Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-0291
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:11.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11824", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11824" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4" }, { "name": "[linux-kernel] 20100114 [PATCH 01/52] untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://groups.google.com/group/linux.kernel/msg/895f20870532241e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2" }, { "name": "[linux-kernel] 20091205 [RFC][PATCHSET] mremap/mmap mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2" }, { "name": "[oss-security] 20100121 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2" }, { "name": "DSA-1996", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-1996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782" }, { "name": "43315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43315" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010" }, { "name": "39033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39033" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "[oss-security] 20100119 CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e" }, { "name": "37906", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37906" }, { "name": "DSA-2005", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "[oss-security] 20100119 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29" }, { "name": "38492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38492" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970" }, { "name": "RHSA-2010:0161", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0161.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11824", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11824" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4" }, { "name": "[linux-kernel] 20100114 [PATCH 01/52] untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://groups.google.com/group/linux.kernel/msg/895f20870532241e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2" }, { "name": "[linux-kernel] 20091205 [RFC][PATCHSET] mremap/mmap mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2" }, { "name": "[oss-security] 20100121 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2" }, { "name": "DSA-1996", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-1996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782" }, { "name": "43315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43315" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010" }, { "name": "39033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39033" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "[oss-security] 20100119 CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e" }, { "name": "37906", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37906" }, { "name": "DSA-2005", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "[oss-security] 20100119 Re: CVE request - kernel: untangle the do_mremap() mess", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29" }, { "name": "38492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38492" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970" }, { "name": "RHSA-2010:0161", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0161.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-0291", "datePublished": "2010-02-15T18:00:00", "dateReserved": "2010-01-12T00:00:00", "dateUpdated": "2024-08-07T00:45:11.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-0291\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-02-15T18:30:00.720\",\"lastModified\":\"2024-11-21T01:11:54.897\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \\\"do_mremap() mess\\\" or \\\"mremap/mmap mess.\\\"\"},{\"lang\":\"es\",\"value\":\"El kernel de Linux en versiones anteriores a la v2.6.32.4 permite a usuarios locales obtener privilegios o provocar una denegaci\u00f3n de servicio (panic) llamando a la funci\u00f3n (1) mmap o (2) mremap, tambi\u00e9n conocido como el \\\"do_mremap() mess\\\" o el \\\"mremap/mmap mess.\\\"\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.32.4\",\"matchCriteriaId\":\"0FBF58C6-C6A3-4090-9752-D525F9A18357\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://groups.google.com/group/linux.kernel/msg/895f20870532241e\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38492\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/39033\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43315\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-1996\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2005\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0161.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/37906\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=556703\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11824\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://groups.google.com/group/linux.kernel/msg/895f20870532241e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/39033\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-1996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2005\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0161.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/37906\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=556703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-p733-g2pv-9gp7
Vulnerability from github
The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the "do_mremap() mess" or "mremap/mmap mess."
{ "affected": [], "aliases": [ "CVE-2010-0291" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-02-15T18:30:00Z", "severity": "MODERATE" }, "details": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"", "id": "GHSA-p733-g2pv-9gp7", "modified": "2022-05-02T06:11:22Z", "published": "2022-05-02T06:11:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0291" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11824" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05d72faa6d13c9d857478a5d35c85db9adada685" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=097eed103862f9c6a97f2e415e21d1134017b135" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0ec62d290912bb4b989be7563851bc364ec73b56" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2c6a10161d0b5fc047b5bd81b03693b9af99fab5" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ea1d13f64efdf49319e86c87d9ba38c30902782" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=54f5de709984bae0d31d823ff03de755f9dcac54" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=564b3bffc619dcbdd160de597b0547a7017ea010" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=570dcf2c15463842e384eb597a87c1e39bead99b" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8c7b49b3ecd48923eb64ff57e07a1cdb74782970" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9206de95b1ea68357996ec02be5db0638a0de2c1" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=935874141df839c706cd6cdc438e85eb69d1525e" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aa65607373a4daf2010e8c3867b6317619f3c1a3" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bb52d6694002b9d632bb355f64daa045c6293a4e" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c4caa778157dbbf04116f0ac2111e389b5cd7a29" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e77414e0aad6a1b063ba5e5750c582c75327ea6a" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ecc1a8993751de4e82eb18640d631dae1f626bd6" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f106af4e90eadd76cfc0b5325f659619e08fb762" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8b7256096a20436f6d0926747e3ac3d64c81d24" }, { "type": "WEB", "url": "http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090" }, { "type": "WEB", "url": "http://groups.google.com/group/linux.kernel/msg/895f20870532241e" }, { "type": "WEB", "url": "http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/38492" }, { "type": "WEB", "url": "http://secunia.com/advisories/39033" }, { "type": "WEB", "url": "http://secunia.com/advisories/43315" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-1996" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2005" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0161.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/37906" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2010_0504
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* multiple flaws were found in the mmap and mremap implementations. A local\nuser could use these flaws to cause a local denial of service or escalate\ntheir privileges. (CVE-2010-0291, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n(futexes) implementation. The unlock code path did not check if the futex\nvalue associated with pi_state-\u003eowner had been modified. A local user could\nuse this flaw to modify the futex value, possibly leading to a denial of\nservice or privilege escalation when the pi_state-\u003eowner pointer is\ndereferenced. (CVE-2010-0622, Important)\n\n* a NULL pointer dereference flaw was found in the Linux kernel Network\nFile System (NFS) implementation. A local user on a system that has an\nNFS-mounted file system could use this flaw to cause a denial of service or\nescalate their privileges on that system. (CVE-2010-1087, Important)\n\n* a flaw was found in the sctp_process_unk_param() function in the Linux\nkernel Stream Control Transmission Protocol (SCTP) implementation. A remote\nattacker could send a specially-crafted SCTP packet to an SCTP listening\nport on a target system, causing a kernel panic (denial of service).\n(CVE-2010-1173, Important)\n\n* a flaw was found in the Linux kernel Transparent Inter-Process\nCommunication protocol (TIPC) implementation. If a client application, on a\nlocal system where the tipc module is not yet in network mode, attempted to\nsend a message to a remote TIPC node, it would dereference a NULL pointer\non the local system, causing a kernel panic (denial of service).\n(CVE-2010-1187, Important)\n\n* a buffer overflow flaw was found in the Linux kernel Global File System 2\n(GFS2) implementation. In certain cases, a quota could be written past the\nend of a memory page, causing memory corruption, leaving the quota stored\non disk in an invalid state. A user with write access to a GFS2 file system\ncould trigger this flaw to cause a kernel crash (denial of service) or\nescalate their privileges on the GFS2 server. This issue can only be\ntriggered if the GFS2 file system is mounted with the \"quota=on\" or\n\"quota=account\" mount option. (CVE-2010-1436, Important)\n\n* a race condition between finding a keyring by name and destroying a freed\nkeyring was found in the Linux kernel key management facility. A local user\ncould use this flaw to cause a kernel panic (denial of service) or escalate\ntheir privileges. (CVE-2010-1437, Important)\n\n* a flaw was found in the link_path_walk() function in the Linux kernel.\nUsing the file descriptor returned by the open() function with the\nO_NOFOLLOW flag on a subordinate NFS-mounted file system, could result in a\nNULL pointer dereference, causing a denial of service or privilege\nescalation. (CVE-2010-1088, Moderate)\n\n* a missing permission check was found in the gfs2_set_flags() function in\nthe Linux kernel GFS2 implementation. A local user could use this flaw to\nchange certain file attributes of files, on a GFS2 file system, that they\ndo not own. (CVE-2010-1641, Low)\n\nRed Hat would like to thank Jukka Taimisto and Olli Jarva of Codenomicon\nLtd, Nokia Siemens Networks, and Wind River on behalf of their customer,\nfor responsibly reporting CVE-2010-1173; Mario Mikocevic for responsibly\nreporting CVE-2010-1436; and Dan Rosenberg for responsibly reporting\nCVE-2010-1641.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from\nhttp://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0504", "url": "https://access.redhat.com/errata/RHSA-2010:0504" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://kbase.redhat.com/faq/docs/DOC-31052", "url": "http://kbase.redhat.com/faq/docs/DOC-31052" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html", "url": "http://www.redhat.com/docs/en-US/errata/RHSA-2010-0504/Kernel_Security_Update/index.html" }, { "category": "external", "summary": "556703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "category": "external", "summary": "563091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563091" }, { "category": "external", "summary": "567184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567184" }, { "category": "external", "summary": "567813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567813" }, { "category": "external", "summary": "578057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=578057" }, { "category": "external", "summary": "584645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=584645" }, { "category": "external", "summary": "585094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585094" }, { "category": "external", "summary": "586006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586006" }, { "category": "external", "summary": "587957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=587957" }, { "category": "external", "summary": "588219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=588219" }, { "category": "external", "summary": "591493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=591493" }, { "category": "external", "summary": "591611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=591611" }, { "category": "external", "summary": "592844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=592844" }, { "category": "external", "summary": "592846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=592846" }, { "category": "external", "summary": "594054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594054" }, { "category": "external", "summary": "594057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594057" }, { "category": "external", "summary": "594061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594061" }, { "category": "external", "summary": "595579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" }, { "category": "external", "summary": "596384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596384" }, { "category": "external", "summary": "596385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596385" }, { "category": "external", "summary": "598355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=598355" }, { "category": "external", "summary": "599332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599332" }, { "category": "external", "summary": "599730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599730" }, { "category": "external", "summary": "599734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599734" }, { "category": "external", "summary": "599737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599737" }, { "category": "external", "summary": "599739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599739" }, { "category": "external", "summary": "600215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=600215" }, { "category": "external", "summary": "600498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=600498" }, { "category": "external", "summary": "601080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=601080" }, { "category": "external", "summary": "601090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=601090" }, { "category": "external", "summary": "607087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607087" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0504.