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6-sparc64-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc32\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc64\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6-sparc64-smp\", ver:\"101sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-2\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-build-2.6.8-3\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc32\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc64\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-headers-2.6.8-3-sparc64-smp\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc32\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-2-sparc64-smp\", ver:\"2.6.8-15sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc32\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc64\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-image-2.6.8-3-sparc64-smp\", ver:\"2.6.8-15sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-doc-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-debian-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-source-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-tree-2.6.8\", ver:\"2.6.8-16sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kernel-patch-2.6.8-s390\", ver:\"2.6.8-5sarge2\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-09T19:39:47", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-3858", "CVE-2005-3805", "CVE-2005-3807", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-3808", "CVE-2005-3857"], "description": "Rudolf Polzer reported an abuse of the 'loadkeys' command. By \nredefining one or more keys and tricking another user (like root) into \nlogging in on a text console and typing something that involves the \nredefined keys, a local user could cause execution of arbitrary \ncommands with the privileges of the target user. The updated kernel \nrestricts the usage of 'loadkeys' to root. (CVE-2005-3257)\n\nThe ptrace() system call did not correctly check whether a process \ntried to attach to itself. A local attacker could exploit this to \ncause a kernel crash. (CVE-2005-3783)\n\nA Denial of Service vulnerability was found in the handler that \nautomatically cleans up and terminates child processes that are not \ncorrectly handled by their parent process (\"auto-reaper\"). The check \ndid not correctly handle processes which were currently traced by \nanother process. A local attacker could exploit this to cause a kernel \ncrash. (CVE-2005-3784)\n\nA locking problem was discovered in the POSIX timer cleanup handling \non process exit. A local attacker could exploit this to cause the \nmachine to hang (Denial of Service). This flaw only affects \nmultiprocessor (SMP) systems. (CVE-2005-3805)\n\nA Denial of Service vulnerability was discovered in the IPv6 flowlabel \nhandling code. By invoking setsockopt(IPV6_FLOWLABEL_MGR) in a special \nway, a local attacker could cause memory corruption which eventually \nled to a kernel crash. (CVE-2005-3806)\n\nA memory leak was discovered in the VFS lease handling. These \noperations are commonly executed by the Samba server, which led to \nsteady memory exhaustion. By repeatedly triggering the affected \noperations in quick succession, a local attacker could exploit this to \ndrain all memory, which leads to a Denial of Service. (CVE-2005-3807)\n\nAn integer overflow was discovered in the \ninvalidate_inode_pages2_range() function. By issuing 64-bit mmap calls \non a 32 bit system, a local user could exploit this to crash the \nmachine, thereby causing Denial of Service. This flaw does not affect \nthe amd64 platform, and does only affect Ubuntu 5.10. (CVE-2005-3808)\n\nOllie Wild discovered a memory leak in the icmp_push_reply() function. \nBy sending a large amount of specially crafted packets, a remote \nattacker could exploit this to drain all memory, which eventually \nleads to a Denial of Service. (CVE-2005-3848)\n\nChris Wrigth found a Denial of Service vulnerability in the \ntime_out_leases() function. By allocating a large number of VFS file \nlock leases and having them timeout at the same time, a large number \nof 'printk' debugging statements was generated at the same time, which \ncould exhaust kernel memory. (CVE-2005-3857)\n\nPatrick McHardy discovered a memory leak in the ip6_input_finish() \nfunction. A remote attacker could exploit this by sending specially \ncrafted IPv6 packets, which would eventually drain all available \nkernel memory, thus causing a Denial of Service. (CVE-2005-3858)", "edition": 5, "modified": "2005-12-23T00:00:00", "published": "2005-12-23T00:00:00", "id": "USN-231-1", "href": "https://ubuntu.com/security/notices/USN-231-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:57:02", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1058", "CVE-2005-3358", "CVE-2005-3858", "CVE-2005-3623", "CVE-2005-3356", "CVE-2005-2553", "CVE-2005-3848", "CVE-2005-4605", "CVE-2005-3808", "CVE-2005-3847"], "description": "The Linux kernel has been updated to fix various security problems.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2006-02-27T14:26:20", "published": "2006-02-27T14:26:20", "id": "SUSE-SA:2006:012", "href": "http://lists.opensuse.org/opensuse-security-announce/2006-02/msg00021.html", "type": "suse", "title": "various security problems in kernel", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-01T06:41:40", "description": "Rudolf Polzer reported an abuse of the 'loadkeys' command. By\nredefining one or more keys and tricking another user (like root) into\nlogging in on a text console and typing something that involves the\nredefined keys, a local user could cause execution of arbitrary\ncommands with the privileges of the target user. The updated kernel\nrestricts the usage of 'loadkeys' to root. (CVE-2005-3257)\n\nThe ptrace() system call did not correctly check whether a process\ntried to attach to itself. A local attacker could exploit this to\ncause a kernel crash. (CVE-2005-3783)\n\nA Denial of Service vulnerability was found in the handler that\nautomatically cleans up and terminates child processes that are not\ncorrectly handled by their parent process ('auto-reaper'). The check\ndid not correctly handle processes which were currently traced by\nanother process. A local attacker could exploit this to cause a kernel\ncrash. (CVE-2005-3784)\n\nA locking problem was discovered in the POSIX timer cleanup handling\non process exit. A local attacker could exploit this to cause the\nmachine to hang (Denial of Service). This flaw only affects\nmultiprocessor (SMP) systems. (CVE-2005-3805)\n\nA Denial of Service vulnerability was discovered in the IPv6 flowlabel\nhandling code. By invoking setsockopt(IPV6_FLOWLABEL_MGR) in a special\nway, a local attacker could cause memory corruption which eventually\nled to a kernel crash. (CVE-2005-3806)\n\nA memory leak was discovered in the VFS lease handling. These\noperations are commonly executed by the Samba server, which led to\nsteady memory exhaustion. By repeatedly triggering the affected\noperations in quick succession, a local attacker could exploit this to\ndrain all memory, which leads to a Denial of Service. (CVE-2005-3807)\n\nAn integer overflow was discovered in the\ninvalidate_inode_pages2_range() function. By issuing 64-bit mmap calls\non a 32 bit system, a local user could exploit this to crash the\nmachine, thereby causing Denial of Service. This flaw does not affect\nthe amd64 platform, and does only affect Ubuntu 5.10. (CVE-2005-3808)\n\nOllie Wild discovered a memory leak in the icmp_push_reply() function.\nBy sending a large amount of specially crafted packets, a remote\nattacker could exploit this to drain all memory, which eventually\nleads to a Denial of Service. (CVE-2005-3848)\n\nChris Wrigth found a Denial of Service vulnerability in the\ntime_out_leases() function. By allocating a large number of VFS file\nlock leases and having them timeout at the same time, a large number\nof 'printk' debugging statements was generated at the same time, which\ncould exhaust kernel memory. (CVE-2005-3857)\n\nPatrick McHardy discovered a memory leak in the ip6_input_finish()\nfunction. A remote attacker could exploit this by sending specially\ncrafted IPv6 packets, which would eventually drain all available\nkernel memory, thus causing a Denial of Service. (CVE-2005-3858).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 24, "published": "2006-01-21T00:00:00", "title": "Ubuntu 4.10 / 5.04 / 5.10 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities (USN-231-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-3858", "CVE-2005-3805", "CVE-2005-3807", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-3808", "CVE-2005-3857"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.12", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-xeon", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.12", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.12", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8", "cpe:/o:canonical:ubuntu_linux:5.04", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1", "cpe:/o:canonical:ubuntu_linux:4.10", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.12", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8", "cpe:/o:canonical:ubuntu_linux:5.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686", "p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6", "p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10", "p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386"], "id": "UBUNTU_USN-231-1.NASL", "href": "https://www.tenable.com/plugins/nessus/20775", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-231-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(20775);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2019/08/02 13:33:00\");\n\n script_cve_id(\"CVE-2005-3257\", \"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-3805\", \"CVE-2005-3806\", \"CVE-2005-3807\", \"CVE-2005-3808\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n script_xref(name:\"USN\", value:\"231-1\");\n\n script_name(english:\"Ubuntu 4.10 / 5.04 / 5.10 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities (USN-231-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Rudolf Polzer reported an abuse of the 'loadkeys' command. By\nredefining one or more keys and tricking another user (like root) into\nlogging in on a text console and typing something that involves the\nredefined keys, a local user could cause execution of arbitrary\ncommands with the privileges of the target user. The updated kernel\nrestricts the usage of 'loadkeys' to root. (CVE-2005-3257)\n\nThe ptrace() system call did not correctly check whether a process\ntried to attach to itself. A local attacker could exploit this to\ncause a kernel crash. (CVE-2005-3783)\n\nA Denial of Service vulnerability was found in the handler that\nautomatically cleans up and terminates child processes that are not\ncorrectly handled by their parent process ('auto-reaper'). The check\ndid not correctly handle processes which were currently traced by\nanother process. A local attacker could exploit this to cause a kernel\ncrash. (CVE-2005-3784)\n\nA locking problem was discovered in the POSIX timer cleanup handling\non process exit. A local attacker could exploit this to cause the\nmachine to hang (Denial of Service). This flaw only affects\nmultiprocessor (SMP) systems. (CVE-2005-3805)\n\nA Denial of Service vulnerability was discovered in the IPv6 flowlabel\nhandling code. By invoking setsockopt(IPV6_FLOWLABEL_MGR) in a special\nway, a local attacker could cause memory corruption which eventually\nled to a kernel crash. (CVE-2005-3806)\n\nA memory leak was discovered in the VFS lease handling. These\noperations are commonly executed by the Samba server, which led to\nsteady memory exhaustion. By repeatedly triggering the affected\noperations in quick succession, a local attacker could exploit this to\ndrain all memory, which leads to a Denial of Service. (CVE-2005-3807)\n\nAn integer overflow was discovered in the\ninvalidate_inode_pages2_range() function. By issuing 64-bit mmap calls\non a 32 bit system, a local user could exploit this to crash the\nmachine, thereby causing Denial of Service. This flaw does not affect\nthe amd64 platform, and does only affect Ubuntu 5.10. (CVE-2005-3808)\n\nOllie Wild discovered a memory leak in the icmp_push_reply() function.\nBy sending a large amount of specially crafted packets, a remote\nattacker could exploit this to drain all memory, which eventually\nleads to a Denial of Service. (CVE-2005-3848)\n\nChris Wrigth found a Denial of Service vulnerability in the\ntime_out_leases() function. By allocating a large number of VFS file\nlock leases and having them timeout at the same time, a large number\nof 'printk' debugging statements was generated at the same time, which\ncould exhaust kernel memory. (CVE-2005-3857)\n\nPatrick McHardy discovered a memory leak in the ip6_input_finish()\nfunction. A remote attacker could exploit this by sending specially\ncrafted IPv6 packets, which would eventually drain all available\nkernel memory, thus causing a Denial of Service. (CVE-2005-3858).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-doc-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-headers-2.6.8.1-6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-386\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-686-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-k8-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-2.6.8.1-6-amd64-xeon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-debian-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-patch-ubuntu-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-source-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.12\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-tree-2.6.8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:4.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:5.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/12/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(4\\.10|5\\.04|5\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 4.10 / 5.04 / 5.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-doc-2.6.8.1\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-386\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-686\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-686-smp\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-generic\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-k8\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-k8-smp\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-headers-2.6.8.1-6-amd64-xeon\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-386\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-686\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-686-smp\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-generic\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-k8\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-k8-smp\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-image-2.6.8.1-6-amd64-xeon\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-patch-debian-2.6.8.1\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-source-2.6.8.1\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"4.10\", pkgname:\"linux-tree-2.6.8.1\", pkgver:\"2.6.8.1-16.26\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-doc-2.6.10\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-386\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-686\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-686-smp\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-amd64-generic\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-amd64-k8\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-amd64-k8-smp\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-headers-2.6.10-6-amd64-xeon\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-386\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-686\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-686-smp\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-amd64-generic\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-amd64-k8\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-amd64-k8-smp\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-image-2.6.10-6-amd64-xeon\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-patch-ubuntu-2.6.10\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-source-2.6.10\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.04\", pkgname:\"linux-tree-2.6.10\", pkgver:\"2.6.10-34.9\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-doc-2.6.12\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-386\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-686\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-686-smp\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-generic\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-k8\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-k8-smp\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-headers-2.6.12-10-amd64-xeon\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-386\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-686\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-686-smp\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-generic\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-k8\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-k8-smp\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-image-2.6.12-10-amd64-xeon\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-patch-ubuntu-2.6.12\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-source-2.6.12\", pkgver:\"2.6.12-10.25\")) flag++;\nif (ubuntu_check(osver:\"5.10\", pkgname:\"linux-tree-2.6.12\", pkgver:\"2.6.12-10.25\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-doc-2.6.10 / linux-doc-2.6.12 / linux-doc-2.6.8.1 / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:24:54", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.", "edition": 26, "published": "2006-07-03T00:00:00", "title": "CentOS 3 : kernel (CESA-2006:0140)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3858", "CVE-2005-3275", "CVE-2004-1057", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-2708", "CVE-2005-3857", "CVE-2002-2185"], "modified": "2006-07-03T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-hugemem-unsupported", "p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-BOOT", "p-cpe:/a:centos:centos:kernel-smp-unsupported", "p-cpe:/a:centos:centos:kernel-source", "p-cpe:/a:centos:centos:kernel-unsupported", "cpe:/o:centos:centos:3"], "id": "CENTOS_RHSA-2006-0140.NASL", "href": "https://www.tenable.com/plugins/nessus/21881", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0140 and \n# CentOS Errata and Security Advisory 2006:0140 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21881);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n script_bugtraq_id(14902);\n script_xref(name:\"RHSA\", value:\"2006:0140\");\n\n script_name(english:\"CentOS 3 : kernel (CESA-2006:0140)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012589.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?693a0367\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012590.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1a7ff693\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012593.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?325c1a7f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-doc-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-hugemem-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"i386\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-source-2.4.21-37.0.1.EL\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"kernel-unsupported-2.4.21-37.0.1.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:05:34", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.", "edition": 27, "published": "2006-01-20T00:00:00", "title": "RHEL 3 : kernel (RHSA-2006:0140)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3858", "CVE-2005-3275", "CVE-2004-1057", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-2708", "CVE-2005-3857", "CVE-2002-2185"], "modified": "2006-01-20T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:3", "p-cpe:/a:redhat:enterprise_linux:kernel-BOOT", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-source", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2006-0140.NASL", "href": "https://www.tenable.com/plugins/nessus/20751", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0140. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20751);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n script_bugtraq_id(14902);\n script_xref(name:\"RHSA\", value:\"2006:0140\");\n\n script_name(english:\"RHEL 3 : kernel (RHSA-2006:0140)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw in remap_page_range() with O_DIRECT writes that\n allowed a local user to cause a denial of service\n (crash) (CVE-2004-1057, important)\n\n - a flaw in exec() handling on some 64-bit architectures\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-2708, important)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in IPv6 network UDP port hash table lookups that\n allowed a local user to cause a denial of service (hang)\n (CVE-2005-2973, important)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a network buffer info leak using the orinoco driver that\n allowed a remote user to possibly view uninitialized\n data (CVE-2005-3180, important)\n\n - a flaw in IPv4 network TCP and UDP netfilter handling\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3275, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architecture and\nconfigurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2002-2185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1057\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2708\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3275\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0140\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-BOOT\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-unsupported\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2002-2185\", \"CVE-2004-1057\", \"CVE-2005-2708\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3180\", \"CVE-2005-3275\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0140\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0140\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i386\", reference:\"kernel-BOOT-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-doc-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-hugemem-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"i686\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", cpu:\"x86_64\", reference:\"kernel-smp-unsupported-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-source-2.4.21-37.0.1.EL\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"kernel-unsupported-2.4.21-37.0.1.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-BOOT / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:44:31", "description": "The original update lacked recompiled ALSA modules against the new\n kernel ABI. Furthermore, kernel-latest-2.4-sparc now correctly\n depends on the updated packages. For completeness we're providing the\n original problem description :\n\n Several local and remote vulnerabilities have been discovered in the\n Linux kernel that may lead to a denial of service or the execution\n of arbitrary code. The Common Vulnerabilities and Exposures project\n identifies the following problems :\n\n - CVE-2004-0887\n Martin Schwidefsky discovered that the privileged\n instruction SACF (Set Address Space Control Fast) on\n the S/390 platform is not handled properly, allowing\n for a local user to gain root privileges.\n\n - CVE-2004-1058\n A race condition allows for a local user to read the\n environment variables of another process that is still\n spawning through /proc/.../cmdline.