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:30:48+00:00", "generator": { "date": "2024-11-22T03:30:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0504", "initial_release_date": "2010-07-01T18:00:00+00:00", "revision_history": [ { "date": "2010-07-01T18:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-07-01T14:26:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:30:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.8.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-194.8.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.8.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-194.8.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.src", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.src", "product_id": "kernel-0:2.6.18-194.8.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.8.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.8.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.8.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.8.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.src" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.8.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.src" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.8.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.8.1.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-0291", "discovery_date": "2010-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "556703" } ], "notes": [ { "category": "description", "text": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: untangle the do_mremap()", "title": "Vulnerability summary" }, { "category": "other", "text": "The risks associated with fixing this bug are greater than the important severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3 and 4. This issue was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0504.html and https://rhn.redhat.com/errata/RHSA-2010-0161.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0291" }, { "category": "external", "summary": "RHBZ#556703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0291", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0291" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0291", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0291" } ], "release_date": "2009-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: untangle the do_mremap()" }, { "cve": "CVE-2010-0622", "discovery_date": "2010-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "563091" } ], "notes": [ { "category": "description", "text": "The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: futex: Handle user space corruption gracefully", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for priority-inheriting futex. Future updates in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0622" }, { "category": "external", "summary": "RHBZ#563091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0622", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0622" } ], "release_date": "2010-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: futex: Handle user space corruption gracefully" }, { "cve": "CVE-2010-1087", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "567184" } ], "notes": [ { "category": "description", "text": "The nfs_wait_on_request function in fs/nfs/pagelist.c in Linux kernel 2.6.x through 2.6.33-rc5 allows attackers to cause a denial of service (Oops) via unknown vectors related to truncating a file and an operation that is not interruptible.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFS: Fix an Oops when truncating a file", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 as they did not include the upstream commit 150030b7 that had introduced the problem. A future update in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1087" }, { "category": "external", "summary": "RHBZ#567184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567184" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1087" } ], "release_date": "2010-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFS: Fix an Oops when truncating a file" }, { "cve": "CVE-2010-1088", "discovery_date": "2010-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "567813" } ], "notes": [ { "category": "description", "text": "fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount \"symlinks,\" which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fix LOOKUP_FOLLOW on automount \"symlinks\"", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 as this issue only affects kernel version 2.6.18 and onwards. A future update in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1088" }, { "category": "external", "summary": "RHBZ#567813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1088" } ], "release_date": "2010-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fix LOOKUP_FOLLOW on automount \"symlinks\"" }, { "acknowledgments": [ { "names": [ "Wind River", "Nokia Siemens Networks" ] }, { "names": [ "Olli Jarva", "Jukka Taimisto" ], "organization": "Codenomicon Ltd" } ], "cve": "CVE-2010-1173", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "584645" } ], "notes": [ { "category": "description", "text": "The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: crash due to malformed SCTPChunkInit packet", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-1173.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG may address this flaw.\n\nFor more information, please see http://kbase.redhat.com/faq/docs/DOC-31052.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1173" }, { "category": "external", "summary": "RHBZ#584645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=584645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1173", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1173" } ], "release_date": "2010-04-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: crash due to malformed SCTPChunkInit packet" }, { "cve": "CVE-2010-1187", "discovery_date": "2010-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "578057" } ], "notes": [ { "category": "description", "text": "The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tipc: Fix oops on send prior to entering networked mode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-1187.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include support for Transparent Inter-Process Communication Protocol (TIPC). A future kernel update in Red Hat Enterprise Linux 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1187" }, { "category": "external", "summary": "RHBZ#578057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=578057" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1187", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1187" } ], "release_date": "2010-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tipc: Fix oops on send prior to entering networked mode" }, { "acknowledgments": [ { "names": [ "Mario Mikocevic" ] } ], "cve": "CVE-2010-1436", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "586006" } ], "notes": [ { "category": "description", "text": "gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gfs2 buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include support for the GFS2 file system.\n\nA future kernel update in Red Hat Enterprise Linux 5 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1436" }, { "category": "external", "summary": "RHBZ#586006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1436", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1436" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1436", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1436" } ], "release_date": "2010-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: gfs2 buffer overflow" }, { "cve": "CVE-2010-1437", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "585094" } ], "notes": [ { "category": "description", "text": "Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: keyrings: find_keyring_by_name() can gain the freed keyring", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3. Future kernel updates in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1437" }, { "category": "external", "summary": "RHBZ#585094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585094" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1437", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1437" } ], "release_date": "2010-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: keyrings: find_keyring_by_name() can gain the freed keyring" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-1641", "discovery_date": "2010-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595579" } ], "notes": [ { "category": "description", "text": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-1641.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4 and Red Hat Enterprise MRG as they did not include\nsupport for the GFS2 file system.\n\nA future kernel update in Red Hat Enterprise Linux 5 will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1641" }, { "category": "external", "summary": "RHBZ#595579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595579" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1641", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1641" } ], "release_date": "2010-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-07-01T18:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0504" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-0:2.6.18-194.8.1.el5.src", "5Client:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-0:2.6.18-194.8.1.el5.src", "5Server:kernel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.8.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.i386", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.8.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.8.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.8.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: GFS2: The setflags ioctl() doesn\u0027t check file ownership" } ] }
rhsa-2010_0161
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise MRG 1.2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a deficiency was found in the fasync_helper() implementation. This could\nallow a local, unprivileged user to leverage a use-after-free of locked,\nasynchronous file descriptors to cause a denial of service or privilege\nescalation. (CVE-2009-4141, Important)\n\n* multiple flaws were found in the mmap and mremap implementations. A\nlocal, unprivileged user could use these flaws to cause a local denial of\nservice or escalate their privileges. (CVE-2010-0291, Important)\n\n* a missing boundary check was found in the do_move_pages() function in the\nmemory migration functionality. A local user could use this flaw to cause a\nlocal denial of service or an information leak. (CVE-2010-0415, Important)\n\n* a NULL pointer dereference flaw was found in the ip6_dst_lookup_tail()\nfunction. An attacker on the local network could trigger this flaw by\nsending IPv6 traffic to a target system, leading to a system crash (kernel\nOOPS) if dst-\u003eneighbour is NULL on the target system when receiving an IPv6\npacket. (CVE-2010-0437, Important)\n\n* a NULL pointer dereference flaw was found in the Fast Userspace Mutexes\n(futexes) implementation. The unlock code path did not check if the futex\nvalue associated with pi_state-\u003eowner had been modified. A local user could\nuse this flaw to modify the futex value, possibly leading to a denial of\nservice or privilege escalation when the pi_state-\u003eowner pointer is\ndereferenced. (CVE-2010-0622, Important)\n\n* an information leak was found in the print_fatal_signal() implementation.\nWhen \"/proc/sys/kernel/print-fatal-signals\" is set to 1 (the default value\nis 0), memory that is reachable by the kernel could be leaked to\nuser-space. This issue could also result in a system crash. Note that this\nflaw only affected the i386 architecture. (CVE-2010-0003, Moderate)\n\n* a flaw was found in the kernel connector implementation. A local,\nunprivileged user could trigger this flaw by sending an arbitrary amount of\nnotification requests using specially-crafted netlink messages, resulting\nin a denial of service. (CVE-2010-0410, Moderate)\n\n* missing capability checks were found in the ebtables implementation, used\nfor creating an Ethernet bridge firewall. This could allow a local,\nunprivileged user to bypass intended capability restrictions and modify\nebtables rules. (CVE-2010-0007, Low)\n\nThis update also fixes the following bugs:\n\n* references were missing for two LSI MegaRAID SAS controllers already\nsupported by the kernel, preventing systems using these controllers from\nbooting. (BZ#554664)\n\n* a typo in the fix for CVE-2009-2691 resulted in gdb being unable to read\ncore files created by gcore. (BZ#554965) \n\n* values for certain pointers used by the kernel, which should be\nundereferencable, could potentially be abused when a kernel OOPS occurs.\nValues that are harder to dereference are now used. (BZ#555227)\n\n* this update redesigns the locking scheme of the TTY process group\n(tty-\u003epgrp) structure, due to race conditions introduced when tty-\u003epgrp\nstarted using struct pid instead of pid_t. (BZ#559101)\n\n* the way the NFS kernel server used iget() and the way in which it kept\nits cache of inode information, could have led to (mainly on busy file\nservers) inconsistencies between the local file system and the file system\nbeing served to clients. (BZ#561275)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0161", "url": "https://access.redhat.com/errata/RHSA-2010:0161" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "547906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547906" }, { "category": "external", "summary": "554578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554578" }, { "category": "external", "summary": "554664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554664" }, { "category": "external", "summary": "554965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554965" }, { "category": "external", "summary": "555238", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555238" }, { "category": "external", "summary": "556703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "category": "external", "summary": "561275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=561275" }, { "category": "external", "summary": "561682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=561682" }, { "category": "external", "summary": "562582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562582" }, { "category": "external", "summary": "563091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563091" }, { "category": "external", "summary": "563781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0161.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:27:26+00:00", "generator": { "date": "2024-11-22T03:27:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0161", "initial_release_date": "2010-03-23T15:42:00+00:00", "revision_history": [ { "date": "2010-03-23T15:42:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-03-23T11:42:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:27:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-149.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-149.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-149.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-149.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-149.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-149.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-149.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-149.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-149.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-149.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-149.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Tavis Ormandy" ], "organization": "Google Security Team" } ], "cve": "CVE-2009-4141", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "547906" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: create_elf_tables can leave urandom in a bad state", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit 233e70f4 that introduced the problem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4141" }, { "category": "external", "summary": "RHBZ#547906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4141", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4141" } ], "release_date": "2009-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: create_elf_tables can leave urandom in a bad state" }, { "cve": "CVE-2009-4895", "discovery_date": "2010-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "559100" } ], "notes": [ { "category": "description", "text": "Race condition in the tty_fasync function in drivers/char/tty_io.c in the Linux kernel before 2.6.32.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via unknown vectors, related to the put_tty_queue and __f_setown functions. NOTE: the vulnerability was addressed in a different way in 2.6.32.9.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tty-\u003epgrp races", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4 and 5. This issue was addressed in Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0161.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4895" }, { "category": "external", "summary": "RHBZ#559100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559100" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4895", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4895" } ], "release_date": "2009-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: tty-\u003epgrp races" }, { "cve": "CVE-2010-0003", "discovery_date": "2010-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "554578" } ], "notes": [ { "category": "description", "text": "The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: infoleak if print-fatal-signals=1", "title": "Vulnerability summary" }, { "category": "other", "text": "A future update in Red Hat Enterprise MRG may address this flaw.\n\nThis issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0003" }, { "category": "external", "summary": "RHBZ#554578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0003" } ], "release_date": "2010-01-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: infoleak if print-fatal-signals=1" }, { "cve": "CVE-2010-0007", "discovery_date": "2010-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "555238" } ], "notes": [ { "category": "description", "text": "net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: ebtables: enforce CAP_NET_ADMIN", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, as it did not include support for ebtables.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0007" }, { "category": "external", "summary": "RHBZ#555238", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555238" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0007", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0007" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0007", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0007" } ], "release_date": "2010-01-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: netfilter: ebtables: enforce CAP_NET_ADMIN" }, { "cve": "CVE-2010-0291", "discovery_date": "2010-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "556703" } ], "notes": [ { "category": "description", "text": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: untangle the do_mremap()", "title": "Vulnerability summary" }, { "category": "other", "text": "The risks associated with fixing this bug are greater than the important severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3 and 4. This issue was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0504.html and https://rhn.redhat.com/errata/RHSA-2010-0161.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0291" }, { "category": "external", "summary": "RHBZ#556703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0291", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0291" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0291", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0291" } ], "release_date": "2009-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: untangle the do_mremap()" }, { "acknowledgments": [ { "names": [ "Sebastian Krahmer" ] } ], "cve": "CVE-2010-0410", "discovery_date": "2010-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "561682" } ], "notes": [ { "category": "description", "text": "drivers/connector/connector.c in the Linux kernel before 2.6.32.8 allows local users to cause a denial of service (memory consumption and system crash) by sending the kernel many NETLINK_CONNECTOR messages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: OOM/crash in drivers/connector", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for kernel connectors. Future updates in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0410" }, { "category": "external", "summary": "RHBZ#561682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=561682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0410", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0410" } ], "release_date": "2010-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: OOM/crash in drivers/connector" }, { "acknowledgments": [ { "names": [ "Ramon de C. Valle" ] } ], "cve": "CVE-2010-0415", "discovery_date": "2010-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "562582" } ], "notes": [ { "category": "description", "text": "The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7 does not validate node values, which allows local users to read arbitrary kernel memory locations, cause a denial of service (OOPS), and possibly have unspecified other impact by specifying a node that is not part of the kernel\u0027s node set.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sys_move_pages infoleak", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for sys_move_pages. It was only introduced in kernel version 2.6.18 onwards. This issue was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0147.html and https://rhn.redhat.com/errata/RHSA-2010-0161.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0415" }, { "category": "external", "summary": "RHBZ#562582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562582" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0415", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0415" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0415", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0415" } ], "release_date": "2010-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sys_move_pages infoleak" }, { "cve": "CVE-2010-0437", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2010-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "563781" } ], "notes": [ { "category": "description", "text": "The ip6_dst_lookup_tail function in net/ipv6/ip6_output.c in the Linux kernel before 2.6.27 does not properly handle certain circumstances involving an IPv6 TUN network interface and a large number of neighbors, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for Optimistic Duplicate Address Detection (DAD) in IPv6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0437" }, { "category": "external", "summary": "RHBZ#563781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563781" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0437", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0437" } ], "release_date": "2008-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference" }, { "cve": "CVE-2010-0622", "discovery_date": "2010-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "563091" } ], "notes": [ { "category": "description", "text": "The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: futex: Handle user space corruption gracefully", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for priority-inheriting futex. Future updates in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0622" }, { "category": "external", "summary": "RHBZ#563091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0622", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0622" } ], "release_date": "2010-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-03-23T15:42:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0161" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-149.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-149.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-149.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: futex: Handle user space corruption gracefully" } ] }
var-201001-0654
Vulnerability from variot
The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the "do_mremap() mess" or "mremap/mmap mess.". The Linux kernel is prone to multiple denial-of-service vulnerabilities when mapping memory addresses. Local attackers may leverage these issues to crash the kernel and deny service to legitimate users. Other attacks may also be possible. These issues have been resolved in the 2.6.32.4 kernel. Linux Kernel is the kernel used by the open source operating system Linux. There is a permissions vulnerability in the Linux kernel. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2011-0003 Synopsis: Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX Issue date: 2011-02-10 Updated on: 2011-02-10 (initial release of advisory) CVE numbers: --- Apache Tomcat --- CVE-2009-2693 CVE-2009-2901 CVE-2009-2902 CVE-2009-3548 CVE-2010-2227 CVE-2010-1157 --- Apache Tomcat Manager --- CVE-2010-2928 --- cURL --- CVE-2010-0734 --- COS Kernel --- CVE-2010-1084 CVE-2010-2066 CVE-2010-2070 CVE-2010-2226 CVE-2010-2248 CVE-2010-2521 CVE-2010-2524 CVE-2010-0008 CVE-2010-0415 CVE-2010-0437 CVE-2009-4308 CVE-2010-0003 CVE-2010-0007 CVE-2010-0307 CVE-2010-1086 CVE-2010-0410 CVE-2010-0730 CVE-2010-1085 CVE-2010-0291 CVE-2010-0622 CVE-2010-1087 CVE-2010-1173 CVE-2010-1437 CVE-2010-1088 CVE-2010-1187 CVE-2010-1436 CVE-2010-1641 CVE-2010-3081 --- Microsoft SQL Express --- CVE-2008-5416 CVE-2008-0085 CVE-2008-0086 CVE-2008-0107 CVE-2008-0106 --- OpenSSL --- CVE-2010-0740 CVE-2010-0433 CVE-2010-3864 CVE-2010-2939 --- Oracle (Sun) JRE --- CVE-2009-3555 CVE-2010-0082 CVE-2010-0084 CVE-2010-0085 CVE-2010-0087 CVE-2010-0088 CVE-2010-0089 CVE-2010-0090 CVE-2010-0091 CVE-2010-0092 CVE-2010-0093 CVE-2010-0094 CVE-2010-0095 CVE-2010-0837 CVE-2010-0838 CVE-2010-0839 CVE-2010-0840 CVE-2010-0841 CVE-2010-0842 CVE-2010-0843 CVE-2010-0844 CVE-2010-0845 CVE-2010-0846 CVE-2010-0847 CVE-2010-0848 CVE-2010-0849 CVE-2010-0850 CVE-2010-0886 CVE-2010-3556 CVE-2010-3566 CVE-2010-3567 CVE-2010-3550 CVE-2010-3561 CVE-2010-3573 CVE-2010-3565 CVE-2010-3568 CVE-2010-3569 CVE-2010-1321 CVE-2010-3548 CVE-2010-3551 CVE-2010-3562 CVE-2010-3571 CVE-2010-3554 CVE-2010-3559 CVE-2010-3572 CVE-2010-3553 CVE-2010-3549 CVE-2010-3557 CVE-2010-3541 CVE-2010-3574 --- pam_krb5 --- CVE-2008-3825 CVE-2009-1384
- Summary
Update 1 for vCenter Server 4.1, vCenter Update Manager 4.1, vSphere Hypervisor (ESXi) 4.1, ESXi 4.1, addresses several security issues.