\n\n - CVE-2004-2607\n A numeric casting discrepancy in sdla_xfer allows\n local users to read portions of kernel memory via a\n large len argument which is received as an int but\n cast to a short, preventing read loop from filling a\n buffer.\n\n - CVE-2005-0449\n An error in the skb_checksum_help() function from the\n netfilter framework has been discovered that allows\n the bypass of packet filter rules or a denial of\n service attack.\n\n - CVE-2005-1761\n A vulnerability in the ptrace subsystem of the IA-64\n architecture can allow local attackers to overwrite\n kernel memory and crash the kernel.\n\n - CVE-2005-2457\n Tim Yamin discovered that insufficient input\n validation in the compressed ISO file system (zisofs)\n allows a denial of service attack through maliciously\n crafted ISO images.\n\n - CVE-2005-2555\n Herbert Xu discovered that the setsockopt() function\n was not restricted to users/processes with the\n CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of\n service attack.\n\n - CVE-2005-2709\n Al Viro discovered a race condition in the /proc\n handling of network devices. A (local) attacker could\n exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code\n in kernel mode.\n\n - CVE-2005-2973\n Tetsuo Handa discovered that the udp_v6_get_port()\n function from the IPv6 code can be forced into an\n endless loop, which allows a denial of service attack.\n\n - CVE-2005-3257\n Rudolf Polzer discovered that the kernel improperly\n restricts access to the KDSKBSENT ioctl, which can\n possibly lead to privilege escalation.\n\n - CVE-2005-3783\n The ptrace code using CLONE_THREAD didn't use the\n thread group ID to determine whether the caller is\n attaching to itself, which allows a denial of service\n attack.\n\n - CVE-2005-3806\n Yen Zheng discovered that the IPv6 flow label code\n modified an incorrect variable, which could lead to\n memory corruption and denial of service.\n\n - CVE-2005-3848\n Ollie Wild discovered a memory leak in the\n icmp_push_reply() function, which allows denial of\n service through memory consumption.\n\n - CVE-2005-3857\n Chris Wright discovered that excessive allocation of\n broken file lock leases in the VFS layer can exhaust\n memory and fill up the system logging, which allows\n denial of service.\n\n - CVE-2005-3858\n Patrick McHardy discovered a memory leak in the\n ip6_input_finish() function from the IPv6 code, which\n allows denial of service.\n\n - CVE-2005-4618\n Yi Ying discovered that sysctl does not properly\n enforce the size of a buffer, which allows a denial of\n service attack.", "edition": 26, "published": "2006-10-14T00:00:00", "title": "Debian DSA-1018-2 : kernel-source-2.4.27 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "modified": "2006-10-14T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:kernel-source-2.4.27", "cpe:/o:debian:debian_linux:3.1"], "id": "DEBIAN_DSA-1018.NASL", "href": "https://www.tenable.com/plugins/nessus/22560", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1018. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22560);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2004-0887\", \"CVE-2004-1058\", \"CVE-2004-2607\", \"CVE-2005-0449\", \"CVE-2005-1761\", \"CVE-2005-2457\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2973\", \"CVE-2005-3257\", \"CVE-2005-3783\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4618\");\n script_xref(name:\"DSA\", value:\"1018\");\n\n script_name(english:\"Debian DSA-1018-2 : kernel-source-2.4.27 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The original update lacked recompiled ALSA modules against the new\n kernel ABI. Furthermore, kernel-latest-2.4-sparc now correctly\n depends on the updated packages. For completeness we're providing the\n original problem description :\n\n Several local and remote vulnerabilities have been discovered in the\n Linux kernel that may lead to a denial of service or the execution\n of arbitrary code. The Common Vulnerabilities and Exposures project\n identifies the following problems :\n\n - CVE-2004-0887\n Martin Schwidefsky discovered that the privileged\n instruction SACF (Set Address Space Control Fast) on\n the S/390 platform is not handled properly, allowing\n for a local user to gain root privileges.\n\n - CVE-2004-1058\n A race condition allows for a local user to read the\n environment variables of another process that is still\n spawning through /proc/.../cmdline.\n\n - CVE-2004-2607\n A numeric casting discrepancy in sdla_xfer allows\n local users to read portions of kernel memory via a\n large len argument which is received as an int but\n cast to a short, preventing read loop from filling a\n buffer.\n\n - CVE-2005-0449\n An error in the skb_checksum_help() function from the\n netfilter framework has been discovered that allows\n the bypass of packet filter rules or a denial of\n service attack.\n\n - CVE-2005-1761\n A vulnerability in the ptrace subsystem of the IA-64\n architecture can allow local attackers to overwrite\n kernel memory and crash the kernel.\n\n - CVE-2005-2457\n Tim Yamin discovered that insufficient input\n validation in the compressed ISO file system (zisofs)\n allows a denial of service attack through maliciously\n crafted ISO images.\n\n - CVE-2005-2555\n Herbert Xu discovered that the setsockopt() function\n was not restricted to users/processes with the\n CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of\n service attack.\n\n - CVE-2005-2709\n Al Viro discovered a race condition in the /proc\n handling of network devices. A (local) attacker could\n exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code\n in kernel mode.\n\n - CVE-2005-2973\n Tetsuo Handa discovered that the udp_v6_get_port()\n function from the IPv6 code can be forced into an\n endless loop, which allows a denial of service attack.\n\n - CVE-2005-3257\n Rudolf Polzer discovered that the kernel improperly\n restricts access to the KDSKBSENT ioctl, which can\n possibly lead to privilege escalation.\n\n - CVE-2005-3783\n The ptrace code using CLONE_THREAD didn't use the\n thread group ID to determine whether the caller is\n attaching to itself, which allows a denial of service\n attack.\n\n - CVE-2005-3806\n Yen Zheng discovered that the IPv6 flow label code\n modified an incorrect variable, which could lead to\n memory corruption and denial of service.\n\n - CVE-2005-3848\n Ollie Wild discovered a memory leak in the\n icmp_push_reply() function, which allows denial of\n service through memory consumption.\n\n - CVE-2005-3857\n Chris Wright discovered that excessive allocation of\n broken file lock leases in the VFS layer can exhaust\n memory and fill up the system logging, which allows\n denial of service.\n\n - CVE-2005-3858\n Patrick McHardy discovered a memory leak in the\n ip6_input_finish() function from the IPv6 code, which\n allows denial of service.\n\n - CVE-2005-4618\n Yi Ying discovered that sysctl does not properly\n enforce the size of a buffer, which allows a denial of\n service attack.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2004-0887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2004-1058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2004-2607\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-0449\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-1761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2457\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-4618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2006/dsa-1018\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package immediately and reboot the machine. If you\nhave built a custom kernel from the kernel source package, you will\nneed to rebuild to take advantage of these fixes.\n\nThe following matrix explains which kernel version for which\narchitecture fix the problems mentioned above :\n\n Debian 3.1 (sarge) \n Source 2.4.27-10sarge2 \n Alpha architecture 2.4.27-10sarge2 \n ARM architecture 2.4.27-2sarge2 \n Intel IA-32 architecture 2.4.27-10sarge2 \n Intel IA-64 architecture 2.4.27-10sarge2 \n Motorola 680x0 architecture 2.4.27-3sarge2 \n Big endian MIPS architecture 2.4.27-10.sarge1.040815-2 \n Little endian MIPS architecture 2.4.27-10.sarge1.040815-2 \n PowerPC architecture 2.4.27-10sarge2 \n IBM S/390 architecture 2.4.27-2sarge2 \n Sun Sparc architecture 2.4.27-9sarge2 \nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update :\n\n Debian 3.1 (sarge) \n kernel-latest-2.4-alpha 101sarge1 \n kernel-latest-2.4-i386 101sarge1 \n kernel-latest-2.4-s390 2.4.27-1sarge1 \n kernel-latest-2.4-sparc 42sarge1 \n kernel-latest-powerpc 102sarge1 \n fai-kernels 1.9.1sarge1 \n i2c 1:2.9.1-1sarge1 \n kernel-image-speakup-i386 2.4.27-1.1sasrge1 \n lm-sensors 1:2.9.1-1sarge3 \n mindi-kernel 2.4.27-2sarge1 \n pcmcia-modules-2.4.27-i386 3.2.5+2sarge1 \n systemimager 3.2.3-6sarge1 \nThis update introduces a change in the kernel's binary interface, the\naffected kernel packages inside Debian have been rebuilt, if you're\nrunning local addons you'll need to rebuild these as well.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.4.27\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/04/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-386\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-586tsc\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-686\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-686-smp\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-k6\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-k7\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-2.4.27-3-k7-smp\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"i2c-source\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-3\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-apus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-nubus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.4.27\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.4.27-speakup\", reference:\"2.4.27-1.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-586tsc\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-generic\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-k6\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-s390\", reference:\"2.4.27-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-sparc32\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-sparc32-smp\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-sparc64\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4-sparc64-smp\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-386\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-686\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-generic\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-itanium\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-itanium-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k6\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k7\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-mckinley\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-mckinley-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc32\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc32-smp\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc64\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-3-sparc64-smp\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-apus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-nubus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-powerpc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4.27-speakup\", reference:\"2.4.27-1.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-586tsc\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-generic\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-itanium-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-k6\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-mckinley-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-s390\", reference:\"2.4.27-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-s390x\", reference:\"2.4.27-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-sparc32\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-sparc32-smp\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-sparc64\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-sparc64-smp\", reference:\"42sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-386\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-686\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-generic\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-itanium\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-itanium-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k6\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k7\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-mckinley\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-mckinley-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390-tape\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-s390x\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc32\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc32-smp\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc64\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-3-sparc64-smp\", reference:\"2.4.27-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-amiga\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-apus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-atari\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bast\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-bvme6000\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-lart\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mac\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme147\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-mvme16x\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-netwinder\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-nubus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-small\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-powerpc-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-q40\", reference:\"2.4.27-3sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r3k-kn02\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-ip22\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r4k-kn04\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-cobalt\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-ip22\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-r5k-lasat\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscpc\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-riscstation\", reference:\"2.4.27-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-sb1-swarm-bn\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-speakup\", reference:\"2.4.27-1.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4.27-xxs1500\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4-i2c\", reference:\"2.9.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4-lm-sensors\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-apus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-nubus\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.4.27-powerpc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.4.27\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-586tsc\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-k6\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-386\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-586tsc\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-686\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-686-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k6\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k7\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-pcmcia-modules-2.4.27-3-k7-smp\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.4.27\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.4.27\", reference:\"2.4.27-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libsensors-dev\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libsensors3\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-386\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-586tsc\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-686\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-686-smp\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-k6\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-k7\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-2.4.27-3-k7-smp\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"lm-sensors-source\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mindi-kernel\", reference:\"2.4.27-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mips-tools\", reference:\"2.4.27-10.sarge2.040815-1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-386\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-586tsc\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-686\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-686-smp\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-k6\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-k7\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pcmcia-modules-2.4.27-3-k7-smp\", reference:\"3.2.5+2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"sensord\", reference:\"2.9.1-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-boot-i386-standard\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-boot-ia64-standard\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-client\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-common\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-doc\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-server\", reference:\"3.2.3-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"systemimager-server-flamethrowerd\", reference:\"3.2.3-6sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:24:54", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "edition": 27, "published": "2006-07-05T00:00:00", "title": "CentOS 4 : kernel (CESA-2006:0101)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "modified": "2006-07-05T00:00:00", "cpe": ["p-cpe:/a:centos:centos:kernel-hugemem", "p-cpe:/a:centos:centos:kernel-doc", "cpe:/o:centos:centos:4", "p-cpe:/a:centos:centos:kernel-smp", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-smp-devel", "p-cpe:/a:centos:centos:kernel-hugemem-devel"], "id": "CENTOS_RHSA-2006-0101.NASL", "href": "https://www.tenable.com/plugins/nessus/21977", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0101 and \n# CentOS Errata and Security Advisory 2006:0101 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(21977);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n script_xref(name:\"RHSA\", value:\"2006:0101\");\n\n script_name(english:\"CentOS 4 : kernel (CESA-2006:0101)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012580.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4839b252\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012581.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d8112949\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2006-January/012582.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ec839998\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/07/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"kernel-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-hugemem-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-17T13:05:33", "description": "Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "edition": 28, "published": "2006-01-17T00:00:00", "title": "RHEL 4 : kernel (RHSA-2006:0101)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "modified": "2006-01-17T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:4", "p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-smp", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-hugemem", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2006-0101.NASL", "href": "https://www.tenable.com/plugins/nessus/20732", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2006:0101. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(20732);\n script_version(\"1.28\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n script_xref(name:\"RHSA\", value:\"2006:0101\");\n\n script_name(english:\"RHEL 4 : kernel (RHSA-2006:0101)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated kernel packages that fix several security issues in the Red\nHat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security\nimpact by the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below :\n\n - a flaw in network IGMP processing that a allowed a\n remote user on the local network to cause a denial of\n service (disabling of multicast reports) if the system\n is running multicast applications (CVE-2002-2185,\n moderate)\n\n - a flaw which allowed a local user to write to firmware\n on read-only opened /dev/cdrom devices (CVE-2004-1190,\n moderate)\n\n - a flaw in gzip/zlib handling internal to the kernel that\n may allow a local user to cause a denial of service\n (crash) (CVE-2005-2458, low)\n\n - a flaw in procfs handling during unloading of modules\n that allowed a local user to cause a denial of service\n or potentially gain privileges (CVE-2005-2709, moderate)\n\n - a flaw in the SCSI procfs interface that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-2800, moderate)\n\n - a flaw in 32-bit-compat handling of the TIOCGDEV ioctl\n that allowed a local user to cause a denial of service\n (crash) (CVE-2005-3044, important)\n\n - a race condition when threads share memory mapping that\n allowed local users to cause a denial of service\n (deadlock) (CVE-2005-3106, important)\n\n - a flaw when trying to mount a non-hfsplus filesystem\n using hfsplus that allowed local users to cause a denial\n of service (crash) (CVE-2005-3109, moderate)\n\n - a minor info leak with the get_thread_area() syscall\n that allowed a local user to view uninitialized kernel\n stack data (CVE-2005-3276, low)\n\n - a flaw in mq_open system call that allowed a local user\n to cause a denial of service (crash) (CVE-2005-3356,\n important)\n\n - a flaw in set_mempolicy that allowed a local user on\n some 64-bit architectures to cause a denial of service\n (crash) (CVE-2005-3358, important)\n\n - a flaw in the auto-reap of child processes that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-3784, important)\n\n - a flaw in the IPv6 flowlabel code that allowed a local\n user to cause a denial of service (crash)\n (CVE-2005-3806, important)\n\n - a flaw in network ICMP processing that allowed a local\n user to cause a denial of service (memory exhaustion)\n (CVE-2005-3848, important)\n\n - a flaw in file lease time-out handling that allowed a\n local user to cause a denial of service (log file\n overflow) (CVE-2005-3857, moderate)\n\n - a flaw in network IPv6 xfrm handling that allowed a\n local user to cause a denial of service (memory\n exhaustion) (CVE-2005-3858, important)\n\n - a flaw in procfs handling that allowed a local user to\n read kernel memory (CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2002-2185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2004-1190\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-2800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3106\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3109\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3276\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2005-4605\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2006:0101\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2002/12/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/01/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2002-2185\", \"CVE-2004-1190\", \"CVE-2005-2458\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-3044\", \"CVE-2005-3106\", \"CVE-2005-3109\", \"CVE-2005-3276\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2006:0101\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2006:0101\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", reference:\"kernel-doc-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-hugemem-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"i686\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n if (rpm_check(release:\"RHEL4\", cpu:\"x86_64\", reference:\"kernel-smp-devel-2.6.9-22.0.2.EL\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-devel / kernel-doc / kernel-hugemem / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T09:44:31", "description": "Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2004-1017\n Multiple overflows exist in the io_edgeport driver which\n might be usable as a denial of service attack vector.\n\n - CVE-2005-0124\n Bryan Fulton reported a bounds checking bug in the\n coda_pioctl function which may allow local users to\n execute arbitrary code or trigger a denial of service\n attack.\n\n - CVE-2005-0449\n An error in the skb_checksum_help() function from the\n netfilter framework has been discovered that allows the\n bypass of packet filter rules or a denial of service\n attack.\n\n - CVE-2005-2457\n Tim Yamin discovered that insufficient input validation\n in the zisofs driver for compressed ISO file systems\n allows a denial of service attack through maliciously\n crafted ISO images.\n\n - CVE-2005-2490\n A buffer overflow in the sendmsg() function allows local\n users to execute arbitrary code.\n\n - CVE-2005-2555\n Herbert Xu discovered that the setsockopt() function was\n not restricted to users/processes with the CAP_NET_ADMIN\n capability. This allows attackers to manipulate IPSEC\n policies or initiate a denial of service attack. \n\n - CVE-2005-2709\n Al Viro discovered a race condition in the /proc\n handling of network devices. A (local) attacker could\n exploit the stale reference after interface shutdown to\n cause a denial of service or possibly execute code in\n kernel mode.\n\n - CVE-2005-2800\n Jan Blunck discovered that repeated failed reads of\n /proc/scsi/sg/devices leak memory, which allows a denial\n of service attack.\n\n - CVE-2005-2973\n Tetsuo Handa discovered that the udp_v6_get_port()\n function from the IPv6 code can be forced into an\n endless loop, which allows a denial of service attack.\n\n - CVE-2005-3044\n Vasiliy Averin discovered that the reference counters\n from sockfd_put() and fput() can be forced into\n overlapping, which allows a denial of service attack\n through a NULL pointer dereference.\n\n - CVE-2005-3053\n Eric Dumazet discovered that the set_mempolicy() system\n call accepts a negative value for its first argument,\n which triggers a BUG() assert. This allows a denial of\n service attack.\n\n - CVE-2005-3055\n Harald Welte discovered that if a process issues a USB\n Request Block (URB) to a device and terminates before\n the URB completes, a stale pointer would be\n dereferenced. This could be used to trigger a denial of\n service attack.\n\n - CVE-2005-3180\n Pavel Roskin discovered that the driver for Orinoco\n wireless cards clears its buffers insufficiently. This\n could leak sensitive information into user space.\n\n - CVE-2005-3181\n Robert Derr discovered that the audit subsystem uses an\n incorrect function to free memory, which allows a denial\n of service attack.\n\n - CVE-2005-3257\n Rudolf Polzer discovered that the kernel improperly\n restricts access to the KDSKBSENT ioctl, which can\n possibly lead to privilege escalation.\n\n - CVE-2005-3356\n Doug Chapman discovered that the mq_open syscall can be\n tricked into decrementing an internal counter twice,\n which allows a denial of service attack through a kernel\n panic.\n\n - CVE-2005-3358\n Doug Chapman discovered that passing a zero bitmask to\n the set_mempolicy() system call leads to a kernel panic,\n which allows a denial of service attack.\n\n - CVE-2005-3783\n The ptrace code using CLONE_THREAD didn't use the thread\n group ID to determine whether the caller is attaching to\n itself, which allows a denial of service attack.\n\n - CVE-2005-3784\n The auto-reaping of child processes functionality\n included ptraced-attached processes, which allows denial\n of service through dangling references.\n\n - CVE-2005-3806\n Yen Zheng discovered that the IPv6 flow label code\n modified an incorrect variable, which could lead to\n memory corruption and denial of service.\n\n - CVE-2005-3847\n It was discovered that a threaded real-time process,\n which is currently dumping core can be forced into a\n dead-lock situation by sending it a SIGKILL signal,\n which allows a denial of service attack. \n\n - CVE-2005-3848\n Ollie Wild discovered a memory leak in the\n icmp_push_reply() function, which allows denial of\n service through memory consumption.\n\n - CVE-2005-3857\n Chris Wright discovered that excessive allocation of\n broken file lock leases in the VFS layer can exhaust\n memory and fill up the system logging, which allows\n denial of service.\n\n - CVE-2005-3858\n Patrick McHardy discovered a memory leak in the\n ip6_input_finish() function from the IPv6 code, which\n allows denial of service.\n\n - CVE-2005-4605\n Karl Janmar discovered that a signedness error in the\n procfs code can be exploited to read kernel memory,\n which may disclose sensitive information.\n\n - CVE-2005-4618\n Yi Ying discovered that sysctl does not properly enforce\n the size of a buffer, which allows a denial of service\n attack.\n\n - CVE-2006-0095\n Stefan Rompf discovered that dm_crypt does not clear an\n internal struct before freeing it, which might disclose\n sensitive information.\n\n - CVE-2006-0096\n It was discovered that the SDLA driver's capability\n checks were too lax for firmware upgrades.\n\n - CVE-2006-0482\n Ludovic Courtes discovered that get_compat_timespec()\n performs insufficient input sanitizing, which allows a\n local denial of service attack.\n\n - CVE-2006-1066\n It was discovered that ptrace() on the ia64 architecture\n allows a local denial of service attack, when preemption\n is enabled.", "edition": 28, "published": "2006-10-14T00:00:00", "title": "Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3358", "CVE-2006-0096", "CVE-2005-3181", "CVE-2005-3858", "CVE-2005-0124", "CVE-2005-2490", "CVE-2006-1066", "CVE-2005-3356", "CVE-2005-3053", "CVE-2005-4618", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-2800", "CVE-2004-1017", "CVE-2005-4605", "CVE-2005-2709", "CVE-2006-0095", "CVE-2006-0482", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3847", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-3055", "CVE-2005-2555"], "modified": "2006-10-14T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:3.1", "p-cpe:/a:debian:debian_linux:kernel-source-2.6.8"], "id": "DEBIAN_DSA-1017.NASL", "href": "https://www.tenable.com/plugins/nessus/22559", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1017. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(22559);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2004-1017\", \"CVE-2005-0124\", \"CVE-2005-0449\", \"CVE-2005-2457\", \"CVE-2005-2490\", \"CVE-2005-2555\", \"CVE-2005-2709\", \"CVE-2005-2800\", \"CVE-2005-2973\", \"CVE-2005-3044\", \"CVE-2005-3053\", \"CVE-2005-3055\", \"CVE-2005-3180\", \"CVE-2005-3181\", \"CVE-2005-3257\", \"CVE-2005-3356\", \"CVE-2005-3358\", \"CVE-2005-3783\", \"CVE-2005-3784\", \"CVE-2005-3806\", \"CVE-2005-3847\", \"CVE-2005-3848\", \"CVE-2005-3857\", \"CVE-2005-3858\", \"CVE-2005-4605\", \"CVE-2005-4618\", \"CVE-2006-0095\", \"CVE-2006-0096\", \"CVE-2006-0482\", \"CVE-2006-1066\");\n script_xref(name:\"DSA\", value:\"1017\");\n\n script_name(english:\"Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several local and remote vulnerabilities have been discovered in the\nLinux kernel that may lead to a denial of service or the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2004-1017\n Multiple overflows exist in the io_edgeport driver which\n might be usable as a denial of service attack vector.\n\n - CVE-2005-0124\n Bryan Fulton reported a bounds checking bug in the\n coda_pioctl function which may allow local users to\n execute arbitrary code or trigger a denial of service\n attack.\n\n - CVE-2005-0449\n An error in the skb_checksum_help() function from the\n netfilter framework has been discovered that allows the\n bypass of packet filter rules or a denial of service\n attack.\n\n - CVE-2005-2457\n Tim Yamin discovered that insufficient input validation\n in the zisofs driver for compressed ISO file systems\n allows a denial of service attack through maliciously\n crafted ISO images.\n\n - CVE-2005-2490\n A buffer overflow in the sendmsg() function allows local\n users to execute arbitrary code.\n\n - CVE-2005-2555\n Herbert Xu discovered that the setsockopt() function was\n not restricted to users/processes with the CAP_NET_ADMIN\n capability. This allows attackers to manipulate IPSEC\n policies or initiate a denial of service attack. \n\n - CVE-2005-2709\n Al Viro discovered a race condition in the /proc\n handling of network devices. A (local) attacker could\n exploit the stale reference after interface shutdown to\n cause a denial of service or possibly execute code in\n kernel mode.\n\n - CVE-2005-2800\n Jan Blunck discovered that repeated failed reads of\n /proc/scsi/sg/devices leak memory, which allows a denial\n of service attack.\n\n - CVE-2005-2973\n Tetsuo Handa discovered that the udp_v6_get_port()\n function from the IPv6 code can be forced into an\n endless loop, which allows a denial of service attack.\n\n - CVE-2005-3044\n Vasiliy Averin discovered that the reference counters\n from sockfd_put() and fput() can be forced into\n overlapping, which allows a denial of service attack\n through a NULL pointer dereference.\n\n - CVE-2005-3053\n Eric Dumazet discovered that the set_mempolicy() system\n call accepts a negative value for its first argument,\n which triggers a BUG() assert. This allows a denial of\n service attack.\n\n - CVE-2005-3055\n Harald Welte discovered that if a process issues a USB\n Request Block (URB) to a device and terminates before\n the URB completes, a stale pointer would be\n dereferenced. This could be used to trigger a denial of\n service attack.\n\n - CVE-2005-3180\n Pavel Roskin discovered that the driver for Orinoco\n wireless cards clears its buffers insufficiently. This\n could leak sensitive information into user space.\n\n - CVE-2005-3181\n Robert Derr discovered that the audit subsystem uses an\n incorrect function to free memory, which allows a denial\n of service attack.\n\n - CVE-2005-3257\n Rudolf Polzer discovered that the kernel improperly\n restricts access to the KDSKBSENT ioctl, which can\n possibly lead to privilege escalation.\n\n - CVE-2005-3356\n Doug Chapman discovered that the mq_open syscall can be\n tricked into decrementing an internal counter twice,\n which allows a denial of service attack through a kernel\n panic.\n\n - CVE-2005-3358\n Doug Chapman discovered that passing a zero bitmask to\n the set_mempolicy() system call leads to a kernel panic,\n which allows a denial of service attack.\n\n - CVE-2005-3783\n The ptrace code using CLONE_THREAD didn't use the thread\n group ID to determine whether the caller is attaching to\n itself, which allows a denial of service attack.\n\n - CVE-2005-3784\n The auto-reaping of child processes functionality\n included ptraced-attached processes, which allows denial\n of service through dangling references.\n\n - CVE-2005-3806\n Yen Zheng discovered that the IPv6 flow label code\n modified an incorrect variable, which could lead to\n memory corruption and denial of service.\n\n - CVE-2005-3847\n It was discovered that a threaded real-time process,\n which is currently dumping core can be forced into a\n dead-lock situation by sending it a SIGKILL signal,\n which allows a denial of service attack. \n\n - CVE-2005-3848\n Ollie Wild discovered a memory leak in the\n icmp_push_reply() function, which allows denial of\n service through memory consumption.\n\n - CVE-2005-3857\n Chris Wright discovered that excessive allocation of\n broken file lock leases in the VFS layer can exhaust\n memory and fill up the system logging, which allows\n denial of service.\n\n - CVE-2005-3858\n Patrick McHardy discovered a memory leak in the\n ip6_input_finish() function from the IPv6 code, which\n allows denial of service.\n\n - CVE-2005-4605\n Karl Janmar discovered that a signedness error in the\n procfs code can be exploited to read kernel memory,\n which may disclose sensitive information.\n\n - CVE-2005-4618\n Yi Ying discovered that sysctl does not properly enforce\n the size of a buffer, which allows a denial of service\n attack.\n\n - CVE-2006-0095\n Stefan Rompf discovered that dm_crypt does not clear an\n internal struct before freeing it, which might disclose\n sensitive information.\n\n - CVE-2006-0096\n It was discovered that the SDLA driver's capability\n checks were too lax for firmware upgrades.\n\n - CVE-2006-0482\n Ludovic Courtes discovered that get_compat_timespec()\n performs insufficient input sanitizing, which allows a\n local denial of service attack.\n\n - CVE-2006-1066\n It was discovered that ptrace() on the ia64 architecture\n allows a local denial of service attack, when preemption\n is enabled.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=295949\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330287\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332587\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332596\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=327416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2004-1017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-0124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-0449\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2457\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2490\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-2973\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3053\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3055\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3358\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3847\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-3858\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-4605\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2005-4618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-0095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-0096\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-0482\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2006-1066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2006/dsa-1017\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the kernel package immediately and reboot the machine. If you\nhave built a custom kernel from the kernel source package, you will\nneed to rebuild to take advantage of these fixes.\n\nThe following matrix explains which kernel version for which\narchitecture fix the problems mentioned above :\n\n Debian 3.1 (sarge) \n Source 2.6.8-16sarge2 \n Alpha architecture 2.6.8-16sarge2 \n AMD64 architecture 2.6.8-16sarge2 \n HP Precision architecture 2.6.8-6sarge2 \n Intel IA-32 architecture 2.6.8-16sarge2 \n Intel IA-64 architecture 2.6.8-14sarge2 \n Motorola 680x0 architecture 2.6.8-4sarge2 \n PowerPC architecture 2.6.8-12sarge2 \n IBM S/390 architecture 2.6.8-5sarge2 \n Sun Sparc architecture 2.6.8-15sarge2 \nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update :\n\n Debian 3.1 (sarge) \n kernel-latest-2.6-alpha 101sarge1 \n kernel-latest-2.6-amd64 103sarge1 \n kernel-latest-2.6-hppa 2.6.8-1sarge1 \n kernel-latest-2.6-sparc 101sarge1 \n kernel-latest-2.6-i386 101sarge1 \n kernel-latest-powerpc 102sarge1 \n fai-kernels 1.9.1sarge1 \n hostap-modules-i386 0.3.7-1sarge1 \n mol-modules-2.6.8 0.9.70+2.6.8+12sarge1 \n ndiswrapper-modules-i386 1.1-2sarge1 \nThis update introduces a change in the kernel's binary interface, the\naffected kernel packages inside Debian have been rebuilt, if you're\nrunning local addons you'll need to rebuild these as well. Due to the\nchange in the package name you need to use apt-get dist-upgrade to\nupdate your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_cwe_id(20, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:kernel-source-2.6.8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/10/14\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2004/12/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"fai-kernels\", reference:\"1.9.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-386\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-586tsc\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-686\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-686-smp\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-k6\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-k7\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.4.27-3-k7-smp\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-386\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-686\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-686-smp\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-k7\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"hostap-modules-2.6.8-3-k7-smp\", reference:\"0.3.7-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-2\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-power3\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-power3-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-power4\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-power4-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-powerpc\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-3-powerpc-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power3\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power3-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power4\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-power4-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-powerpc\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-build-2.6.8-powerpc-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-doc-2.6.8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.4\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-32\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-32-smp\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-64\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-64-smp\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-amd64-generic\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-amd64-k8\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-amd64-k8-smp\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-em64t-p4\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-em64t-p4-smp\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-generic\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-itanium\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-itanium-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-mckinley\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-mckinley-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-sparc32\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-sparc64\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6-sparc64-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-k8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-amd64-k8-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-em64t-p4\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-11-em64t-p4-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-amd64-generic\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-amd64-k8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-amd64-k8-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-em64t-p4\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-12-em64t-p4-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-32\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-32-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-386\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-64\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-64-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-686\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-686-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-k7\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-k7-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc32\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc64\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-2-sparc64-smp\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-32\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-32-smp\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-386\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-64\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-64-smp\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-686\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-686-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-generic\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-itanium\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-itanium-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-k7\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-k7-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-mckinley\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-mckinley-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-sparc32\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-sparc64\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-headers-2.6.8-3-sparc64-smp\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-powerpc\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.4-powerpc-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-32\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-32-smp\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-386\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-64\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-64-smp\", reference:\"2.6.8-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-686\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-686-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-amd64-generic\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-amd64-k8\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-amd64-k8-smp\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-em64t-p4\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-em64t-p4-smp\", reference:\"103sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-generic\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-itanium\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-itanium-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-k7\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-k7-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-mckinley\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-mckinley-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-power3\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-power3-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-power4\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-power4-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-powerpc\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-powerpc-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-sparc32\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-sparc64\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6-sparc64-smp\", reference:\"101sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-k8\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-amd64-k8-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-em64t-p4\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-11-em64t-p4-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-amd64-generic\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-amd64-k8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-amd64-k8-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-em64t-p4\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-12-em64t-p4-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-32\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-32-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-386\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-64\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-64-smp\", reference:\"2.6.8-6sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-686\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-686-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