- Relevant releases
vCenter Server 4.1 without Update 1,
vCenter Update Manager 4.1 without Update 1,
ESXi 4.1 without patch ESXi410-201101201-SG,
ESX 4.1 without patch ESX410-201101201-SG.
- Problem Description
a. vCenter Server and vCenter Update Manager update Microsoft SQL Server 2005 Express Edition to Service Pack 3
Microsoft SQL Server 2005 Express Edition (SQL Express)
distributed with vCenter Server 4.1 Update 1 and vCenter Update
Manager 4.1 Update 1 is upgraded from SQL Express Service Pack 2
to SQL Express Service Pack 3, to address multiple security
issues that exist in the earlier releases of Microsoft SQL Express.
Customers using other database solutions need not update for
these issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2008-5416, CVE-2008-0085, CVE-2008-0086,
CVE-2008-0107 and CVE-2008-0106 to the issues addressed in MS SQL
Express Service Pack 3.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter 4.1 Windows Update 1
vCenter 4.0 Windows affected, patch pending
VirtualCenter 2.5 Windows affected, no patch planned
Update Manager 4.1 Windows Update 1
Update Manager 4.0 Windows affected, patch pending
Update Manager 1.0 Windows affected, no patch planned
hosted * any any not affected
ESXi any ESXi not affected
ESX any ESX not affected
- Hosted products are VMware Workstation, Player, ACE, Fusion.
b. vCenter Apache Tomcat Management Application Credential Disclosure
The Apache Tomcat Manager application configuration file contains
logon credentials that can be read by unprivileged local users.
The issue is resolved by removing the Manager application in
vCenter 4.1 Update 1.
If vCenter 4.1 is updated to vCenter 4.1 Update 1 the logon
credentials are not present in the configuration file after the
update.
VMware would like to thank Claudio Criscione of Secure Networking
for reporting this issue to us.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-2928 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter 4.1 Windows Update 1
vCenter 4.0 Windows not affected
VirtualCenter 2.5 Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX any ESX not affected
- hosted products are VMware Workstation, Player, ACE, Fusion.
c. vCenter Server and ESX, Oracle (Sun) JRE is updated to version 1.6.0_21
Oracle (Sun) JRE update to version 1.6.0_21, which addresses
multiple security issues that existed in earlier releases of
Oracle (Sun) JRE.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the following names to the security issues fixed in
Oracle (Sun) JRE 1.6.0_19: CVE-2009-3555, CVE-2010-0082,
CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088,
CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092,
CVE-2010-0093, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837,
CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841,
CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0845,
CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849,
CVE-2010-0850.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the following name to the security issue fixed in
Oracle (Sun) JRE 1.6.0_20: CVE-2010-0886.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter 4.1 Windows Update 1
vCenter 4.0 Windows not applicable **
VirtualCenter 2.5 Windows not applicable **
Update Manager 4.1 Windows not applicable **
Update Manager 4.0 Windows not applicable **
Update Manager 1.0 Windows not applicable **
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201101201-SG
ESX 4.0 ESX not applicable **
ESX 3.5 ESX not applicable **
ESX 3.0.3 ESX not applicable **
- hosted products are VMware Workstation, Player, ACE, Fusion. ** this product uses the Oracle (Sun) JRE 1.5.0 family
d. vCenter Update Manager Oracle (Sun) JRE is updated to version 1.5.0_26
Oracle (Sun) JRE update to version 1.5.0_26, which addresses
multiple security issues that existed in earlier releases of
Oracle (Sun) JRE.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the following names to the security issues fixed in
Oracle (Sun) JRE 1.5.0_26: CVE-2010-3556, CVE-2010-3566,
CVE-2010-3567, CVE-2010-3550, CVE-2010-3561, CVE-2010-3573,
CVE-2010-3565,CVE-2010-3568, CVE-2010-3569, CVE-2009-3555,
CVE-2010-1321, CVE-2010-3548, CVE-2010-3551, CVE-2010-3562,
CVE-2010-3571, CVE-2010-3554, CVE-2010-3559, CVE-2010-3572,
CVE-2010-3553, CVE-2010-3549, CVE-2010-3557, CVE-2010-3541,
CVE-2010-3574.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter 4.1 Windows not applicable **
vCenter 4.0 Windows affected, patch pending
VirtualCenter 2.5 Windows affected, no patch planned
Update Manager 4.1 Windows Update 1
Update Manager 4.0 Windows affected, patch pending
Update Manager 1.0 Windows affected, no patch planned
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX not applicable **
ESX 4.0 ESX affected, patch pending
ESX 3.5 ESX affected, no patch planned
ESX 3.0.3 ESX affected, no patch planned
- hosted products are VMware Workstation, Player, ACE, Fusion. ** this product uses the Oracle (Sun) JRE 1.6.0 family
e. vCenter Server and ESX Apache Tomcat updated to version 6.0.28
Apache Tomcat updated to version 6.0.28, which addresses multiple
security issues that existed in earlier releases of Apache Tomcat
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the following names to the security issues fixed in
Apache Tomcat 6.0.24: CVE-2009-2693, CVE-2009-2901, CVE-2009-2902,i
and CVE-2009-3548.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the following names to the security issues fixed in
Apache Tomcat 6.0.28: CVE-2010-2227, CVE-2010-1157.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter 4.1 Windows Update 1
vCenter 4.0 Windows affected, patch pending
VirtualCenter 2.5 Windows not applicable **
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201101201-SG
ESX 4.0 ESX affected, patch pending
ESX 3.5 ESX not applicable **
ESX 3.0.3 ESX not applicable **
- hosted products are VMware Workstation, Player, ACE, Fusion. ** this product uses the Apache Tomcat 5.5 family
f. vCenter Server third party component OpenSSL updated to version 0.9.8n
The version of the OpenSSL library in vCenter Server is updated to
0.9.8n.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2010-0740 and CVE-2010-0433 to the
issues addressed in this version of OpenSSL.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter 4.1 Windows Update 1
vCenter 4.0 Windows affected, patch pending
VirtualCenter 2.5 Windows affected, no patch planned
hosted * any any not applicable
ESXi any ESXi not applicable
ESX any ESX not applicable
- hosted products are VMware Workstation, Player, ACE, Fusion.
g. ESX third party component OpenSSL updated to version 0.9.8p
The version of the ESX OpenSSL library is updated to 0.9.8p.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2010-3864 and CVE-2010-2939 to the
issues addressed in this update.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not applicable
hosted * any any not applicable
ESXi 4.1 ESXi ESXi410-201101201-SG
ESXi 4.0 ESXi affected, patch pending
ESXi 3.5 ESXi affected, patch pending
ESX 4.1 ESX ESX410-201101201-SG
ESX 4.0 ESX affected, patch pending
ESX 3.5 ESX affected, patch pending
ESX 3.0.3 ESX affected, patch pending
- hosted products are VMware Workstation, Player, ACE, Fusion.
h. ESXi third party component cURL updated
The version of cURL library in ESXi is updated.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2010-0734 to the issues addressed in
this update.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi 4.1 ESXi ESXi410-201101201-SG
ESXi 4.0 ESXi affected, patch pending
ESXi 3.5 ESXi affected, patch pending
ESX any ESX not applicable
- hosted products are VMware Workstation, Player, ACE, Fusion.
i. ESX third party component pam_krb5 updated
The version of pam_krb5 library is updated.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2008-3825 and CVE-2009-1384 to the
issues addressed in the update.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201101201-SG
ESX 4.0 ESX not affected
ESX 3.5 ESX not affected
ESX 3.0.3 ESX not affected
- hosted products are VMware Workstation, Player, ACE, Fusion.
j. ESX third party update for Service Console kernel
The Service Console kernel is updated to include kernel version
2.6.18-194.11.1.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2010-1084, CVE-2010-2066, CVE-2010-2070,
CVE-2010-2226, CVE-2010-2248, CVE-2010-2521, CVE-2010-2524,
CVE-2010-0008, CVE-2010-0415, CVE-2010-0437, CVE-2009-4308,
CVE-2010-0003, CVE-2010-0007, CVE-2010-0307, CVE-2010-1086,
CVE-2010-0410, CVE-2010-0730, CVE-2010-1085, CVE-2010-0291,
CVE-2010-0622, CVE-2010-1087, CVE-2010-1173, CVE-2010-1437,
CVE-2010-1088, CVE-2010-1187, CVE-2010-1436, CVE-2010-1641, and
CVE-2010-3081 to the issues addressed in the update.
Note: This update also addresses the 64-bit compatibility mode
stack pointer underflow issue identified by CVE-2010-3081. This
issue was patched in an ESX 4.1 patch prior to the release of
ESX 4.1 Update 1.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201101201-SG
ESX 4.0 ESX affected, patch pending
ESX 3.5 ESX not applicable
ESX 3.0.3 ESX not applicable
-
hosted products are VMware Workstation, Player, ACE, Fusion.
-
Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vCenter Server 4.1 Update 1 and modules
http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0 Release Notes: http://downloads.vmware.com/support/pubs/vs_pages/vsp_pubs_esx41_vc41.html
File type: .iso md5sum: 729cf247aa5d33ceec431c86377eee1a sha1sum: c1e10a5fcbc1ae9d13348d43541d574c563d66f0
File type: .zip md5sum: fd1441bef48a153f2807f6823790e2f0 sha1sum: 31737a816ed1c08ab3a505fb6db2483f49ad7c19
VMware vSphere Client File type: .exe md5sum: cb6aa91ada1289575355d79e8c2a9f8e sha1sum: f9e3d8eb83196ae7c31aab554e344a46b722b1e4
ESXi 4.1 Installable Update 1
http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0 Release Notes:
http://downloads.vmware.com/support/vsphere4/doc/vsp_esxi41_u1_rel_notes.html http://kb.vmware.com/kb/1027919
File type: .iso MD5SUM: d68d6c2e040a87cd04cd18c04c22c998 SHA1SUM: bbaacc0d34503822c14f6ccfefb6a5b62d18ae64
ESXi 4.1 Update 1 (upgrade ZIP from ESXi 4.1) File type: .zip MD5SUM: 2f1e009c046b20042fae3b7ca42a840f SHA1SUM: 1c9c644012dec657a705ddd3d033cbfb87a1fab1
ESXi 4.1 Update 1 (upgrade ZIP from ESXi 4.0) File type: .zip MD5SUM: 67b924618d196dafaf268a7691bd1a0f SHA1SUM: 9d74b639e703259d9e49c0341158e0d4e45de516
ESXi 4.1 Update 1 (upgrade ZIP from ESXi 3.5) File type: .zip MD5SUM: a6024b9f6c6b7b2c629696afc6d07cf4 SHA1SUM: b3841de1a30617ac68d5a861882aa72de3a93488
VMware Tools CD image for Linux Guest OSes File type: .iso MD5SUM: dad66fa8ece1dd121c302f45444daa70 SHA1SUM: 56535a2cfa7799607356c6fd0a7d9f041da614af
VMware vSphere Client File type: .exe MD5SUM: cb6aa91ada1289575355d79e8c2a9f8e SHA1SUM: f9e3d8eb83196ae7c31aab554e344a46b722b1e4
ESXi Installable Update 1 contains the following security bulletins: ESXi410-201101201-SG.
ESX 4.1 Update 1
http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0 Release Notes:
http://downloads.vmware.com/support/vsphere4/doc/vsp_esx41_u1_rel_notes.html http://kb.vmware.com/kb/1029353
ESX 4.1 Update 1 (DVD ISO) File type: .iso md5sum: b9a275b419a20c7bedf31c0bf64f504e sha1sum: 2d85edcaca8218013585e1eab00bc80db6d96e11
ESX 4.1 Update 1 (upgrade ZIP from ESX 4.1) File type: .zip md5sum: 2d81a87e994aa2b329036f11d90b4c14 sha1sum: c2bfc0cf7ac03d24afd5049ddbd09a865aad1798
Pre-upgrade package for ESX 4.0 to ESX 4.1 Update 1 File type: .zip md5sum: 75f8cebfd55d8a81deb57c27def963c2 sha1sum: 889c15aa8008fe0e29439d0ab3468c2beb1c4fe2
ESX 4.1 Update 1 (upgrade ZIP from ESX 4.0) File type: .zip md5sum: 1dc9035cd10e7e60d27e7a7aef57b4c2 sha1sum: e6d3fb65d83a3e263d0f634a3572025854ff8922
VMware Tools CD image for Linux Guest OSes File type: .iso md5sum: dad66fa8ece1dd121c302f45444daa70 sha1sum: 56535a2cfa7799607356c6fd0a7d9f041da614af
VMware vSphere Client File type: .exe md5sum: cb6aa91ada1289575355d79e8c2a9f8e sha1sum: f9e3d8eb83196ae7c31aab554e344a46b722b1e4
ESX410-Update01 contains the following security bulletins: ESX410-201101201-SG (COS kernel, pam_krb5, cURL, OpenSSL, Apache Tomcat, Oracle (Sun) JRE) | http://kb.vmware.com/kb/1027904 ESX410-201101226-SG (glibc) | http://kb.vmware.com/kb/1031330
ESX410-Update01 also contains the following non-security bulletins ESX410-201101211-UG, ESX410-201101213-UG, ESX410-201101215-UG, ESX410-201101202-UG, ESX410-201101203-UG, ESX410-201101204-UG, ESX410-201101206-UG, ESX410-201101207-UG, ESX410-201101208-UG, ESX410-201101214-UG, ESX410-201101216-UG, ESX410-201101217-UG, ESX410-201101218-UG, ESX410-201101219-UG, ESX410-201101220-UG, ESX410-201101221-UG, ESX410-201101222-UG, ESX410-201101225-UG.
To install an individual bulletin use esxupdate with the -b option.