-generic\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-itanium\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-itanium-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-k7\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-k7-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-mckinley\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-mckinley-smp\", reference:\"2.6.8-14sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390-tape\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-s390x\", reference:\"2.6.8-5sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-smp\", reference:\"2.6.8-16sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc32\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc64\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-2-sparc64-smp\", reference:\"2.6.8-15sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-32\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-32-smp\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-386\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-64\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-64-smp\", reference:\"2.6.8-6sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-686\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-686-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-generic\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-itanium\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-itanium-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-k7\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-k7-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-mckinley\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-mckinley-smp\", reference:\"2.6.8-14sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-power3\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-power3-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-power4\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-power4-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-powerpc\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-powerpc-smp\", reference:\"2.6.8-12sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-s390\", reference:\"2.6.8-5sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-s390-tape\", reference:\"2.6.8-5sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-s390x\", reference:\"2.6.8-5sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-smp\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-sparc32\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-sparc64\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-3-sparc64-smp\", reference:\"2.6.8-15sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-amiga\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-atari\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-bvme6000\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-hp\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mac\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mvme147\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-mvme16x\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power3\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power3-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power4\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-power4-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-powerpc\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-powerpc-smp\", reference:\"2.6.8-12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-q40\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-2.6.8-sun3\", reference:\"2.6.8-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-power3\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-power3-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-power4\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-power4-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-powerpc\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-image-powerpc-smp\", reference:\"102sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-2.6.8-s390\", reference:\"2.6.8-5sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-patch-debian-2.6.8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-source-2.6.8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kernel-tree-2.6.8\", reference:\"2.6.8-16sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mol-modules-2.6.8-3-powerpc\", reference:\"0.9.70+2.6.8+12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mol-modules-2.6.8-3-powerpc-smp\", reference:\"0.9.70+2.6.8+12sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-386\", reference:\"1.1-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-686\", reference:\"1.1-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-686-smp\", reference:\"1.1-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-k7\", reference:\"1.1-2sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ndiswrapper-modules-2.6.8-3-k7-smp\", reference:\"1.1-2sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:46:29", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1057", "CVE-2005-2708", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3044", "CVE-2005-3180", "CVE-2005-3275", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-3857", "CVE-2005-3858"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw in remap_page_range() with O_DIRECT writes that allowed a local\r\nuser to cause a denial of service (crash) (CVE-2004-1057, important)\r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-2708, important)\r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges \r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a network buffer info leak using the orinoco driver that allowed\r\na remote user to possibly view uninitialized data (CVE-2005-3180, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3275, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate)\r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important)\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their kernels\r\nto the packages associated with their machine architecture and\r\nconfigurations as listed in this erratum.", "modified": "2017-07-29T20:32:35", "published": "2006-01-19T05:00:00", "id": "RHSA-2006:0140", "href": "https://access.redhat.com/errata/RHSA-2006:0140", "type": "redhat", "title": "(RHSA-2006:0140) kernel security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:12", "bulletinFamily": "unix", "cvelist": ["CVE-2002-2185", "CVE-2004-1190", "CVE-2005-2458", "CVE-2005-2709", "CVE-2005-2800", "CVE-2005-3044", "CVE-2005-3106", "CVE-2005-3109", "CVE-2005-3276", "CVE-2005-3356", "CVE-2005-3358", "CVE-2005-3784", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-3857", "CVE-2005-3858", "CVE-2005-4605"], "description": "The Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw which allowed a local user to write to firmware on read-only\r\nopened /dev/cdrom devices (CVE-2004-1190, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in the SCSI procfs interface that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-2800, moderate)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a race condition when threads share memory mapping that allowed local\r\nusers to cause a denial of service (deadlock) (CVE-2005-3106, important)\r\n\r\n- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that\r\nallowed local users to cause a denial of service (crash) (CVE-2005-3109,\r\nmoderate)\r\n\r\n- a minor info leak with the get_thread_area() syscall that allowed\r\na local user to view uninitialized kernel stack data (CVE-2005-3276, low) \r\n\r\n- a flaw in mq_open system call that allowed a local user to cause a denial\r\nof service (crash) (CVE-2005-3356, important)\r\n\r\n- a flaw in set_mempolicy that allowed a local user on some 64-bit\r\narchitectures to cause a denial of service (crash) (CVE-2005-3358, important)\r\n\r\n- a flaw in the auto-reap of child processes that allowed a local user to\r\ncause a denial of service (crash) (CVE-2005-3784, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate) \r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important) \r\n\r\n- a flaw in procfs handling that allowed a local user to read kernel memory\r\n(CVE-2005-4605, important)\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.", "modified": "2017-09-08T12:09:45", "published": "2006-01-17T05:00:00", "id": "RHSA-2006:0101", "href": "https://access.redhat.com/errata/RHSA-2006:0101", "type": "redhat", "title": "(RHSA-2006:0101) kernel security update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "centos": [{"lastseen": "2020-07-17T03:29:05", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3858", "CVE-2005-3275", "CVE-2004-1057", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2709", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-2708", "CVE-2005-3857", "CVE-2002-2185"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0140\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw in remap_page_range() with O_DIRECT writes that allowed a local\r\nuser to cause a denial of service (crash) (CVE-2004-1057, important)\r\n\r\n- a flaw in exec() handling on some 64-bit architectures that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-2708, important)\r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges \r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\r\nuser to cause a denial of service (hang) (CVE-2005-2973, important)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a network buffer info leak using the orinoco driver that allowed\r\na remote user to possibly view uninitialized data (CVE-2005-3180, important)\r\n\r\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3275, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate)\r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important)\r\n\r\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their kernels\r\nto the packages associated with their machine architecture and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024627.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024628.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024631.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024639.html\n\n**Affected packages:**\nkernel\nkernel-BOOT\nkernel-doc\nkernel-hugemem\nkernel-hugemem-unsupported\nkernel-smp\nkernel-smp-unsupported\nkernel-source\nkernel-unsupported\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0140.html", "edition": 6, "modified": "2006-01-20T17:25:48", "published": "2006-01-19T22:25:06", "href": "http://lists.centos.org/pipermail/centos-announce/2006-January/024627.html", "id": "CESA-2006:0140", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-12-20T18:25:06", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3358", "CVE-2005-3106", "CVE-2005-3858", "CVE-2005-3109", "CVE-2005-3356", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3848", "CVE-2005-2800", "CVE-2005-4605", "CVE-2004-1190", "CVE-2005-2709", "CVE-2005-3857", "CVE-2005-2458", "CVE-2002-2185", "CVE-2005-3276"], "description": "**CentOS Errata and Security Advisory** CESA-2006:0101\n\n\nThe Linux kernel handles the basic functions of the operating system.\r\n\r\nThese new kernel packages contain fixes for the security issues\r\ndescribed below:\r\n\r\n- a flaw in network IGMP processing that a allowed a remote user on the\r\nlocal network to cause a denial of service (disabling of multicast reports)\r\nif the system is running multicast applications (CVE-2002-2185, moderate)\r\n\r\n- a flaw which allowed a local user to write to firmware on read-only\r\nopened /dev/cdrom devices (CVE-2004-1190, moderate) \r\n\r\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\r\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \r\n\r\n- a flaw in procfs handling during unloading of modules that allowed a\r\nlocal user to cause a denial of service or potentially gain privileges\r\n(CVE-2005-2709, moderate)\r\n\r\n- a flaw in the SCSI procfs interface that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-2800, moderate)\r\n\r\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\r\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\r\n\r\n- a race condition when threads share memory mapping that allowed local\r\nusers to cause a denial of service (deadlock) (CVE-2005-3106, important)\r\n\r\n- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that\r\nallowed local users to cause a denial of service (crash) (CVE-2005-3109,\r\nmoderate)\r\n\r\n- a minor info leak with the get_thread_area() syscall that allowed\r\na local user to view uninitialized kernel stack data (CVE-2005-3276, low) \r\n\r\n- a flaw in mq_open system call that allowed a local user to cause a denial\r\nof service (crash) (CVE-2005-3356, important)\r\n\r\n- a flaw in set_mempolicy that allowed a local user on some 64-bit\r\narchitectures to cause a denial of service (crash) (CVE-2005-3358, important)\r\n\r\n- a flaw in the auto-reap of child processes that allowed a local user to\r\ncause a denial of service (crash) (CVE-2005-3784, important)\r\n\r\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\r\ndenial of service (crash) (CVE-2005-3806, important)\r\n\r\n- a flaw in network ICMP processing that allowed a local user to cause\r\na denial of service (memory exhaustion) (CVE-2005-3848, important)\r\n\r\n- a flaw in file lease time-out handling that allowed a local user to cause\r\na denial of service (log file overflow) (CVE-2005-3857, moderate) \r\n\r\n- a flaw in network IPv6 xfrm handling that allowed a local user to\r\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important) \r\n\r\n- a flaw in procfs handling that allowed a local user to read kernel memory\r\n(CVE-2005-4605, important)\r\n\r\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\r\nto the packages associated with their machine architectures and\r\nconfigurations as listed in this erratum.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024618.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024619.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024620.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024621.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-January/024622.html\n\n**Affected packages:**\nkernel\nkernel-devel\nkernel-doc\nkernel-hugemem\nkernel-hugemem-devel\nkernel-smp\nkernel-smp-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0101.html", "edition": 4, "modified": "2006-01-18T18:30:45", "published": "2006-01-18T00:05:51", "href": "http://lists.centos.org/pipermail/centos-announce/2006-January/024618.html", "id": "CESA-2006:0101", "title": "kernel security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:15:47", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1018-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier, Simon Horman\nMarch 26th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE IDs : CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2004-0887\n\n Martin Schwidefsky discovered that the privileged instruction SACF (Set\n Address Space Control Fast) on the S/390 platform is not handled properly, \n allowing for a local user to gain root privileges.\n\nCVE-2004-1058\n\n A race condition allows for a local user to read the environment variables\n of another process that is still spawning through /proc/.../cmdline.\n\nCVE-2004-2607\n\n A numeric casting discrepancy in sdla_xfer allows local users to read\n portions of kernel memory via a large len argument which is received as an\n int but cast to a short, preventing read loop from filling a buffer.\n\nCVE-2005-0449\n \n An error in the skb_checksum_help() function from the netfilter framework\n has been discovered that allows the bypass of packet filter rules or\n a denial of service attack.\n\nCVE-2005-1761\n\n A vulnerability in the ptrace subsystem of the IA-64 architecture can \n allow local attackers to overwrite kernel memory and crash the kernel.\n\nCVE-2005-2457\n\n Tim Yamin discovered that insufficient input validation in the compressed\n ISO file system (zisofs) allows a denial of service attack through\n maliciously crafted ISO images.\n\nCVE-2005-2555\n\n Herbert Xu discovered that the setsockopt() function was not restricted to\n users/processes with the CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of service attack. \n\nCVE-2005-2709\n\n Al Viro discovered a race condition in the /proc handling of network devices.\n A (local) attacker could exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code in kernel mode.\n\nCVE-2005-2973\n \n Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code\n can be forced into an endless loop, which allows a denial of service attack.\n\nCVE-2005-3257\n\n Rudolf Polzer discovered that the kernel improperly restricts access to the\n KDSKBSENT ioctl, which can possibly lead to privilege escalation.\n\nCVE-2005-3783\n\n The ptrace code using CLONE_THREAD didn't use the thread group ID to\n determine whether the caller is attaching to itself, which allows a denial\n of service attack.\n\nCVE-2005-3806\n\n Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,\n which could lead to memory corruption and denial of service.\n\nCVE-2005-3848\n\n Ollie Wild discovered a memory leak in the icmp_push_reply() function, which\n allows denial of service through memory consumption.\n\nCVE-2005-3857\n\n Chris Wright discovered that excessive allocation of broken file lock leases\n in the VFS layer can exhaust memory and fill up the system logging, which allows\n denial of service.\n\nCVE-2005-3858\n\n Patrick McHardy discovered a memory leak in the ip6_input_finish() function from\n the IPv6 code, which allows denial of service.\n\nCVE-2005-4618\n\n Yi Ying discovered that sysctl does not properly enforce the size of a\n buffer, which allows a denial of service attack.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\n Source 2.4.27-10sarge2\n Alpha architecture 2.4.27-10sarge2\n ARM architecture 2.4.27-2sarge2\n Intel IA-32 architecture 2.4.27-10sarge2\n Intel IA-64 architecture 2.4.27-10sarge2\n Motorola 680x0 architecture 2.4.27-3sarge2\n Big endian MIPS architecture 2.4.27-10.sarge1.040815-2\n Little endian MIPS architecture 2.4.27-10.sarge1.040815-2\n PowerPC architecture 2.4.27-10sarge2\n IBM S/390 architecture 2.4.27-2sarge2\n Sun Sparc architecture 2.4.27-9sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 3.1 (sarge)\n kernel-latest-2.4-alpha 101sarge1\n kernel-latest-2.4-i386 101sarge1\n kernel-latest-2.4-s390 2.4.27-1sarge1\n kernel-latest-2.4-sparc 42sarge1\n kernel-latest-powerpc 102sarge1\n fai-kernels 1.9.1sarge1\n i2c 1:2.9.1-1sarge1\n kernel-image-speakup-i386 2.4.27-1.1sasrge1\n lm-sensors 1:2.9.1-1sarge3\n mindi-kernel 2.4.27-2sarge1\n pcmcia-modules-2.4.27-i386 3.2.5+2sarge1\n systemimager 3.2.3-6sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\nThis update introduces a change in the kernel's binary interface, the affected\nkernel packages inside Debian have been rebuilt, if you're running local addons\nyou'll need to rebuild these as well.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get dist-upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.diff.gz\n Size/MD5 checksum: 713256 04938bd9582171f13459f40245fdb402\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.dsc\n Size/MD5 checksum: 685 8d2419804b5d12e4602271c26dcad450\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.dsc\n Size/MD5 checksum: 1089 13968c7c9bb075bad3b2cb95feef384c\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1129 4396133a6b96b9dbceb66d2a48852d88\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.diff.gz\n Size/MD5 checksum: 32931 119d0d836ed566e15624f809701d0ab9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.dsc\n Size/MD5 checksum: 1345 1a4ebdb73d7bd94d2b0d51b75f5451cc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 30119 0df45f3ce9d32988eed0d9567cf0b4fa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 53307 d8a5d2061c0790cfd9467864502818e3\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.tar.gz\n Size/MD5 checksum: 101556 397541e2aa7fc958a4852dffa6c8d1fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.dsc\n Size/MD5 checksum: 1074 ba4f46144c5db2a3c76358689fdb0185\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.tar.gz\n Size/MD5 checksum: 32208 71392893f2e012ffafaab2bb43f8e488\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.dsc\n Size/MD5 checksum: 831 687b8a0516c44a1527a90f5df5c772ab\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.tar.gz\n Size/MD5 checksum: 15975115 9fd8b15f9f92314ea9cea3f22a77ec5b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.dsc\n Size/MD5 checksum: 839 878a7971258f25a1c17fdb6362e9909f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 900 efe323453f0dc718c6d9490ca3ca691e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.tar.gz\n Size/MD5 checksum: 2617 cf7e82afaef00b0cf93521fdccf4ed5c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge1.tar.gz\n Size/MD5 checksum: 2231 974f4d59d2e4e0909a941364a49edb7a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.tar.gz\n Size/MD5 checksum: 9841 53b6e1fe5e9060c93ef9ff91cedf490f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1143 9cc5658049d0158385bc82424ab75361\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz\n Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.tar.gz\n Size/MD5 checksum: 1597 fcbb9bc6a69ad10f0712ea03cad557ef\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge1.dsc\n Size/MD5 checksum: 846 2844d7d598b4fb3d35d418ff2858099c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.tar.gz\n Size/MD5 checksum: 1950 c4a4fbe2095a7d43cf6b33cc9c73f372\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.diff.gz\n Size/MD5 checksum: 2786 a0a40636362e7f5c03ffae5fca94edbd\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 1462678 eab044878df015bbf85329c2498ed8e8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.tar.gz\n Size/MD5 checksum: 20216 0ae4467cf28f4a513e68c2d6ba413d9b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 97376 1a3af863ee67797a398cc33c1b3fcf3c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1581 53d1f65a236f842d634d2f472d761792\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.dsc\n Size/MD5 checksum: 857 6c617b10e65d623d40a8c5d6d89107f9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.tar.gz\n Size/MD5 checksum: 8212 0598b1ff05e1d4dd4c434a39c9f018a6\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 750 4d8bed84c0e377a458977c40ef253a64\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz\n Size/MD5 checksum: 870765 f5af615e39441d95471bdb72a3f01709\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.dsc\n Size/MD5 checksum: 1012 0fcee4cf17e43873f37e6920aa11dd1c\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.dsc\n Size/MD5 checksum: 732 99407eb60a651fe0d937fc9ce0942885\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz\n Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.dsc\n Size/MD5 checksum: 875 9af3fd80b96a54759a11563dc735f349\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 831 fb35a83abc577050eefca213f1c1e5ef\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.dsc\n Size/MD5 checksum: 825 5ddcf45bf8e95a7f1004e6ad97d9502e\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.tar.gz\n Size/MD5 checksum: 307908 19a86536a0b624c16cb95e6277510eeb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.dsc\n Size/MD5 checksum: 663 32e3700237d6c8399991db0cb219ca2b\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz\n Size/MD5 checksum: 142961 eb3d1df2d3b46f199af2485db612c76d\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.tar.gz\n Size/MD5 checksum: 16651 4681c5a0ef28cf92bc861a477859f424\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.dsc\n Size/MD5 checksum: 1051 1063b480da66a98327389106a60fd1de\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.diff.gz\n Size/MD5 checksum: 9623 3900d3b14fc77579eb661dac9d7becdb\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 671384 656244ac0eeb0edfd0eec5cf80526303\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge3_all.deb\n Size/MD5 checksum: 945646 