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5416 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0085 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0086 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0107 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0106 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2928 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0082 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0090 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0093 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0845 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0850 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0886 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0433 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1084 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2070 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2248 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2521 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2524 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0008 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0415 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0437 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4308 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0003 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0307 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1086 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0410 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0730 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1085 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0291 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0622 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1087 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1173 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1437 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1088 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1187 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1436 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3561 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3554 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574
- Change log
2011-02-10 VMSA-2011-0003 Initial security advisory in conjunction with the release of vCenter Server 4.1 Update 1, vCenter Update Manager 4.1 Update 1, ESXi 4.1 Update 1, and ESX 4.1 Update 1 on 2011-02-10.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2011 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32)
iEYEARECAAYFAk1U1eoACgkQS2KysvBH1xm3swCfeh4sWvPOubDT1K7QlRj3SjW9 dxYAmwbNLMR9IG/rKZDYh9hqcf4IldCX =2pVj -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2004-1 security@debian.org http://www.debian.org/security/ Dann Frazier February 27, 2010 http://www.debian.org/security/faq
Package : linux-2.6.24 Vulnerability : privilege escalation/denial of service/sensitive memory leak Problem type : local/remote Debian-specific: no CVE Id(s) : CVE-2009-2691 CVE-2009-2695 CVE-2009-3080 CVE-2009-3726 CVE-2009-3889 CVE-2009-4005 CVE-2009-4020 CVE-2009-4021 CVE-2009-4138 CVE-2009-4308 CVE-2009-4536 CVE-2009-4538 CVE-2010-0003 CVE-2010-0007 CVE-2010-0291 CVE-2010-0410 CVE-2010-0415 CVE-2010-0622
NOTE: This kernel update marks the final planned kernel security update for the 2.6.24 kernel in the Debian release 'etch'. Although security support for 'etch' officially ended on Feburary 15th, 2010, this update was already in preparation before that date. Local users may be able to read this data for setuid processes while the ELF binary is being loaded.
CVE-2009-2695
Eric Paris provided several fixes to increase the protection
provided by the mmap_min_addr tunable against NULL pointer
dereference vulnerabilities.
CVE-2009-3080
Dave Jones reported an issue in the gdth SCSI driver.
CVE-2009-3726
Trond Myklebust reported an issue where a malicious NFS server
could cause a denial of service condition on its clients by
returning incorrect attributes during an open call.
CVE-2009-3889
Joe Malicki discovered an issue in the megaraid_sas driver.
Insufficient permissions on the sysfs dbg_lvl interface allow
local users to modify the debug logging behavior.
CVE-2009-4005
Roel Kluin discovered an issue in the hfc_usb driver, an ISDN
driver for Colognechip HFC-S USB chip. A potential read overflow
exists which may allow remote users to cause a denial of service
condition (oops).
CVE-2009-4020
Amerigo Wang discovered an issue in the HFS filesystem that would
allow a denial of service by a local user who has sufficient
privileges to mount a specially crafted filesystem. Avati discovered an issue in the fuse subsystem. For this to be exploitable, the local user must
have sufficient privileges to mount a filesystem.
CVE-2009-4536 & CVE-2009-4538
Fabian Yamaguchi reported issues in the e1000 and e1000e drivers
for Intel gigabit network adapters which allow remote users to
bypass packet filters using specially crafted Ethernet frames.
CVE-2010-0003
Andi Kleen reported a defect which allows local users to gain read
access to memory reachable by the kernel when the
print-fatal-signals option is enabled. This option is disabled by
default.
CVE-2010-0007
Florian Westphal reported a lack of capability checking in the
ebtables netfilter subsystem. If the ebtables module is loaded,
local users can add and modify ebtables rules.
CVE-2010-0410
Sebastian Krahmer discovered an issue in the netlink connector
subsystem that permits local users to allocate large amounts of
system memory resulting in a denial of service (out of memory).
CVE-2010-0415
Ramon de Carvalho Valle discovered an issue in the sys_move_pages
interface, limited to amd64, ia64 and powerpc64 flavors in Debian.
CVE-2010-0622
Jermome Marchand reported an issue in the futex subsystem that
allows a local user to force an invalid futex state which results
in a denial of service (oops).
For the oldstable distribution (etch), this problem has been fixed in version 2.6.24-6~etchnhalf.9etch3.
We recommend that you upgrade your linux-2.6.24 packages.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.dsc Size/MD5 checksum: 5118 e05bb21e7655cbfa39aed8d4fd6842eb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.diff.gz Size/MD5 checksum: 4099250 127bad8d653046d37fc52115d4e3a332 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af
Architecture independent packages:
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 4263554 6c56ff077d17eba766af47544ce0f414 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 83890 62cfd18ed176359831502e70d80b291a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 46871628 328ad30d3c07f90c56d821f76e186b40 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 1550090 1f114fdc3123f135017dbdcd0e4839c6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 1009878 c7b7abff092940a400703b9168e46daa http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 98248 a2a391008f8855d8358d5f18d9d76044
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 329786 a212d2b3a94f8a04611c0f20d3d324b9 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 27236282 b5bc553c4bf3a49843c45814fab72443 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 83428 f5f27b9de4905239e6315c77393f1f03 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 83454 5d152b5b6aa505982ebc7122a770b29b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 26641900 c799e7d48937975036b46edf032ecd87 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 26620162 eb1c3c27f1ac81959dc0f2ab497aee35 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 3455268 da2d2cc2b7c4253ac408c30fcfddb28f http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 329788 f589f8815f7adf02f8884e2dd3ac613f http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 329336 14bf085655b30adc8ab8f6ed4207d415
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 19482308 c49d2962c1a391fb00fb1b5f0598b24e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 3656476 f2f5de65037664d03208fcea83bf2ee2 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 83422 600c7216143f43f9c61b0c2ccd118ea0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 83434 36f1d8f21ec39a473536dbeda2332e62 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 346940 d3f12fdd61f90749fdd08d857b326327
arm architecture (ARM)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 9357734 3e1165a0795d7db5f7ed8ef84205064b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 298744 50d8bfa3c06134e190409399a36c5aa9 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 83546 1742ab93afadd1827009bf1d714e76eb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 83578 07906e33f9ad267d986991c93eef1048 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 10778670 cc38a718ad5fd1c6e92d23e416610bd6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 308138 34dbc7720b1844833f0b71aa307c37fa http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 310714 6a2c6fbbc1dd000b8a532227e3b8b5ae http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 3939512 91c2ba626e754fe407d6dcf3fa01337a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 10786892 4d44a4ff751969855a01ad754a7c2b22
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 14375048 fe6ed4dea09aa205d801476667ef03cb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 13847788 4adc3106a987d84e12215156a379f460 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 259624 ac09dcabb624984b7321a5f6b6dbef54 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 83578 e152e18748e5c80b6d06715db836cf83 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 260838 44bc8ad5796c124b53d85a8c3a4ed912 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 262420 ff0641f04c409dd606c34373e8e16269 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 14830990 cce09e8022bee915dcde5dd8b9525428 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 13333594 a4dc863b0c84b9006c723db9a581c92e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 83546 990eb24056c7f6a63a4d55ec39563bae http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 3446386 6ebfa4544252648df48cfb085cc3d2cc http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 258962 75184bed1f0b42cd8e002f93ed42198a