e1bc68ea39ee276dfb3a24318c8aa765\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge1_all.deb\n Size/MD5 checksum: 2418378 cebb78cbbb3762c243f99b86884cc5ac\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 9542922 f8049a1e8cee07d0e2a1fdc7357e252a\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 4758102 b469e5a3b6bc93a459274310199899a7\n http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge1_all.deb\n Size/MD5 checksum: 159912 1c1283ab19292c86be4fa765840eff13\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 3578772 5b413310b3826dec3f0113e1215ca51f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 25710 12d938fd6fe17432924452f0f8ae039f\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 29630 81379a2aae787fcb85eb937cffb8e62e\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 630106 3557f0934650e872d93b88b5150f9815\n http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge1_all.deb\n Size/MD5 checksum: 106132 81b855594bb23ab228c447f2f5343c8e\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 115340 5e1b98b83d853a2a0c24695ff1c82251\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 31030888 b556d3b35835290ef34e01c23b0dfb7b\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 29366 b65b98e266e64ff2a5cdd74558a0a922\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 14680 d45c6cd85a3bb2d3388d9bbe6cc422e5\n http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge3_all.deb\n Size/MD5 checksum: 304520 cad3f6be07e47fc9163882225608a2c5\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 4572390 9d8b171c601c6aa551bcb9a2be6862f1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1986 bda45dedcf2b5ed4f6b8d030f18e11b6\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1982 7ee85d7e5e2753a2b379de867c127c78\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 16518544 b49f831395ee62bde73f0aad25ddd438\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 16968168 db461b6d5cfb842ead1420c0edb61f99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 270900 5e321af02b9c205f38bbc4be49fbc9a8\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 475f0b3c517d16740be06abbc4e3d4a9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 5732 43ca0eeaab913f6faef8eb5a2f432741\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 272828 9c7e1914da800e5e98fd6336c9ad6060\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 6da3aab7853283f763332efde9619e7c\n\n ARM architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 4657792 6efae5dc812abfc779c02c402df0fd3d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 3142828 79bb6bed414464dfb134ca5be8eb0d9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 3665410 a91d34d5ddf87dfb43d2fa1252679d70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 7330418 38c4e7edaf85174e42c1a0272cd71090\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 1054774 e098137f0ef0d731443810ee9eaed718\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 463856 eaa7abc8f41e6e10ca123b8c27f348a9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 1689532 d636ec6606fd50d41fc4f6f5e5d5e103\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb\n Size/MD5 checksum: 11302740 d57ff9246788c39d98903f7b3270fabd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 1823622 2acb45e3fed2a4d7f2e952a258864081\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12338568 be29794a003a05edc00e3a03d34b3eea\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2286 4b863896be1e22d0c1005131b8f9bfec\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k6_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258984 f0ca8379fd4fe3e7bd07480630d01b05\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2158 b17c62827446c35c0e8f787a262aa180\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298250 836b9106a35174e7232c018cd2d2c71a\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477580 24ef30a122508783dc22e87a43923e45\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 11049922 6548a659a11435f1b6ebcefd850c7b69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 299950 27e5ee810fc890b649ad25cc2edff073\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2168 1b80507c432362c471b60ee18b47d0b4\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-586tsc_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258980 cf019b62e65a17b0ed20e149faa44559\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 267748 9555f73de465bd2114d0caf2a41acff2\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686-smp_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259572 9505af261ada93ee26c66a3fb0d7d82e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2164 ac150587b9d3f22de309ea312f11c321\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686-smp_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 484192 c46d1f7e98b6b3e625158ddaca907951\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-386_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477610 61f0e8d1bd3dcbf8447a15f3986710ce\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-586tsc_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477644 302afa94885da8c4f143b8f5aa3476b0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 292198 ff62442bd8a017f09636faa7087eaf08\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2176 8f3ad5ed0dc40fc3d9427412798905ca\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298386 aae34ecc6770f907d0b7de0e7203fac6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297322 bd2931acac7b7e82b240031b76dbb2a0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2214 b0da0d519fee471f1445bcec8e1072c3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12025684 071b3edb763ba490c0101452d467c8a1\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1_i386.deb\n Size/MD5 checksum: 7765638 f8e51efba0f3cb10b658e01e12c6b9bb\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-386_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77860 2412ecaf415f28cedf1594fc5853a59d\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-386_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258984 1e42dac94e18a442204e159252730d5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297106 adfdcbda85639abcd9d387baa6779ef1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2250 c1d2ec30560223773db6fb3fb5f68260\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 292582 4cc3a32beb6a18a7b8c97f0e174f7eb6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12417806 4fbf262234903a4eac5f36b2a8a0b11e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2158 a83bda3df1131288d169b1c44d2f6f95\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477608 0dfded776cb25f87885f3e2cd54139fb\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k6_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77586 7a73742b7405143708835f3932f9fa70\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2198 53f3a8546c48f4872424f905cf7885b0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2248 130656ebcf35178df320c2f80ff446b3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298294 040778c609195abb76faf5dc6b2c4484\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2180 ed27ff9b477d3f06a89636ff63c1a608\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 286360 256a7cfba28e8f80e5ed1b36d463bbaa\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2198 73159b5fcca4e503e4e39d26d01f611b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2152 bf549dc4754ad6432ec6a9133c288b55\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2182 32ef20edb04d84ae67b59ef74ca73c41\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2250 8fe3e928f92a4148cf5aef691717defd\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2226 11a3d9e97540823f189274cbf0964f40\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2268 eb19757eb174ca892c60b9ca003f6993\n http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 93990 ddf78ba3ee58f63c3ebb6ab2b686cbc9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 11709566 cc9d039b9cec5d5532023bffd1e13203\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7-smp_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77734 5e4b8007c196b17ee41776406b0b8230\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2178 a47be61afd7e8d4b63eaa0d5facec45c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2176 cd6cfe3b2f4d398d759906817afafdf9\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-586tsc_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77604 c427abcb6f60c5bf1ac10bc19a65a8b8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12680486 1cb5b20b959b842df55c59a72278c084\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258980 ed75fb59949e2364abfc9459a4832fb3\n http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 56466 54f5cb20cca23c63adb22dacd6710641\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k6_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477594 429eb2dd9bec9b005332f8025849f378\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 303960 7163cde6ff6fb60f77c3be86b98c9ed9\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb\n Size/MD5 checksum: 4770342 c029fb318f3e99e16df3cc4431f48b06\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 300096 d72f151d92cd2b9e3b32247987bc9d77\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259296 a1674fac85b1dc7aaf4e43099bf6de5c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297542 e374488c0c43422a644ee1d8d5687f89\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 474438 5bad3d0b235b6dd4e13d1cd124dc0b8f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2200 3641ec5e13ebe5cbf5713d7b6a9af77a\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77592 9655842dd75143b38d9591c05c069ac7\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686-smp_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77674 f068190e67295066533fb3fff111c814\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 8342 a1fe9c769945a7635ecc03b1e187e7fc\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7-smp_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259850 b623d22abc6f054d77b7a30917f08009\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77678 0a7beec37cd1bf7ec8f1731ae9d6bb9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12086466 5af66657e22fdb6314119ea36a6c1c75\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2188 d2c285ee0c9bc108e0d4cd2e678bc6e0\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7-smp_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 484198 53b2e26c3a6892fe41301e31a8e91701\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298018 9d13a45679af6957abfc23b8878073c4\n http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 77968 bd243ceab2becfd668549358465abe69\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16976446 51987cad8f3f6eb3281ce356f736f90d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 17021738 57ead1bebe1a5f0eccc071e6a5f30f54\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4986 e10834d87d38a13a5c2ee5f13eed4d02\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 240590 4f512fc8f28e2a11cdd97569319d90f5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 240498 d4a0592c1014cd8d2d3b87ae052ff995\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4956 bd7812c913d7ea5ce87e8a249b8935af\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 5226 d74eb98006da5dab26589509ded5f29e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 239378 83101f13dbb75a77ff1a2685c1b59bfd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4992 7ba2aacc74bc4ac4370d2b6bf221e35a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4687006 1230148f08b0c17763e79b94986bc9bd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4972 bfd5bcd58354b443c53a13bb6708be37\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16621676 1bd285f8adedf710b1461724b0af8a61\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 239426 87381161e1e8d269ab82e51518cf79c4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16667452 ca44e47123ea32e0efe93bca7794de8c\n\n Motorola 680x0 architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2320966 4a15213792fd9ef48330cd67f767ab9d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2636422 ce2e589e3f58a53dcbbe362aa06bbdc0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2394430 d0d19d564536a6640fe1401b91830a05\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2393560 c8afb24f7148596650c8140bdad7aa0a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2260368 28858d5d8037969dddeed9eb787edae5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2543228 6b5c2fdb57f7618bd884a56775fddea0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2475286 a6f7278b437e2c9f1efaf8230a7cf038\n\n Big endian MIPS architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 3848722 3cab75f38b72bff67ea0dae8239d2d8b\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 3847778 f250503d744408577b15430e62b73f28\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 7173140 99adeeb4f9a7ee12dbdd658311d4f641\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 4680422 75df59733690bc09bd5c854ab7cabfbd\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 18136 4ec345ef0b666b186646c2c209a9fda8\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 2136150 2f180ceeeff353b1ac0e7a2a2869badc\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4101818 b185a2cb8c1345d07c4f58f079c8abc8\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4668528 ce59d155e7f5de0b9512c8ae07e7d19f\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 2990238 2305898af4fbe07fb3b86a3658926b2a\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 18174 c5f6f20831a72ba867d251700636c30d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 3031148 0b84aa08bbd98a75b3c6e615dc78acd5\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 7037466 690116f5951c221bfbbe94838a1afe0d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4685148 27568e054ecb5cfe22665cf3e4220d25\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 8722 fcfa53d79c741eb526efd83af6b77501\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4800060 9c3bc9afe4bde5642d352199bd6910bc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 1815364 531c6100c8a5ae8cd54a92c47935cacc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 12749452 d1460d74881e9dee0abe8f1e66edc940\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 8796 b29ec0ebb05f2980425452ff60efc78d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 65486 0aa2289da231fdcca1311650e9a7ecd4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 2496580 506d7979b6b2ec7fe1485f7bff41a7be\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153562 7d17ab040429b0802cbeb4a45ff4ed6a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 13478332 65955c570b7d715dae51503d24248214\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 139374 14c07ada6bc05f9fdf9330d295ced263\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153260 16794e5cc21f355da1df4153744d2cdc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4692188 97f4f54124d47127aaad6b30b68fda7b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 13785186 9892ac04d3c9390c6a711a32af828152\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4682152 1f4e90348fe6a188a2360f57493c0516\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153314 ae274ab60fad595683c4decfecdd12de\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 139174 7664ec4c4b8e49aad2271d8f9b91fa59\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1894 7c7d6ffff4091efa73369deb17b8c3a7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 2775998 6574681ce171f9a74f7565ea3f3ce3f1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1882 b2315be9f4c33a570f0da301890dd95d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 2967840 2ad64001085223fdd5f330bbbeb74e81\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 4577766 84aa474690a106c530558c478aff3a93\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1900 1db72f0edc5d91d2e33521c672348378\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 992372 6c160c930e44a2e995d6db92ded45ce4\n\n Sun Sparc architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge1_sparc.deb\n Size/MD5 checksum: 2154 663611e24366e37a6a2569bad319a8d9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 3785134 7ed118f20b7aa0065d8dc51c5f7015fc\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge1_sparc.deb\n Size/MD5 checksum: 2164 3b4cf82e794f30a3c4e73e9ac7346417\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 3598262 8077cc063a9638f64caa0b7501be6698\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 202410 925e828aac054961b71f4cb853a1a81d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 162680 8daeded3c5c21dadbc16fcb57e17ba0c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 201200 b8d59c4959f3641efe0825be35475b60\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 8358 6721b433e723689deff7a75c1a152436\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge1_sparc.deb\n Size/MD5 checksum: 2166 4e12596102cf4e9745092ef9cb508717\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge1_sparc.deb\n Size/MD5 checksum: 2180 f902f292c36330b4bd131a090a4021c7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 6377516 987de05fb71c80488eac9f9fa0be3dab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 6544548 60fe57c18de3491548b4d2bf1bf2ca9e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge1_sparc.deb\n Size/MD5 checksum: 2148 aab546c40ad9023566c2b4b27a76af2f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge1_sparc.deb\n Size/MD5 checksum: 2172 79806225a92e82ce0e05031044400ed3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 164444 a4bbab66bcb9f637efb72ec48f4756c2\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge1_sparc.deb\n Size/MD5 checksum: 2176 72e294e5434527f1571f0331e5d11ab9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge1_sparc.deb\n Size/MD5 checksum: 2178 8f65c643973e1bc2b2cbd1a68a3ab2a6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 2023602 04be2535bd4ea027a3167ae6aec300c2\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2006-03-24T00:00:00", "published": "2006-03-24T00:00:00", "id": "DEBIAN:DSA-1018-1:7F47B", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00100.html", "title": "[SECURITY] [DSA 1018-1] New Linux kernel 2.4.27 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-30T02:21:32", "bulletinFamily": "unix", "cvelist": ["CVE-2004-1058", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3858", "CVE-2004-0887", "CVE-2005-4618", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-1761", "CVE-2005-2709", "CVE-2005-2973", "CVE-2004-2607", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-2555"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1018-2 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier, Simon Horman\nApril 5th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.27\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE IDs : CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618\n\nThe original update lacked recompiled ALSA modules against the new kernel\nABI. Furthermore, kernel-latest-2.4-sparc now correctly depends on the\nupdated packages.\n\nFor completeness we're providing the original problem description:\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2004-0887\n\n Martin Schwidefsky discovered that the privileged instruction SACF (Set\n Address Space Control Fast) on the S/390 platform is not handled properly, \n allowing for a local user to gain root privileges.\n\nCVE-2004-1058\n\n A race condition allows for a local user to read the environment variables\n of another process that is still spawning through /proc/.../cmdline.\n\nCVE-2004-2607\n\n A numeric casting discrepancy in sdla_xfer allows local users to read\n portions of kernel memory via a large len argument which is received as an\n int but cast to a short, preventing read loop from filling a buffer.\n\nCVE-2005-0449\n \n An error in the skb_checksum_help() function from the netfilter framework\n has been discovered that allows the bypass of packet filter rules or\n a denial of service attack.\n\nCVE-2005-1761\n\n A vulnerability in the ptrace subsystem of the IA-64 architecture can \n allow local attackers to overwrite kernel memory and crash the kernel.\n\nCVE-2005-2457\n\n Tim Yamin discovered that insufficient input validation in the compressed\n ISO file system (zisofs) allows a denial of service attack through\n maliciously crafted ISO images.\n\nCVE-2005-2555\n\n Herbert Xu discovered that the setsockopt() function was not restricted to\n users/processes with the CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of service attack. \n\nCVE-2005-2709\n\n Al Viro discovered a race condition in the /proc handling of network devices.\n A (local) attacker could exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code in kernel mode.\n\nCVE-2005-2973\n \n Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code\n can be forced into an endless loop, which allows a denial of service attack.\n\nCVE-2005-3257\n\n Rudolf Polzer discovered that the kernel improperly restricts access to the\n KDSKBSENT ioctl, which can possibly lead to privilege escalation.\n\nCVE-2005-3783\n\n The ptrace code using CLONE_THREAD didn't use the thread group ID to\n determine whether the caller is attaching to itself, which allows a denial\n of service attack.\n\nCVE-2005-3806\n\n Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,\n which could lead to memory corruption and denial of service.\n\nCVE-2005-3848\n\n Ollie Wild discovered a memory leak in the icmp_push_reply() function, which\n allows denial of service through memory consumption.\n\nCVE-2005-3857\n\n Chris Wright discovered that excessive allocation of broken file lock leases\n in the VFS layer can exhaust memory and fill up the system logging, which allows\n denial of service.\n\nCVE-2005-3858\n\n Patrick McHardy discovered a memory leak in the ip6_input_finish() function from\n the IPv6 code, which allows denial of service.\n\nCVE-2005-4618\n\n Yi Ying discovered that sysctl does not properly enforce the size of a\n buffer, which allows a denial of service attack.\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\n Source 2.4.27-10sarge2\n Alpha architecture 2.4.27-10sarge2\n ARM architecture 2.4.27-2sarge2\n Intel IA-32 architecture 2.4.27-10sarge2\n Intel IA-64 architecture 2.4.27-10sarge2\n Motorola 680x0 architecture 2.4.27-3sarge2\n Big endian MIPS architecture 2.4.27-10.sarge1.040815-2\n Little endian MIPS architecture 2.4.27-10.sarge1.040815-2\n PowerPC architecture 2.4.27-10sarge2\n IBM S/390 architecture 2.4.27-2sarge2\n Sun Sparc architecture 2.4.27-9sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 3.1 (sarge)\n kernel-latest-2.4-alpha 101sarge1\n kernel-latest-2.4-i386 101sarge1\n kernel-latest-2.4-s390 2.4.27-1sarge1\n kernel-latest-2.4-sparc 42sarge2\n kernel-latest-powerpc 102sarge1\n fai-kernels 1.9.1sarge1\n i2c 1:2.9.1-1sarge1\n kernel-image-speakup-i386 2.4.27-1.1sasrge1\n lm-sensors 1:2.9.1-1sarge3\n mindi-kernel 2.4.27-2sarge1\n pcmcia-modules-2.4.27-i386 3.2.5+2sarge1\n systemimager 3.2.3-6sarge1\n alsa-modules-i386 1.0.8+2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\nThis update introduces a change in the kernel's binary interface, the affected\nkernel packages inside Debian have been rebuilt, if you're running local addons\nyou'll need to rebuild these as well.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get dist-upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.diff.gz\n Size/MD5 checksum: 713256 04938bd9582171f13459f40245fdb402\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.dsc\n Size/MD5 checksum: 685 8d2419804b5d12e4602271c26dcad450\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.dsc\n Size/MD5 checksum: 1089 13968c7c9bb075bad3b2cb95feef384c\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1129 4396133a6b96b9dbceb66d2a48852d88\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3.diff.gz\n Size/MD5 checksum: 32931 119d0d836ed566e15624f809701d0ab9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.dsc\n Size/MD5 checksum: 1345 1a4ebdb73d7bd94d2b0d51b75f5451cc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 30119 0df45f3ce9d32988eed0d9567cf0b4fa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 53307 d8a5d2061c0790cfd9467864502818e3\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.tar.gz\n Size/MD5 checksum: 101556 397541e2aa7fc958a4852dffa6c8d1fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.dsc\n Size/MD5 checksum: 1074 ba4f46144c5db2a3c76358689fdb0185\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.tar.gz\n Size/MD5 checksum: 32208 71392893f2e012ffafaab2bb43f8e488\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.dsc\n Size/MD5 checksum: 831 687b8a0516c44a1527a90f5df5c772ab\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.tar.gz\n Size/MD5 checksum: 15975115 9fd8b15f9f92314ea9cea3f22a77ec5b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-arm_2.4.27-2sarge2.dsc\n Size/MD5 checksum: 839 878a7971258f25a1c17fdb6362e9909f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 900 efe323453f0dc718c6d9490ca3ca691e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101sarge1.tar.gz\n Size/MD5 checksum: 2617 cf7e82afaef00b0cf93521fdccf4ed5c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.tar.gz\n Size/MD5 checksum: 9841 53b6e1fe5e9060c93ef9ff91cedf490f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1143 9cc5658049d0158385bc82424ab75361\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27.orig.tar.gz\n Size/MD5 checksum: 9501 a4ad085824ade5641f1c839d945dd301\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.tar.gz\n Size/MD5 checksum: 1597 fcbb9bc6a69ad10f0712ea03cad557ef\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-latest-2.4-alpha_101sarge1.tar.gz\n Size/MD5 checksum: 1950 c4a4fbe2095a7d43cf6b33cc9c73f372\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.diff.gz\n Size/MD5 checksum: 2786 a0a40636362e7f5c03ffae5fca94edbd\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-powerpc-2.4.27_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 1462678 eab044878df015bbf85329c2498ed8e8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge2.tar.gz\n Size/MD5 checksum: 20216 0ae4467cf28f4a513e68c2d6ba413d9b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.tar.gz\n Size/MD5 checksum: 97376 1a3af863ee67797a398cc33c1b3fcf3c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 1581 53d1f65a236f842d634d2f472d761792\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.dsc\n Size/MD5 checksum: 857 6c617b10e65d623d40a8c5d6d89107f9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-s390_2.4.27-2sarge2.tar.gz\n Size/MD5 checksum: 8212 0598b1ff05e1d4dd4c434a39c9f018a6\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1.dsc\n Size/MD5 checksum: 750 4d8bed84c0e377a458977c40ef253a64\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1.orig.tar.gz\n Size/MD5 checksum: 870765 f5af615e39441d95471bdb72a3f01709\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager_3.2.3-6sarge1.dsc\n Size/MD5 checksum: 1012 0fcee4cf17e43873f37e6920aa11dd1c\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.dsc\n Size/MD5 checksum: 732 99407eb60a651fe0d937fc9ce0942885\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27.orig.tar.gz\n Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-m68k_2.4.27-3sarge2.dsc\n Size/MD5 checksum: 875 9af3fd80b96a54759a11563dc735f349\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge2.dsc\n Size/MD5 checksum: 831 fb35a83abc577050eefca213f1c1e5ef\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-i386_3.2.5+2sarge1.dsc\n Size/MD5 checksum: 825 5ddcf45bf8e95a7f1004e6ad97d9502e\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.tar.gz\n Size/MD5 checksum: 307908 19a86536a0b624c16cb95e6277510eeb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-latest-2.4-s390_2.4.27-1sarge1.dsc\n Size/MD5 checksum: 663 32e3700237d6c8399991db0cb219ca2b\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1.orig.tar.gz\n Size/MD5 checksum: 142961 eb3d1df2d3b46f199af2485db612c76d\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-speakup-i386_2.4.27-1.1sarge1.tar.gz\n Size/MD5 checksum: 16651 4681c5a0ef28cf92bc861a477859f424\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-patch-2.4.27-mips_2.4.27-10.sarge2.040815-1.dsc\n Size/MD5 checksum: 1051 1063b480da66a98327389106a60fd1de\n http://security.debian.org/pool/updates/main/i/i2c/i2c_2.9.1-1sarge1.diff.gz\n Size/MD5 checksum: 9623 3900d3b14fc77579eb661dac9d7becdb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge2.dsc\n Size/MD5 checksum: 848 54a0059bc7215f82dd95c64e729b0dd4\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-latest-2.4-sparc_42sarge2.tar.gz\n Size/MD5 checksum: 2243 7dd011636f037d3e004e202cdcef99dd\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 671384 656244ac0eeb0edfd0eec5cf80526303\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-source_2.9.1-1sarge3_all.deb\n Size/MD5 checksum: 945646 e1bc68ea39ee276dfb3a24318c8aa765\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-doc-2.4.27-speakup_2.4.27-1.1sarge1_all.deb\n Size/MD5 checksum: 2418378 cebb78cbbb3762c243f99b86884cc5ac\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-ia64-standard_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 9542922 f8049a1e8cee07d0e2a1fdc7357e252a\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-boot-i386-standard_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 4758102 b469e5a3b6bc93a459274310199899a7\n http://security.debian.org/pool/updates/main/i/i2c/i2c-source_2.9.1-1sarge1_all.deb\n Size/MD5 checksum: 159912 1c1283ab19292c86be4fa765840eff13\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 3578772 5b413310b3826dec3f0113e1215ca51f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 25710 12d938fd6fe17432924452f0f8ae039f\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-common_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 29630 81379a2aae787fcb85eb937cffb8e62e\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-doc_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 630106 3557f0934650e872d93b88b5150f9815\n http://security.debian.org/pool/updates/main/i/i2c/kernel-patch-2.4-i2c_2.9.1-1sarge1_all.deb\n Size/MD5 checksum: 106132 81b855594bb23ab228c447f2f5343c8e\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 115340 5e1b98b83d853a2a0c24695ff1c82251\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge2_all.deb\n Size/MD5 checksum: 31030888 b556d3b35835290ef34e01c23b0dfb7b\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-client_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 29366 b65b98e266e64ff2a5cdd74558a0a922\n http://security.debian.org/pool/updates/main/s/systemimager/systemimager-server-flamethrowerd_3.2.3-6sarge1_all.deb\n Size/MD5 checksum: 14680 d45c6cd85a3bb2d3388d9bbe6cc422e5\n http://security.debian.org/pool/updates/main/l/lm-sensors/kernel-patch-2.4-lm-sensors_2.9.1-1sarge3_all.deb\n Size/MD5 checksum: 304520 cad3f6be07e47fc9163882225608a2c5\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 4572390 9d8b171c601c6aa551bcb9a2be6862f1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1986 bda45dedcf2b5ed4f6b8d030f18e11b6\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-image-2.4-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1982 7ee85d7e5e2753a2b379de867c127c78\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 16518544 b49f831395ee62bde73f0aad25ddd438\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 16968168 db461b6d5cfb842ead1420c0edb61f99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-generic_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 270900 5e321af02b9c205f38bbc4be49fbc9a8\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 475f0b3c517d16740be06abbc4e3d4a9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-3_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 5732 43ca0eeaab913f6faef8eb5a2f432741\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-3-smp_2.4.27-10sarge2_alpha.deb\n Size/MD5 checksum: 272828 9c7e1914da800e5e98fd6336c9ad6060\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-alpha/kernel-headers-2.4-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 6da3aab7853283f763332efde9619e7c\n\n ARM architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-headers-2.4.27_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 4657792 6efae5dc812abfc779c02c402df0fd3d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscpc_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 3142828 79bb6bed414464dfb134ca5be8eb0d9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-riscstation_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 3665410 a91d34d5ddf87dfb43d2fa1252679d70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-netwinder_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 7330418 38c4e7edaf85174e42c1a0272cd71090\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-lart_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 1054774 e098137f0ef0d731443810ee9eaed718\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-build-2.4.27_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 463856 eaa7abc8f41e6e10ca123b8c27f348a9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-arm/kernel-image-2.4.27-bast_2.4.27-2sarge2_arm.deb\n Size/MD5 checksum: 1689532 d636ec6606fd50d41fc4f6f5e5d5e103\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-image-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb\n Size/MD5 checksum: 11302740 d57ff9246788c39d98903f7b3270fabd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 1823622 2acb45e3fed2a4d7f2e952a258864081\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12338568 be29794a003a05edc00e3a03d34b3eea\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2286 4b863896be1e22d0c1005131b8f9bfec\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k6_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258984 f0ca8379fd4fe3e7bd07480630d01b05\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2158 b17c62827446c35c0e8f787a262aa180\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298250 836b9106a35174e7232c018cd2d2c71a\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477580 24ef30a122508783dc22e87a43923e45\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 11049922 6548a659a11435f1b6ebcefd850c7b69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 299950 27e5ee810fc890b649ad25cc2edff073\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2168 1b80507c432362c471b60ee18b47d0b4\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-586tsc_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258980 cf019b62e65a17b0ed20e149faa44559\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 267748 9555f73de465bd2114d0caf2a41acff2\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686-smp_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259572 9505af261ada93ee26c66a3fb0d7d82e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2164 ac150587b9d3f22de309ea312f11c321\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686-smp_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 484192 c46d1f7e98b6b3e625158ddaca907951\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-386_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477610 61f0e8d1bd3dcbf8447a15f3986710ce\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-586tsc_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477644 302afa94885da8c4f143b8f5aa3476b0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 292198 ff62442bd8a017f09636faa7087eaf08\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2176 8f3ad5ed0dc40fc3d9427412798905ca\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298386 aae34ecc6770f907d0b7de0e7203fac6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-386_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297322 bd2931acac7b7e82b240031b76dbb2a0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2214 b0da0d519fee471f1445bcec8e1072c3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12025684 071b3edb763ba490c0101452d467c8a1\n http://security.debian.org/pool/updates/main/m/mindi-kernel/mindi-kernel_2.4.27-2sarge1_i386.deb\n Size/MD5 checksum: 7765638 f8e51efba0f3cb10b658e01e12c6b9bb\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-386_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77860 2412ecaf415f28cedf1594fc5853a59d\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-386_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258984 1e42dac94e18a442204e159252730d5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297106 adfdcbda85639abcd9d387baa6779ef1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2250 c1d2ec30560223773db6fb3fb5f68260\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-586tsc_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 292582 4cc3a32beb6a18a7b8c97f0e174f7eb6\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12417806 4fbf262234903a4eac5f36b2a8a0b11e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2158 a83bda3df1131288d169b1c44d2f6f95\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-686_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477608 0dfded776cb25f87885f3e2cd54139fb\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k6_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77586 7a73742b7405143708835f3932f9fa70\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2198 53f3a8546c48f4872424f905cf7885b0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2248 130656ebcf35178df320c2f80ff446b3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298294 040778c609195abb76faf5dc6b2c4484\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101sarge1_i386.deb\n Size/MD5 checksum: 2180 ed27ff9b477d3f06a89636ff63c1a608\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 286360 256a7cfba28e8f80e5ed1b36d463bbaa\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2198 73159b5fcca4e503e4e39d26d01f611b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101sarge1_i386.deb\n Size/MD5 checksum: 2152 bf549dc4754ad6432ec6a9133c288b55\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101sarge1_i386.deb\n Size/MD5 checksum: 2182 32ef20edb04d84ae67b59ef74ca73c41\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2250 8fe3e928f92a4148cf5aef691717defd\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2226 11a3d9e97540823f189274cbf0964f40\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2268 eb19757eb174ca892c60b9ca003f6993\n http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors-dev_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 93990 ddf78ba3ee58f63c3ebb6ab2b686cbc9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 11709566 cc9d039b9cec5d5532023bffd1e13203\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7-smp_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77734 5e4b8007c196b17ee41776406b0b8230\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2178 a47be61afd7e8d4b63eaa0d5facec45c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2176 cd6cfe3b2f4d398d759906817afafdf9\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-586tsc_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77604 c427abcb6f60c5bf1ac10bc19a65a8b8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12680486 1cb5b20b959b842df55c59a72278c084\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-686_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 258980 ed75fb59949e2364abfc9459a4832fb3\n http://security.debian.org/pool/updates/main/l/lm-sensors/sensord_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 56466 54f5cb20cca23c63adb22dacd6710641\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k6_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 477594 429eb2dd9bec9b005332f8025849f378\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 303960 7163cde6ff6fb60f77c3be86b98c9ed9\n http://security.debian.org/pool/updates/main/k/kernel-image-speakup-i386/kernel-headers-2.4.27-speakup_2.4.27-1.1sarge1_i386.deb\n Size/MD5 checksum: 4770342 c029fb318f3e99e16df3cc4431f48b06\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-686-smp_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 300096 d72f151d92cd2b9e3b32247987bc9d77\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259296 a1674fac85b1dc7aaf4e43099bf6de5c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k6_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 297542 e374488c0c43422a644ee1d8d5687f89\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 474438 5bad3d0b235b6dd4e13d1cd124dc0b8f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101sarge1_i386.deb\n Size/MD5 checksum: 2200 3641ec5e13ebe5cbf5713d7b6a9af77a\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77592 9655842dd75143b38d9591c05c069ac7\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-686-smp_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77674 f068190e67295066533fb3fff111c814\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-3_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 8342 a1fe9c769945a7635ecc03b1e187e7fc\n http://security.debian.org/pool/updates/main/l/lm-sensors/lm-sensors-2.4.27-3-k7-smp_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 259850 b623d22abc6f054d77b7a30917f08009\n http://security.debian.org/pool/updates/main/i/i2c/i2c-2.4.27-3-k7_2.9.1-1sarge1_i386.deb\n Size/MD5 checksum: 77678 0a7beec37cd1bf7ec8f1731ae9d6bb9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 12086466 5af66657e22fdb6314119ea36a6c1c75\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2188 d2c285ee0c9bc108e0d4cd2e678bc6e0\n http://security.debian.org/pool/updates/main/p/pcmcia-modules-2.4.27-i386/pcmcia-modules-2.4.27-3-k7-smp_3.2.5+2sarge1_i386.deb\n Size/MD5 checksum: 484198 53b2e26c3a6892fe41301e31a8e91701\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-3-k7_2.4.27-10sarge2_i386.deb\n Size/MD5 checksum: 298018 9d13a45679af6957abfc23b8878073c4\n http://security.debian.org/pool/updates/main/l/lm-sensors/libsensors3_2.9.1-1sarge3_i386.deb\n Size/MD5 checksum: 77968 bd243ceab2becfd668549358465abe69\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16976446 51987cad8f3f6eb3281ce356f736f90d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 17021738 57ead1bebe1a5f0eccc071e6a5f30f54\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4986 e10834d87d38a13a5c2ee5f13eed4d02\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 240590 4f512fc8f28e2a11cdd97569319d90f5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 240498 d4a0592c1014cd8d2d3b87ae052ff995\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4956 bd7812c913d7ea5ce87e8a249b8935af\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-3_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 5226 d74eb98006da5dab26589509ded5f29e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 239378 83101f13dbb75a77ff1a2685c1b59bfd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4992 7ba2aacc74bc4ac4370d2b6bf221e35a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4687006 1230148f08b0c17763e79b94986bc9bd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 4972 bfd5bcd58354b443c53a13bb6708be37\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16621676 1bd285f8adedf710b1461724b0af8a61\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-3-mckinley_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 239426 87381161e1e8d269ab82e51518cf79c4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-3-itanium_2.4.27-10sarge2_ia64.deb\n Size/MD5 checksum: 16667452 ca44e47123ea32e0efe93bca7794de8c\n\n Motorola 680x0 architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme147_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2320966 4a15213792fd9ef48330cd67f767ab9d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-amiga_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2636422 ce2e589e3f58a53dcbbe362aa06bbdc0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mvme16x_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2394430 d0d19d564536a6640fe1401b91830a05\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-bvme6000_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2393560 c8afb24f7148596650c8140bdad7aa0a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-q40_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2260368 28858d5d8037969dddeed9eb787edae5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-atari_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2543228 6b5c2fdb57f7618bd884a56775fddea0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-m68k/kernel-image-2.4.27-mac_2.4.27-3sarge2_m68k.deb\n Size/MD5 checksum: 2475286 a6f7278b437e2c9f1efaf8230a7cf038\n\n Big endian MIPS architecture:\n \n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-ip22_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 3848722 3cab75f38b72bff67ea0dae8239d2d8b\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-ip22_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 3847778 f250503d744408577b15430e62b73f28\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 7173140 99adeeb4f9a7ee12dbdd658311d4f641\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 4680422 75df59733690bc09bd5c854ab7cabfbd\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mips.deb\n Size/MD5 checksum: 18136 4ec345ef0b666b186646c2c209a9fda8\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-lasat_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 2136150 2f180ceeeff353b1ac0e7a2a2869badc\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r5k-cobalt_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4101818 b185a2cb8c1345d07c4f58f079c8abc8\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-xxs1500_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4668528 ce59d155e7f5de0b9512c8ae07e7d19f\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r4k-kn04_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 2990238 2305898af4fbe07fb3b86a3658926b2a\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/mips-tools_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 18174 c5f6f20831a72ba867d251700636c30d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-r3k-kn02_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 3031148 0b84aa08bbd98a75b3c6e615dc78acd5\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-image-2.4.27-sb1-swarm-bn_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 7037466 690116f5951c221bfbbe94838a1afe0d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.27-mips/kernel-headers-2.4.27_2.4.27-10.sarge2.040815-1_mipsel.deb\n Size/MD5 checksum: 4685148 27568e054ecb5cfe22665cf3e4220d25\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 8722 fcfa53d79c741eb526efd83af6b77501\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4800060 9c3bc9afe4bde5642d352199bd6910bc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 1815364 531c6100c8a5ae8cd54a92c47935cacc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 12749452 d1460d74881e9dee0abe8f1e66edc940\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 8796 b29ec0ebb05f2980425452ff60efc78d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-patch-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 65486 0aa2289da231fdcca1311650e9a7ecd4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 2496580 506d7979b6b2ec7fe1485f7bff41a7be\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-small_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153562 7d17ab040429b0802cbeb4a45ff4ed6a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 13478332 65955c570b7d715dae51503d24248214\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 139374 14c07ada6bc05f9fdf9330d295ced263\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153260 16794e5cc21f355da1df4153744d2cdc\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4692188 97f4f54124d47127aaad6b30b68fda7b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 13785186 9892ac04d3c9390c6a711a32af828152\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-headers-2.4.27-apus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 4682152 1f4e90348fe6a188a2360f57493c0516\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 153314 