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 3656680 c5499cb98cdcdcadc48e3aa5bdf1d379 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 19214268 e3f564cae5a85355f4b5a9248a11af98 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 19148424 dd1d713c896888370a1667a16571c08c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 346982 6a6a08f74f9690705e6d770d1f3f2566 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 359548 b10fe011746b0df5fbd2587292af34ae http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 19482314 5d9cc150e340aea40e253a757cfdc423 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 83452 32a1614212e964a4423b161b34cd758d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 19213598 4f459c2d2cdb87a6f945cbee7d4500d4 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 358212 58ba32b0701643f043ab38a487cae609 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 83424 c1e8493aff96df5b0fe33f5af4686f98 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 358752 4e3e9ef18a14fd191444591df571f80c
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 3569470 9ae824064bfc785f4b3512db78119e46 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 32206374 badd40dd68e2c6634c65f79d9536e34d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 83432 64a48fa9283b1741e22f0a22dbb93b20 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 83456 235a5572d5e109a4b575080a8262dc57 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 319938 d7dc0120458e93119879dcdd1e48017e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 32025762 7595d7dc21d3273f46b35b8c00b0e195 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 320226 34731a37b519d726b133093e04d937c3
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 22243472 532341ea0847ea19414413f7659ff13d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 248638 ce9da5c377d6328e9bb9be1c3945fff8 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 12001172 817c44fd5afbeef1b9f172522ff21bcb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 10553972 20ddd95631b93efd52ae0aa38a5cd6d4 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 83600 a7b66d71779dea207a3d49cb9f692fdb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 27858364 54998117445c20f413331d1197355745 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 17212542 bf6c996fd387eef151e0db60d1bd00f2 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 313302 314b57dc807eb91f617c10b1497e1617 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 314602 2c127076bf189be2836a4c3a4c7736af http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 3804368 fbcb3bdd668db166ad3f08e6dbfbc6e0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 17194888 9bce41a8b9936a16a3aa9cca675b9638 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 83540 8acdb1b4a4bc57f55b9cc5b2b04043a4 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 229412 0b93c7c909eca04fad4fa45e3e73e96c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 248700 13266a2acd5fcbd75d11049dd5e5ad58 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 218314 4174dec1c73ca114469cbb88fba32926
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 16567710 29d2ab68b4259a1822a2ca19e9494f5d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 309868 d69b27ef946f2ac62b115e0200fe8002 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 26988356 f0d885b353b15dc42e4e76da8a8fb129 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 248150 7c585f74e0752a631050b13b9740c0c3 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 13318088 0b0a8b724245ac10817b03c4cf734827 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 83484 a678208f18017a9c87d45548916fd98e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 311392 5b1f0957a2756b04be6c95ae8ca5e2c8 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 21736368 02da1a4e543b8c5082476b156281cb31 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 247968 929ca712a0aa0984f9dc2a6f68f405a5 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 16632240 c9de1dfccb8a5cb5d5d652ca694a7108 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 3805532 be10a8b64da3adf7ece3846b0b0bf930 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 83434 ac0cb9b5939e4ea82c3c83a1a1d473ed http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 248174 50e84058a7d710f013f92e1fe68a705c
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 322474 2d7e39cf0b78d98125a0baba377f1af0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 19195556 bb2bd8e203cee7b3c6739d5c5d11901a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 324008 3b021bb4b3dac72dc68e701f4a209939 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 295928 ca2bf1c3c12f409e469c516877a8e91c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 21170062 4022dbff73ebfde3a846ce38896cf09c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 322502 4b76cce255e1fcc72cb82053cd34a1a2 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 17459240 ad749c6e735e58d775b7190ff3d26e50 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 83466 a041c0fdb383832cf725723ce22e40c0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 83430 392d415932625b1a69dc6494d2f737e0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 3674486 200fdcca2140a97f961a37d70db620d5 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 19487244 b42ad8431643d89a1f8b0e6e0aaeb39e
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 83532 a1c34683fe304f1a86bbc28f6cbc654c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 83556 bf7fed1ef4da92d782409fe8345f861a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 6976486 5b5db16fea4336068bbcd5bff56ad575 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 7228452 75c044fa17d6071de36579a1491c2e1b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 3431908 18825f85900faca81b21e48d43af6ee7 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 197006 0a44248e77ec1ff027edd032ebe5b2c6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 1503494 bd7f7b7bd4e120472bf60ad0b7d9184e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 196810 f03114c2f256a97b15f88d2659f9501b
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 83428 1ea7179752fbb45e10e731991583db68 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 263546 ef894d6917cbe692ec9197048538d5e7 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 3651402 a0194c650712040f81e97d5b3b62bc79 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 264892 0b642e20f00b52c20b6ae9e0ee1f78b8 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 83442 6d109d7f131dab564736e2ac6a85dd29 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 13318532 dbce062bfa560c331b75bed073868e1d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 13019464 b0b153fafa43b650e996a9d84bbb26d7
These changes will probably be included in the oldstable distribution on its next update. =========================================================== Ubuntu Security Notice USN-894-1 February 05, 2010 linux, linux-source-2.6.15 vulnerabilities CVE-2009-4020, CVE-2009-4021, CVE-2009-4031, CVE-2009-4138, CVE-2009-4141, CVE-2009-4308, CVE-2009-4536, CVE-2009-4538, CVE-2010-0003, CVE-2010-0006, CVE-2010-0007, CVE-2010-0291 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 Ubuntu 9.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: linux-image-2.6.15-55-386 2.6.15-55.82 linux-image-2.6.15-55-686 2.6.15-55.82 linux-image-2.6.15-55-amd64-generic 2.6.15-55.82 linux-image-2.6.15-55-amd64-k8 2.6.15-55.82 linux-image-2.6.15-55-amd64-server 2.6.15-55.82 linux-image-2.6.15-55-amd64-xeon 2.6.15-55.82 linux-image-2.6.15-55-hppa32 2.6.15-55.82 linux-image-2.6.15-55-hppa32-smp 2.6.15-55.82 linux-image-2.6.15-55-hppa64 2.6.15-55.82 linux-image-2.6.15-55-hppa64-smp 2.6.15-55.82 linux-image-2.6.15-55-itanium 2.6.15-55.82 linux-image-2.6.15-55-itanium-smp 2.6.15-55.82 linux-image-2.6.15-55-k7 2.6.15-55.82 linux-image-2.6.15-55-mckinley 2.6.15-55.82 linux-image-2.6.15-55-mckinley-smp 2.6.15-55.82 linux-image-2.6.15-55-powerpc 2.6.15-55.82 linux-image-2.6.15-55-powerpc-smp 2.6.15-55.82 linux-image-2.6.15-55-powerpc64-smp 2.6.15-55.82 linux-image-2.6.15-55-server 2.6.15-55.82 linux-image-2.6.15-55-server-bigiron 2.6.15-55.82 linux-image-2.6.15-55-sparc64 2.6.15-55.82 linux-image-2.6.15-55-sparc64-smp 2.6.15-55.82
Ubuntu 8.04 LTS: linux-image-2.6.24-27-386 2.6.24-27.65 linux-image-2.6.24-27-generic 2.6.24-27.65 linux-image-2.6.24-27-hppa32 2.6.24-27.65 linux-image-2.6.24-27-hppa64 2.6.24-27.65 linux-image-2.6.24-27-itanium 2.6.24-27.65 linux-image-2.6.24-27-lpia 2.6.24-27.65 linux-image-2.6.24-27-lpiacompat 2.6.24-27.65 linux-image-2.6.24-27-mckinley 2.6.24-27.65 linux-image-2.6.24-27-openvz 2.6.24-27.65 linux-image-2.6.24-27-powerpc 2.6.24-27.65 linux-image-2.6.24-27-powerpc-smp 2.6.24-27.65 linux-image-2.6.24-27-powerpc64-smp 2.6.24-27.65 linux-image-2.6.24-27-rt 2.6.24-27.65 linux-image-2.6.24-27-server 2.6.24-27.65 linux-image-2.6.24-27-sparc64 2.6.24-27.65 linux-image-2.6.24-27-sparc64-smp 2.6.24-27.65 linux-image-2.6.24-27-virtual 2.6.24-27.65 linux-image-2.6.24-27-xen 2.6.24-27.65
Ubuntu 8.10: linux-image-2.6.27-17-generic 2.6.27-17.45 linux-image-2.6.27-17-server 2.6.27-17.45 linux-image-2.6.27-17-virtual 2.6.27-17.45
Ubuntu 9.04: linux-image-2.6.28-18-generic 2.6.28-18.59 linux-image-2.6.28-18-imx51 2.6.28-18.59 linux-image-2.6.28-18-iop32x 2.6.28-18.59 linux-image-2.6.28-18-ixp4xx 2.6.28-18.59 linux-image-2.6.28-18-lpia 2.6.28-18.59 linux-image-2.6.28-18-server 2.6.28-18.59 linux-image-2.6.28-18-versatile 2.6.28-18.59 linux-image-2.6.28-18-virtual 2.6.28-18.59
Ubuntu 9.10: kernel-image-2.6.31-108-imx51-di 2.6.31-108.21 linux-image-2.6.31-19-386 2.6.31-19.56 linux-image-2.6.31-19-generic 2.6.31-19.56 linux-image-2.6.31-19-generic-pae 2.6.31-19.56 linux-image-2.6.31-19-ia64 2.6.31-19.56 linux-image-2.6.31-19-lpia 2.6.31-19.56 linux-image-2.6.31-19-powerpc 2.6.31-19.56 linux-image-2.6.31-19-powerpc-smp 2.6.31-19.56 linux-image-2.6.31-19-powerpc64-smp 2.6.31-19.56 linux-image-2.6.31-19-server 2.6.31-19.56 linux-image-2.6.31-19-sparc64 2.6.31-19.56 linux-image-2.6.31-19-sparc64-smp 2.6.31-19.56 linux-image-2.6.31-19-virtual 2.6.31-19.56 linux-image-2.6.31-211-dove 2.6.31-211.22 linux-image-2.6.31-211-dove-z0 2.6.31-211.22 linux-image-2.6.31-304-ec2 2.6.31-304.10
After a standard system upgrade you need to reboot your computer to effect the necessary changes.