ae274ab60fad595683c4decfecdd12de\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.4.27/kernel-build-2.4.27-nubus_2.4.27-10sarge2_powerpc.deb\n Size/MD5 checksum: 139174 7664ec4c4b8e49aad2271d8f9b91fa59\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390x_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1894 7c7d6ffff4091efa73369deb17b8c3a7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 2775998 6574681ce171f9a74f7565ea3f3ce3f1\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-image-2.4-s390_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1882 b2315be9f4c33a570f0da301890dd95d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390x_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 2967840 2ad64001085223fdd5f330bbbeb74e81\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-headers-2.4.27-3_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 4577766 84aa474690a106c530558c478aff3a93\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-s390/kernel-headers-2.4-s390_2.4.27-1sarge1_s390.deb\n Size/MD5 checksum: 1900 1db72f0edc5d91d2e33521c672348378\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-s390/kernel-image-2.4.27-3-s390-tape_2.4.27-2sarge2_s390.deb\n Size/MD5 checksum: 992372 6c160c930e44a2e995d6db92ded45ce4\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32_42sarge2_sparc.deb\n Size/MD5 checksum: 2208 615b8dfc3a03f9e888299159ec75c56d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc32-smp_42sarge2_sparc.deb\n Size/MD5 checksum: 2216 622f8ddd76acaf9328e54aeb86c85def\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64_42sarge2_sparc.deb\n Size/MD5 checksum: 2208 d186163b6921a0d8dee98401b2dc2396\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-headers-2.4-sparc64-smp_42sarge2_sparc.deb\n Size/MD5 checksum: 2218 b9963b97417cc1e4f8c5ab0ce51e5bf2\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32_42sarge2_sparc.deb\n Size/MD5 checksum: 2184 a7d486f2c4a3c08a1aeb3b31351591d7\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc32-smp_42sarge2_sparc.deb\n Size/MD5 checksum: 2198 7c0fec52b6b0ae094e68846451ce79ea\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64_42sarge2_sparc.deb\n Size/MD5 checksum: 2188 475e7a109600079559506774c5a822eb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.4-sparc/kernel-image-2.4-sparc64-smp_42sarge2_sparc.deb\n Size/MD5 checksum: 2200 3d1f9342a18271db94000bfeeebbd63a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 3785134 7ed118f20b7aa0065d8dc51c5f7015fc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 3598262 8077cc063a9638f64caa0b7501be6698\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 202410 925e828aac054961b71f4cb853a1a81d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 162680 8daeded3c5c21dadbc16fcb57e17ba0c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 201200 b8d59c4959f3641efe0825be35475b60\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-3_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 8358 6721b433e723689deff7a75c1a152436\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 6377516 987de05fb71c80488eac9f9fa0be3dab\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-3-sparc64-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 6544548 60fe57c18de3491548b4d2bf1bf2ca9e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3-sparc32-smp_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 164444 a4bbab66bcb9f637efb72ec48f4756c2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-3_2.4.27-9sarge2_sparc.deb\n Size/MD5 checksum: 2023602 04be2535bd4ea027a3167ae6aec300c2\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 2, "modified": "2006-04-05T00:00:00", "published": "2006-04-05T00:00:00", "id": "DEBIAN:DSA-1018-2:0D13C", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00105.html", "title": "[SECURITY] [DSA 1018-2] New Linux kernel 2.4.27 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-11-11T13:15:48", "bulletinFamily": "unix", "cvelist": ["CVE-2005-3784", "CVE-2005-3783", "CVE-2005-2457", "CVE-2005-3358", "CVE-2006-0096", "CVE-2005-3181", "CVE-2005-3858", "CVE-2005-0124", "CVE-2005-2490", "CVE-2006-1066", "CVE-2005-3356", "CVE-2005-3053", "CVE-2005-4618", "CVE-2005-3044", "CVE-2005-3806", "CVE-2005-3257", "CVE-2005-3848", "CVE-2005-2800", "CVE-2004-1017", "CVE-2005-4605", "CVE-2005-2709", "CVE-2006-0095", "CVE-2006-0482", "CVE-2005-2973", "CVE-2005-3180", "CVE-2005-3847", "CVE-2005-0449", "CVE-2005-3857", "CVE-2005-3055", "CVE-2005-2555"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1017-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier, Simon Horman\nMarch 23th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.6.8\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE ID : CVE-2004-1017 CVE-2005-0124 CVE-2005-0449 CVE-2005-2457 CVE-2005-2490 CVE-2005-2555 CVE-2005-2709 CVE-2005-2800 CVE-2005-2973 CVE-2005-3044 CVE-2005-3053 CVE-2005-3055 CVE-2005-3180 CVE-2005-3181 CVE-2005-3257 CVE-2005-3356 CVE-2005-3358 CVE-2005-3783 CVE-2005-3784 CVE-2005-3806 CVE-2005-3847 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4605 CVE-2005-4618 CVE-2006-0095 CVE-2006-0096 CVE-2006-0482 CVE-2006-1066\nDebian Bug : 295949 334113 330287 332587 332596 330343 330353 327416\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2004-1017\n\n Multiple overflows exist in the io_edgeport driver which might be usable\n as a denial of service attack vector.\n\nCVE-2005-0124\n\n Bryan Fulton reported a bounds checking bug in the coda_pioctl function\n which may allow local users to execute arbitrary code or trigger a denial\n of service attack.\n\nCVE-2005-0449\n \n An error in the skb_checksum_help() function from the netfilter framework\n has been discovered that allows the bypass of packet filter rules or\n a denial of service attack.\n\nCVE-2005-2457\n\n Tim Yamin discovered that insufficient input validation in the zisofs driver\n for compressed ISO file systems allows a denial of service attack through\n maliciously crafted ISO images.\n\nCVE-2005-2490\n\n A buffer overflow in the sendmsg() function allows local users to execute\n arbitrary code.\n\nCVE-2005-2555\n\n Herbert Xu discovered that the setsockopt() function was not restricted to\n users/processes with the CAP_NET_ADMIN capability. This allows attackers to\n manipulate IPSEC policies or initiate a denial of service attack. \n\nCVE-2005-2709\n\n Al Viro discovered a race condition in the /proc handling of network devices.\n A (local) attacker could exploit the stale reference after interface shutdown\n to cause a denial of service or possibly execute code in kernel mode.\n\nCVE-2005-2800\n\n Jan Blunck discovered that repeated failed reads of /proc/scsi/sg/devices\n leak memory, which allows a denial of service attack.\n\nCVE-2005-2973\n \n Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code\n can be forced into an endless loop, which allows a denial of service attack.\n\nCVE-2005-3044\n\n Vasiliy Averin discovered that the reference counters from sockfd_put() and \n fput() can be forced into overlapping, which allows a denial of service attack\n through a null pointer dereference.\n\nCVE-2005-3053\n\n Eric Dumazet discovered that the set_mempolicy() system call accepts a negative\n value for it's first argument, which triggers a BUG() assert. This allows a\n denial of service attack.\n\nCVE-2005-3055\n\n Harald Welte discovered that if a process issues a USB Request Block (URB)\n to a device and terminates before the URB completes, a stale pointer\n would be dereferenced. This could be used to trigger a denial of service\n attack.\n\nCVE-2005-3180\n\n Pavel Roskin discovered that the driver for Orinoco wireless cards clears\n it's buffers insufficiently. This could leak sensitive information into\n user space.\n\nCVE-2005-3181\n\n Robert Derr discovered that the audit subsystem uses an incorrect function to\n free memory, which allows a denial of service attack.\n\nCVE-2005-3257\n\n Rudolf Polzer discovered that the kernel improperly restricts access to the\n KDSKBSENT ioctl, which can possibly lead to privilege escalation.\n\nCVE-2005-3356\n\n Doug Chapman discovered that the mq_open syscall can be tricked into\n decrementing an internal counter twice, which allows a denial of service attack\n through a kernel panic.\n\nCVE-2005-3358\n\n Doug Chapman discovered that passing a 0 zero bitmask to the set_mempolicy()\n system call leads to a kernel panic, which allows a denial of service attack.\n\nCVE-2005-3783\n\n The ptrace code using CLONE_THREAD didn't use the thread group ID to\n determine whether the caller is attaching to itself, which allows a denial\n of service attack.\n\nCVE-2005-3784\n\n The auto-reaping of childe processes functionality included ptraced-attached\n processes, which allows denial of service through dangling references.\n\nCVE-2005-3806\n\n Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,\n which could lead to memory corruption and denial of service.\n\nCVE-2005-3847\n\n It was discovered that a threaded real-time process, which is currently dumping\n core can be forced into a dead-lock situation by sending it a SIGKILL signal,\n which allows a denial of service attack. \n\nCVE-2005-3848\n\n Ollie Wild discovered a memory leak in the icmp_push_reply() function, which\n allows denial of service through memory consumption.\n\nCVE-2005-3857\n\n Chris Wright discovered that excessive allocation of broken file lock leases\n in the VFS layer can exhaust memory and fill up the system logging, which allows\n denial of service.\n\nCVE-2005-3858\n\n Patrick McHardy discovered a memory leak in the ip6_input_finish() function from\n the IPv6 code, which allows denial of service.\n\nCVE-2005-4605\n\n Karl Janmar discovered that a signedness error in the procfs code can be exploited\n to read kernel memory, which may disclose sensitive information.\n\nCVE-2005-4618\n\n Yi Ying discovered that sysctl does not properly enforce the size of a buffer, which\n allows a denial of service attack.\n\nCVE-2006-0095\n\n Stefan Rompf discovered that dm_crypt does not clear an internal struct before freeing\n it, which might disclose sensitive information.\n\nCVE-2006-0096\n\n It was discovered that the SDLA driver's capability checks were too lax\n for firmware upgrades.\n\nCVE-2006-0482\n\n Ludovic Courtes discovered that get_compat_timespec() performs insufficient input\n sanitizing, which allows a local denial of service attack.\n\nCVE-2006-1066\n\n It was discovered that ptrace() on the ia64 architecture allows a local denial of\n service attack, when preemption is enabled.\n\n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.1 (sarge)\n Source 2.6.8-16sarge2\n Alpha architecture 2.6.8-16sarge2\n AMD64 architecture 2.6.8-16sarge2\n HP Precision architecture 2.6.8-6sarge2\n Intel IA-32 architecture 2.6.8-16sarge2\n Intel IA-64 architecture 2.6.8-14sarge2\n Motorola 680x0 architecture 2.6.8-4sarge2\n PowerPC architecture 2.6.8-12sarge2\n IBM S/390 architecture 2.6.8-5sarge2\n Sun Sparc architecture 2.6.8-15sarge2\n\nThe following matrix lists additional packages that were rebuilt for\ncompatability with or to take advantage of this update:\n\n Debian 3.1 (sarge)\n kernel-latest-2.6-alpha 101sarge1\n kernel-latest-2.6-amd64 103sarge1\n kernel-latest-2.6-hppa 2.6.8-1sarge1\n kernel-latest-2.6-sparc 101sarge1\n kernel-latest-2.6-i386 101sarge1\n kernel-latest-powerpc 102sarge1\n fai-kernels 1.9.1sarge1\n hostap-modules-i386 0.3.7-1sarge1\n mol-modules-2.6.8 0.9.70+2.6.8+12sarge1\n ndiswrapper-modules-i386 1.1-2sarge1\n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes.\n\nThis update introduces a change in the kernel's binary interface, the affected\nkernel packages inside Debian have been rebuilt, if you're running local addons\nyou'll need to rebuild these as well.\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.dsc\n Size/MD5 checksum: 874 a35d48f0d5b6c679b5130fb3aaa647cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-m68k_2.6.8-4sarge2.tar.gz\n Size/MD5 checksum: 14256 7c44e2e875b7995f5bb14effb5684b7d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1004 f98203872db1017d6053ababb496116d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2.diff.gz\n Size/MD5 checksum: 1015096 0bb501098f732e6750e3413f4e9d148f\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8.orig.tar.gz\n Size/MD5 checksum: 43929719 0393c05ffa4770c3c5178b74dc7a4282\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.dsc\n Size/MD5 checksum: 896 caa3c2d1f06666c61ba31917a3c26b1f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-latest-2.6-amd64_103sarge1.tar.gz\n Size/MD5 checksum: 2396 d71945b6f493574ce0d360de316f1873\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.dsc\n Size/MD5 checksum: 685 54417bc7eddc5722e0f5ce734e67edb9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-latest-2.6-alpha_101sarge1.tar.gz\n Size/MD5 checksum: 1954 1cdaccf68580892b42cd88b5c5b03b9b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.dsc\n Size/MD5 checksum: 786 e99a3432c467f4f76e9b6e852333a9c5\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-latest-2.6-sparc_101sarge1.tar.gz\n Size/MD5 checksum: 2123 d90ea9aa1ccb9ad3041d5d3b20894330\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.dsc\n Size/MD5 checksum: 813 e860fc8f679fdedb3817d09e25c77b66\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-latest-2.6-hppa_2.6.8-1sarge1.tar.gz\n Size/MD5 checksum: 2055 3fb20a5238ac6dc6a84ba67a887d752e\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.dsc\n Size/MD5 checksum: 621 c8d489fa28bd6b65bd3bda1a460d8a08\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1.tar.gz\n Size/MD5 checksum: 24387 25e9d10a881601e9329291faf5110b55\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.dsc\n Size/MD5 checksum: 993 6cd9024b61b9a6cf4862e204d330b9a3\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-latest-powerpc_102sarge1.tar.gz\n Size/MD5 checksum: 2661 d7bf35beb4924d8dab10b08380e9e289\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.dsc\n Size/MD5 checksum: 862 9d55e1790bcc518f315b44a52ed331bc\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-latest-2.6-i386_101sarge1.tar.gz\n Size/MD5 checksum: 2286 1e9932ed547a85a43b82c10ac9b11800\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1047 8fa892195f50896a45f4a2c64f66ce11\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 89240 5987c1e4d49bb7b3159f3a42b22d1e4f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.dsc\n Size/MD5 checksum: 1008 9c8bbaf47e657e4ac707c6f35cee0f2e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-hppa_2.6.8-6sarge2.tar.gz\n Size/MD5 checksum: 65886 0f42b0e9fc22cd2d5eb615d8f4f6922d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 1103 df823aaf30d2d39f51762abf0fdab8e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 74018 415ea9bd8c15a343646a762c7ecbeb2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.dsc\n Size/MD5 checksum: 812 3689bf78b872510caeaeaefe3a76b477\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge2.tar.gz\n Size/MD5 checksum: 37429 69216b4fe13afb383e5559e4100439ff\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.dsc\n Size/MD5 checksum: 1071 f1d5f3c6a58c3b2efbecb6f481bc6e13\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge2.tar.gz\n Size/MD5 checksum: 25410 78cd732eb81df1bae3f513eb68aa95c0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.dsc\n Size/MD5 checksum: 1191 8a58beb88416f8235e0ccf91b94bda5e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge2.tar.gz\n Size/MD5 checksum: 62533 d3a0fd97437e9eb69f07b5297246610b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.dsc\n Size/MD5 checksum: 833 aa306a38d5cf9f45e601633d239f868e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge2.tar.gz\n Size/MD5 checksum: 11437 2c70d8408f9656fba114ee59f22cb44b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.dsc\n Size/MD5 checksum: 1036 b2db64932de00311794a14eaded25ec3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-sparc_2.6.8-15sarge2.tar.gz\n Size/MD5 checksum: 22798 9d94f73ab654770fc251125e1332b2be\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.dsc\n Size/MD5 checksum: 703 f5c46506673becb263a62307591041b9\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8_0.9.70+2.6.8+12sarge1.tar.gz\n Size/MD5 checksum: 4326 f6191f77c2f41e397e47b727b30d1f64\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.dsc\n Size/MD5 checksum: 1092 926d84df8f84a7c9cc68add4fee27427\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-i386_0.3.7-1sarge1.tar.gz\n Size/MD5 checksum: 2273 896ab1f6cbb18b1afd092845b8e12523\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.dsc\n Size/MD5 checksum: 894 97a270d1e39bfd032314dc3171831846\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-i386_1.1-2sarge1.tar.gz\n Size/MD5 checksum: 1782 1c5a70ee63b83630319152768b924a98\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 0f1542a109fbe036fb8af44e20397299\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-headers-2.6-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 d75c152fdab411ad8184ba6331015dcd\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-generic_101sarge1_alpha.deb\n Size/MD5 checksum: 1980 69be478f2fa35a994c02a4f3b450a60e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha/kernel-image-2.6-smp_101sarge1_alpha.deb\n Size/MD5 checksum: 1990 3ca05863dcaa11c43c0c7d4c29e4ddfd\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 2757876 e94cdb8d12552d293018c7ca24199f47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 230608 fdf2cc6f010f2b618672422c3293f3b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 225502 2a21bf8197792a789420b1838526186f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 2758214 0ecffff87c9a03f6f19147c61a5fc48b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 230730 3b29ce53073ac08216153a5d6e4b629e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 225634 316c8d48a8a59da90707fb03e2149bc0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20226800 f627945f7f8216fbe6961a9559766f29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb\n Size/MD5 checksum: 20068720 7aa6c0137c94e2e7ee45e5ae702cfe27\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-generic_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 20218454 9d8030373efb6dc3e2dfded09cf5c0d5\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-3-smp_2.6.8-16sarge2_alpha.deb\n Size/MD5 checksum: 20068918 710fee78a9ffbde5694b71af50e0060c\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb\n Size/MD5 checksum: 2104 ef0b887f5fbe7a50eb29b9f758f4dbe7\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb\n Size/MD5 checksum: 2112 99fc45919e4e99c75b9c9caa96892684\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2110 56ce795b6f72a01261f554d7f80e17f7\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb\n Size/MD5 checksum: 2126 687cd2d07a2216bd06b3e7167c34429a\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2122 80b347bd1c3b75ba8e6019eb4515131d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_amd64.deb\n Size/MD5 checksum: 2158 593b2f6857005238309652f1ed07b025\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_amd64.deb\n Size/MD5 checksum: 2166 c195509461a3829a88149ecb25dbcd3a\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2172 d87ecb48ff4c9706e28bee9b5e523f0d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_amd64.deb\n Size/MD5 checksum: 2218 28145de5465f3149b0fb7182c07e2dbb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_amd64.deb\n Size/MD5 checksum: 2248 a709d2651b5bc6f16a46e482513ffd7c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 2719948 51945c8ba3e5d86f81df067f73225201\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 224276 33205d1399f5df2dce3583f737fb528a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 223300 bb55484a26b5a9a3fc01b68af37af569\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 219178 010a7d13b9c5546006b736caddcfb1b9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 221054 c3674ad6b1c88ae5aa1c36c732fe1fe0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 217440 22ab9501c6422fd3b160e27bf7a59d2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 2720186 0db767733816d0a1d4a5e9840348532b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 224506 7b32141a97738499376939faf694b031\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 223506 3461e58701032b00a0340f931af02325\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 219164 e3841dd8bc0d6a326a2b186a2febe880\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 221058 aa43b631e5516324f5e357a50bf03919\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 217500 181e3fa415a02835b62dc538562650bb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 12558694 a27949d59b7d84a4638ddb91a273ef47\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13250392 9c8f5ebcb94dd1509f46c4056d0555be\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13210004 b701fd7c35dccc26dfaba57183de5c2d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13058704 1ac0827d7d189589c92f6e9cf07def85\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_amd64.deb\n Size/MD5 checksum: 13042396 f41bf487053ea369d2ba635d7c2bb03c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 12560178 13c61c6f63e666a2da9d35e9b4b829b3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13251702 4a87624ae820a7fef519660321ccd002\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13213610 6f574e36cbe1c9adbac496968998d389\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13061358 d9bdb5fdcd2ca14594b4c4eeb0ec4e95\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_amd64.deb\n Size/MD5 checksum: 13044562 61005d327a9ea9efed46625e79710689\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-generic_103sarge1_i386.deb\n Size/MD5 checksum: 2106 fcb23b2830bed29439b86f0174bc36b0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8_103sarge1_i386.deb\n Size/MD5 checksum: 2126 4261e8ea28972c4b1a0328491c142e9d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-amd64-k8-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2114 3a59ea468ed72766258d4c6d4ca721d9\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4_103sarge1_i386.deb\n Size/MD5 checksum: 2134 bfbd467ce5c19e5e1909beb867da57c6\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-headers-2.6-em64t-p4-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2130 8c3cb8de73fecb230bf869dce2e92e9b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-generic_103sarge1_i386.deb\n Size/MD5 checksum: 2160 3fdac05d7afc2d522191b8672310e3bb\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8_103sarge1_i386.deb\n Size/MD5 checksum: 2168 78248b7c5024afdd3e8bcf8f3b85fdd0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-amd64-k8-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2180 33dbe8a50cd2deb102b2c26c3451cb0d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4_103sarge1_i386.deb\n Size/MD5 checksum: 2228 8f87a7c45040d6192c7dd7521719bb84\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64/kernel-image-2.6-em64t-p4-smp_103sarge1_i386.deb\n Size/MD5 checksum: 2250 0220661e0e1c24c0248a54ed13f93e96\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-386_101sarge1_i386.deb\n Size/MD5 checksum: 2150 f710e37e9e5af100ef65b167020739ca\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686_101sarge1_i386.deb\n Size/MD5 checksum: 2184 0dcabd1f69fe86bb1d431f193d032a5d\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2248 88dbce576e5ec5b484085f0e7f204b1c\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2160 459222cd722e8c592fef62a5e64d2e29\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-headers-2.6-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2228 a528e1e7db01a3280a2bab86383f8f9e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-386_101sarge1_i386.deb\n Size/MD5 checksum: 2152 64f8938c4ccf9a567ace8906474a3a05\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686_101sarge1_i386.deb\n Size/MD5 checksum: 2182 3fc7225f53712469830cb60404598287\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-686-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2252 97cc65172e9583cf0299c68e53b2dbc3\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7_101sarge1_i386.deb\n Size/MD5 checksum: 2164 cbd1dd8a0dc39c35598c131e0473ce46\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-i386/kernel-image-2.6-k7-smp_101sarge1_i386.deb\n Size/MD5 checksum: 2232 5a55c3acad554351348c2c4bbe9347b9\n http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.9.1sarge1_i386.deb\n Size/MD5 checksum: 11986970 3f1f1b972c9aea7e324d3f16252c1a14\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2777236 af649947c652a9486461b92bbc33be8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 256920 88db1b684f215fdd35de0989f148b57f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254646 553205bb17cfc57f4c4a7aadff46650a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251590 51ebd6202b7f347f66df0e189b2a3946\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 254818 746967059979238eb49cfdcba572c07b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 251708 33a61355c7a48d87b7570b772e454760\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 2777384 1bb1a12e5057dff0213af9d62e204e1a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-386_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 256932 4ffede1559073c0fac6256ebf6bf0fa2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 254820 e24193f1e1a4e0f19e4f6dea078b94a3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 251726 9afbac1038d98e6377a02ff6aebb3441\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 254918 e32f308990db81bff7295a4724dfa23a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 251742 c4ad3e4f52e907067a44f25214b6b34f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 14058198 fd607b13caf99093ef31071ff7395d6d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15531820 5871afdf04de65bda6f5eb3266b0621d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15339250 f3ab94a1304a28732cea6be8dd871ac7\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15258514 cc888a3d69727d61b86a7f0945a51eff\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 15118194 fb0e7f6b830b7a012f06bf7c25ff15cc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-386_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 14064090 7801ebccc8aaa6cbdf94b8f97c017f17\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15534482 11587d9502f913721dde8c98fef3b676\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-686-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15343922 cc4689243c7fc2134bb4b6e89e44668a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15260668 839c21112982d20f38b3f4ebc6337cb9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-3-k7-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 15120180 3c0e8d9f3df47a5588618bdd0c0529f9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 2719920 0984a4d0f8de19308e49bc822b2d7c71\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 224274 4faa8c6ee4aceae2ea01a2398c433599\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 223264 298ec2bb85e50e58b4e0ba131648e1b2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 219174 d7422d17926f1e654627e08a71a8da94\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 220996 0433d7f8f2ce52acde87fd1518b1987c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 217432 f34fb2bc6f9986cc94b002385392ff98\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 2720230 12790a80072f9691a6aebfae99d2884a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 224370 288b4255fa05983bedd12c2787159713\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 223320 b0895780411c7883d4e662f59a614c09\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 219366 d2c62fcc31fe84998ff3ec7192adcaa9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 221098 14e8145058f41276743990373a602dc8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 217728 ff9ec1441b3c486f2bf699aa34cd19cf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 12558490 4696f82bada71e27c3e1918b6a453f69\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13250408 200fcd489897d816ef3e7bfe5266541a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13210500 df01307ce5ceed0e7b34e40aef5ff56f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13208672 2aefa612e0e46772f15ab816dfd0ec75\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb\n Size/MD5 checksum: 13188388 2e889282559ab1b62fbd3908ebae585d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-generic_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 12559818 d106cb6e039594f39c69757139e3b81d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13251680 6885825a1d87f69e2b9a8733bcd3149a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-amd64-k8-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13213584 78a23e516db62160e02d7531fdf56ceb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13211806 626ac3ecedbc13b34fa972842eddc87e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-12-em64t-p4-smp_2.6.8-16sarge2_i386.deb\n Size/MD5 checksum: 13188560 cd0f63a5cb74c21d601ffaf22230015d\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-386_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 140430 3f2b9eba956c9d736df02ee8f8048960\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-586tsc_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 152842 d79caea6f9eb14dc29f060f4c402623c\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 155756 92824520277f5805f4315f59bdae29ba\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-686-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 159776 bfa56474c228de3f2225b01d555628cd\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k6_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 148882 bd479694e49548e272b99d651525211c\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 154512 2f4ca0b5a6d15d372810a4adf28db0a2\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.4.27-3-k7-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 158304 4baf71cc92212d7ac2cacb5913ce15bd\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-386_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 147580 741b00a1dd08f0a3ec11807b5b5e0d21\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 164966 3608c1954937b7c2a562c5e7cec9c82a\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-686-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 168700 f4292765662e2f76d9a2e18af8052122\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 163394 cde18e20701333deb222482a6bacd7ab\n http://security.debian.org/pool/updates/main/h/hostap-modules-i386/hostap-modules-2.6.8-3-k7-smp_0.3.7-1sarge1_i386.deb\n Size/MD5 checksum: 167226 488d6c27c43fe4e6b39d3c2d8ee54be9\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-386_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 59506 783e00471ba34c7961a962bd92800dc6\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 68052 d71c7488bbe557ff73cecfb40866454c\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-686-smp_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 68288 572be41d7cd81949fe08696bcf44bd50\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 66456 fc41d56657d638be30dbe7030ed30744\n http://security.debian.org/pool/updates/main/n/ndiswrapper-modules-i386/ndiswrapper-modules-2.6.8-3-k7-smp_1.1-2sarge1_i386.deb\n Size/MD5 checksum: 66896 ab693dc48e540eb2b7c902e5bb3f5bb0\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5014 b5eb10541045f43a896cff6863fabc99\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5080 bef129992a5a0e02811924d9e2c20928\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5036 6013655c76a27afb60a5596344063fac\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5102 07d70aca348f010c1768a8f36f35d969\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 3097054 691f7cd4d1b2f184e50ab566f20a13e4\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198662 72e0e4b4331b8a600de3a98d6ac59a82\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197920 6e19efeac81a2a9416328af58316c4cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 198394 6d946fcc7b1fcf88c9ee9a47f7015384\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 197828 8be7e8290bd8e7cf1b9c162c9e369b36\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 3097204 e62aa5944fb5f84f77a822b10dfaaec3\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198498 7ce7e79e3a4a819907957fcf099a5c70\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198092 75130dae14a72f13a096ea69c4af4f64\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 198210 013fd74c791f3529c082844d464e52bb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 197804 68e2bbb8cf37ce358688fe8bc59d23d2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5010 f7d0ba9bd59a484ed8faa294f678b9cb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5074 c2c04705ec9f041555b60157dde8dfa9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5034 5c00d1be7ba6cc5adb92a249a955fd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 5102 b54e60d375f6e7ca263662d812175a5d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22041474 4419d9b68b593646ed49ff194fcbcc9e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22666884 7aab34e05eed41eee4b56ca45e1c4c2c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 21959066 27fe9dc58a04851cfbbac5b4a53f21ae\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb\n Size/MD5 checksum: 22689900 4011393c3e3a94354d81c909a1aaef91\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 21473296 d5ba65d7f15dcb9e8978af52cd78af19\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-itanium-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 22127598 56977e01aedd74201e249aa2dfb9d867\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 21391968 45b8ed70f88d2b5a32acb7664084972f\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-3-mckinley-smp_2.6.8-14sarge2_ia64.deb\n Size/MD5 checksum: 22153416 86f73fcd2c8c7b38cd6f3bd62c19bd43\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1980 76a590df604e48b09ac92e97722e9b2b\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1994 e52a21fa353ec696fab8a7540e23cee0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-32-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2068 b5572d57a20cced0a4a021bc3aeca59e\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2000 332fb79b811586f1fdd543ec1a58fc0f\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-headers-2.6-64-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2066 ee4df56b5af375e3a77114b58cb7c355\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1990 974297ab2e66bc6e45265027a9cab1cc\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-32-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2062 b9cfcd2358379c5712991999117ed580\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 1992 205b6094359187c7398018e138ed19a0\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-hppa/kernel-image-2.6-64-smp_2.6.8-1sarge1_hppa.deb\n Size/MD5 checksum: 2052 afb79e0c218abf65b5bd8e5d754cdb38\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 2798740 3bd227d7f6ce63d13f4eb4cef3cc7efa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 209500 8b284495343adf74bca8219421f4b48d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208722 941a680674931ec594e3512c5736c9bf\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 208356 7ab2df2b04391d75500083585a96701b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 207502 0a840281a00f4762978af411d7a3e7fb\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 2800462 f91eaebb158c9749c1d31dc383b6e0f8\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 209530 b50da9513e91589182390342683fdb8e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 208622 ae7c1f319e17331a213d7b4ce7d16989\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 208182 c0462524e02dd0c6a27541a27e459c29\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-headers-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 207748 b02991119d8ccca8b9e4c31737ab695d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16020358 6423b4288f949286ce1c70a743d03373\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-32-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 16926452 be46b30fdb54c08c6cef2fcf7c9a2450\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 17472682 d8ecab478805553c2f978dd405dca57d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-2-64-smp_2.6.8-6sarge1_hppa.deb\n Size/MD5 checksum: 18305956 42ae9163eaba822e863ea8dd2cdedcaa\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 16023554 815f08d56c68ac50dcdb521e14390b7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-32-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 16927964 7b4d90cbd15ddf98609cf72d3e512660\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 17476404 963d93e651086f54efb1375234957921\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-hppa/kernel-image-2.6.8-3-64-smp_2.6.8-6sarge2_hppa.deb\n Size/MD5 checksum: 18305586 db6058c84e2f63cfe2611674114f354d\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-amiga_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3305946 8ef4160b024945d31d8744b14e32f25a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-atari_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3101536 3382c3e69f2fe998f0e671e8e270807d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-bvme6000_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3011458 838d87ada5760307e762f1f3ec2c91f0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-hp_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2986606 dcc8faa142a07efc35cfbcef3744406b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mac_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3173820 c83822fd5935e4ceb7816dcede3c7b9a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme147_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2977534 b3449977e75ade201f49e27a44f79c1b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-mvme16x_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3046552 3694c7d1338e55cac77168122f5c4b38\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-q40_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 3105060 86f7a2f92ae27dd3f8b57e9aebf1b118\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-m68k/kernel-image-2.6.8-sun3_2.6.8-4sarge2_m68k.deb\n Size/MD5 checksum: 2991336 3a28774631beb37997d937e55a6e9454\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers_102sarge1_powerpc.deb\n Size/MD5 checksum: 2380 fe4724ab347b4ac3332beba5e5ccfed4\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2396 6a2e8db727f0022e81255a442c5ebdc9\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-headers-2.6_102sarge1_powerpc.deb\n Size/MD5 checksum: 2396 5eb96b2b98c92b52e6f932ab475b0fec\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2466 1d2424589e684946a5d6c7913db61976\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.4-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2514 2be237bec7e6d2878e75fc47a0222b9d\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3_102sarge1_powerpc.deb\n Size/MD5 checksum: 2414 dbd3d270955b623ad805839960aa96ae\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power3-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2442 e1b15674c71cec89a5a2e4d70461baac\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2438 a3b87f2ef01a823a715ff69ee2ec8406\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-power4-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2476 06957c6d5d9d86c9e5551275974fc18d\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2466 60dc23b47e8c98fa7426197c1770fdb2\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-2.6-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2516 e08eb266e65cb83bf5dfd85c230bb48e\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3_102sarge1_powerpc.deb\n Size/MD5 checksum: 2400 d0a3883e658b675bef039514d5d317b9\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power3-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2422 e98c826345fc55bf1b4f261f0403001c\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4_102sarge1_powerpc.deb\n Size/MD5 checksum: 2430 6838fb393d4ea7233a0db354ca8e0d6f\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-power4-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2468 516df5d7055341135ca824e2c7ba4c59\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc_102sarge1_powerpc.deb\n Size/MD5 checksum: 2440 84b8e93ae95a9a332835e459ae258c31\n http://security.debian.org/pool/updates/main/k/kernel-latest-powerpc/kernel-image-powerpc-smp_102sarge1_powerpc.deb\n Size/MD5 checksum: 2492 7bf7d3f281580247978af66b6bc71a9f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405208 bc0049d16d62333a59496f8448c0ae5b\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405122 857956fab5ea958d1f0e29d9b8082074\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405120 f1d48b84ce88a36f9a250228f77b24bf\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405040 5aa69dd9407911e00cbd9bb1896f27b8\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405410 9f24a2e7ea0609f7ca18dc78496a400e\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 405182 1c4270a6157a596aae2fb49c41a008ee\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405670 bd347754ea8c4cee14686b207e6cf46d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405666 1dec752373178a4aef51f74c6d917073\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405598 c39f371744ca92eec853ad8746f0f009\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405568 b346b94897fca3c678daadc99b515428\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405912 14475ec4cdc9b337ad2dc0ab3a772bdb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 405698 4c3c94aa9afb4e6d73986bbfa26484bb\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 5143830 3a6cd285eba77baae74a2a16f8029be2\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8-3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 5145112 c45a74745d3359da81add15933eb847a\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13537930 b88fc7f255a362ff1af0f127c105fe21\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power3-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13895234 1c6a336420e8af2d40962f6016104cab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13526632 ad1bc642f915effd59fd6c2c646ed848\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-power4-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13883038 8afe1d42e0e03a81a55b108acd3a972d\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13558318 71034f429cb959413adcc9f7df642d30\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-3-powerpc-smp_2.6.8-12sarge2_powerpc.deb\n Size/MD5 checksum: 13811714 79d63ee21fbcc4d343f73a391c2de350\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13494684 2ab633af498a4486190d3754c530e7f4\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13855580 1245c9d474405a277864484b0237252f\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13486150 80b9f2ed16acb2c9fdb7c9cb133a4c03\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13842602 e4013da64e44e6e0401aa87b1e68c1ce\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13514634 a3fbbf23d7b805431a5f9f28aadd25ab\n http://security.debian.org/pool/updates/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb\n Size/MD5 checksum: 13769858 20783767bb65e7ea6ca76662438bf7ca\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc_0.9.70+2.6.8+12sarge1_powerpc.deb\n Size/MD5 checksum: 38380 361eb34e717c3996b1b1118cac92da32\n http://security.debian.org/pool/updates/main/m/mol-modules-2.6.8/mol-modules-2.6.8-3-powerpc-smp_0.9.70+2.6.8+12sarge1_powerpc.deb\n Size/MD5 checksum: 39310 1c19f5fcbd866c83d6386ed643d08afa\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 5083010 42c4dd8c6c67ce7940f0d24bb745385c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-3_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 5084018 855029ce8570fc938826289ba375098b\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 2973758 c8d12dd2fbddca3ab1b7bd905de4a90c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 1140118 328edfc2944127e2f1d6dca1842ce51d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb\n Size/MD5 checksum: 3179326 487c36323990a6ae1119f4c30f16cdd9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 2976012 d807ca6328f0f789b5f8dfff07d29db0\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390-tape_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 1140596 32f51209baa4d72d8ccf6d5ed57f4638\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-3-s390x_2.6.8-5sarge2_s390.deb\n Size/MD5 checksum: 3182684 fb892f14401c5cb0bc11a1f16a40a6fa\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc32_101sarge1_sparc.deb\n Size/MD5 checksum: 2094 ee7137ee7a7aaa37d5b0e34983d22ca5\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64_101sarge1_sparc.deb\n Size/MD5 checksum: 2098 1f028cdda7b37f42a9c93712a2af9cac\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb\n Size/MD5 checksum: 2106 c7539f2b30142c5e549e03e54a40ba35\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc32_101sarge1_sparc.deb\n Size/MD5 checksum: 2070 3ea5f8502192782ebfba70500eeb7eab\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64_101sarge1_sparc.deb\n Size/MD5 checksum: 2072 d3966357806c24f79e9d4e858dedd635\n http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc/kernel-image-2.6-sparc64-smp_101sarge1_sparc.deb\n Size/MD5 checksum: 2090 b2872959f522478d84039d84eebf4e4e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 3462 c68f0624f124db25f3a41f78432ca11c\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-build-2.6.8-3_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 3516 e01d50a416f25627da8d7cf5282b0b4e\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 2888690 29723527245a48a00e724c7366868ec9\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 107974 788d40ca3a1a3f53b8b2cf4c1fc4badc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 142726 8719b1bf0d3aff36f7711d8979f87a7d\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 143332 87bc055c575e3ec3ea44136ed44dff6a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 2889160 058d5bbc4b91691fa87204302c7b1a8a\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 108198 d802239f368827f5cd139f3b8d5b9458\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 142976 6e0c64f83cc5cb9342c0f65b61a62a30\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-headers-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 143640 f6ba9cf8f830e9e9f2c6297d35a2bc57\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 4545570 00d7c7e1caef41efcbc198a282f2b9f2\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7428184 1f146c58f98331bf5826520379bacd33\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb\n Size/MD5 checksum: 7622116 4de4c114879d82d79fc34cb93c070d43\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc32_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 4547790 9cc8acb2d0a3e490dc3ae2ef8fc0f139\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 7431432 af5c99841ee5dcaa8fed642a89653f52\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-sparc/kernel-image-2.6.8-3-sparc64-smp_2.6.8-15sarge2_sparc.deb\n Size/MD5 checksum: 7625246 2e40c6079591a28656a280f4e8d5f344\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 6181586 52e464ad87d3d29f61211c3a20232459\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 1043588 4451df70d7b6df9b00ad788712959db3\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 34936164 826e6dc98eed9696f9070afd83a72559\n http://security.debian.org/pool/updates/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge2_all.deb\n Size/MD5 checksum: 33842 28717b85541e3aa8aa872f61798d23fc\n http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge2_all.deb\n Size/MD5 checksum: 9244 3ba83cf4618348710094dbccbec1b0bb\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 9, "modified": "2006-03-23T00:00:00", "published": "2006-03-23T00:00:00", "id": "DEBIAN:DSA-1017-1:CD473", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00098.html", "title": "[SECURITY] [DSA 1017-1] New Linux kernel 2.6.8 packages fix several vulnerabilities", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}