ATTENTION: Due to an unavoidable ABI change (except for Ubuntu 6.06) the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.
Details follow:
Amerigo Wang and Eric Sesterhenn discovered that the HFS and ext4 filesystems did not correctly check certain disk structures. Ubuntu 9.10 was not affected. (CVE-2009-4021)
It was discovered that KVM did not correctly decode certain guest instructions. A local attacker in a guest could exploit this to trigger high scheduling latency in the host, leading to a denial of service. Ubuntu 6.06 was not affected. Ubuntu 6.06 was not affected. (CVE-2009-4138)
Tavis Ormandy discovered that the kernel did not correctly handle O_ASYNC on locked files. Only Ubuntu 9.04 and 9.10 were affected. (CVE-2009-4141)
Neil Horman and Eugene Teo discovered that the e1000 and e1000e network drivers did not correctly check the size of Ethernet frames. (CVE-2009-4536, CVE-2009-4538)
It was discovered that "print-fatal-signals" reporting could show arbitrary kernel memory contents. A local attacker could exploit this, leading to a loss of privacy. (CVE-2010-0003)
Olli Jarva and Tuomo Untinen discovered that IPv6 did not correctly handle jumbo frames. Only Ubuntu 9.04 and 9.10 were affected. A local attacker could disrupt network traffic, leading to a denial of service. (CVE-2010-0291)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.diff.gz
Size/MD5: 2928444 765d0254f54d27d447de8f0b39548848
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.dsc
Size/MD5: 2921 682576890de917043eccf6fc9398aed2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-55.82_all.deb
Size/MD5: 5170062 ef1a9c95890c4ba600a3e5523d49bb59
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-55.82_all.deb
Size/MD5: 96386 b184441d2f44037554d037d217688393
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82_all.deb
Size/MD5: 44742098 b5215eb163e357a179dbf36169ae1fa2
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 22350 d8934981c2fdd09168a5e576cc1b809a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 44768 74be7582e8f82aeb48af59731ce128be
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 2312 d464c76f98a4142add7a69aca1305739
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 36294 a65060e99feff7e2ecef38be6d92fbc3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 102366 04d59c868ce03dc83b69116b022735b8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 38892 e80a653bb000e86f38da594d4bc1742d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 49160 a512718368004f81e83063ea8972c871
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 176612 81ab4c185b3af1dea1a082283c1ec9b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 36776 fcb0833daefa645545a2451824094b21
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 142346 3e6446140bfad0b19c512c69377d8026
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 51060 a11ceed7ccb1b96c2a8b2e7f840061b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 140710 e1789bb9d7cdd542a862e8ef209de802
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 287606 f3cc835959f215c209dc5a825596849c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 97828 05627ddbba40a6517ae7f8ca75f195c1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 1652102 c9eea2df3fdde2a5e7d2f4dff99e6772
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb
Size/MD5: 872314 6e8f80e117e13665c95fb75593853d49
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb
Size/MD5: 872448 1a70a906bccd7642241535f79feddb57
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb
Size/MD5: 874570 0da9cd27666b58b5328e18dbc01c9b2e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb
Size/MD5: 872194 375aad441654cdcd2338c5809e6319ad
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_amd64.deb
Size/MD5: 6926870 c5868857ae3e12da5ffd91ec60d75501
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb
Size/MD5: 20817720 06e066129d82d4fa8e41a2a058dcb9f0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb
Size/MD5: 20798158 1e5bf064dc2aab9880b30448d06eba9d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb
Size/MD5: 21635636 0bb9fd3f753b4dcedf70fa8f36c48467
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb
Size/MD5: 19905244 a04e5f6463fe334c28598cbf13506043
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 15630 8d1da510f959f7b9a2d0aa73ab80ae39
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 240360 20cd65fa275cfe8a83743ddb5a95f528
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 202666 71d8be83541874d6c675945838b9e223
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 1048610 9125e9e6c294bb450e37643b3ed7397e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 1543634 ff7af4dcfc269a529f0adef3823a7244
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 161692 5623fa9ad6b280d0a5271917e89ca8ab
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 9832 bd5218587371f5b309ef2d1f77f98420
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 80870 20f034d6199d2902130f8bba12f48afe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 49294 e4a805200acaaea274e67995602294e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 35158 0869bee234a54b1afe362123606efe66
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 70890 74ad81f0209c505c41d61c143b90f879
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 6218 ab28cdccb61315cac14d9046821e264d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 9060 6b179cd944eb7f83f03147e09025e6be
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 57924 5465064d051dec863ad3f4f1a91553f6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 123380 18eabdae11c2d77a1694f0cd467107a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 101078 efbe32714c0fed5aec8a70095af299df
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 79272 2fbe8585b11e0fa73fad8e94298082bf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 1595398 3e11b94ed4701d1d84b6aeb303782d97
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 72352 e413c3057779de1b3c8f0c4d8d7fb577
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 12648 41487d8dc828d7f94a5c8ed495f06a99
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 33806 ebf707126fa6326899d648786afa8779
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 138512 ff1e0d4f0e9c5efc7bbae4d92194da5d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 38938 75eb074224a6373013e621cdd5931a51
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 278876 1586e5c6fc3fedf7f63f19c35a4fd9e8
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 18976 940a7c03cfe47e9d0543f49849c8765f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 43482 466c625f614e3624fa548bc5f96efa74
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 105216 d45ce18fb4d9c2cf5da6d14ae69a86c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 2284 de2293fa5c6e5493307a1913b606ad20
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 34572 4e302b4f7144fd504b2475a4103a3bf5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 97044 eeafb6c943244dd33659e7e7db9a9f76
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 37128 d4d67e516f236bf54a00697b71a3219b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 44122 1657e3520cbd2fbc832cf91bd6366a38
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 167738 7431ddaa7c8f0c9b6e583129cdc839f7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 33954 8251d509fb9bacd314f62cc90bda5b96
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 137972 9b8295fffc47ab4cf16ec34f7ef8b7aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 46892 c12096744faa1ca0735b62ea045b0c65
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 133162 5805bb2e2bfab6158d8d217b08079cc2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 273806 be7956f256f494fe4f40e7e7129bdcd7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 102330 d6a81f9c342c0ebe2010b66d4a7c59ae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 1597678 ab989d0c749b837c67a2a839f139fbb2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-386_2.6.15-55.82_i386.deb
Size/MD5: 863294 c444f51c8b2752c6a7bb7e6890917ae2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-686_2.6.15-55.82_i386.deb
Size/MD5: 862506 1508b314277964abb0d05e8a274d2a26
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-k7_2.6.15-55.82_i386.deb
Size/MD5: 863628 69ee54c68825997e29779c3a2ab66625
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb
Size/MD5: 866414 fa045eb17626dde56b96d70431e9515b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server_2.6.15-55.82_i386.deb
Size/MD5: 865826 30916e33e56490d9a2acf31c03690e64
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_i386.deb
Size/MD5: 6918500 a2bb7aa892eb2d21ea3d04f519b72482
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-386_2.6.15-55.82_i386.deb
Size/MD5: 21724666 e1390cea2d5e21dee938aaf3f88786f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-686_2.6.15-55.82_i386.deb
Size/MD5: 22516786 35a5512e74cf490346c35fd56f695fca
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-k7_2.6.15-55.82_i386.deb
Size/MD5: 22265258 07155a925272e66ace552f82d16b1b79
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb
Size/MD5: 23626692 d229112410ce8c9c9947f2f7cd32c883
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server_2.6.15-55.82_i386.deb
Size/MD5: 23179552 9b108d16a1fc1716b78c4417150e311e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 15512 4a2a37534dc2bc6b0ce12df135d07105
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 238510 544c418a7426a5248e33ff549c6f4035
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 197134 9ec57cc477f5bc4e0dba11002d3988e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 1048370 cd87ff58b5cbea9c04eac21cf1b0784c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 1741406 0b97758852f283e148ec2ce290e678ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 160884 ce6d2a16b8a3af5706b694fe6f8ac4f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 9162 d5f4619ccc32c2ed8296823cd3c19e3e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 76468 9f0911cef3a4b7afb14f1bd537ad337e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 53554 afc415fd0a28c363579986fc48464671
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 33048 c710f55e8853bec0935df3338f2370c2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 85618 b6ed96be15afaf31e6670a78ff1f4733
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 6024 b0a622b932e40a7011d5e9ec9bd21eb3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 8762 6234ceb3aa1422433ee60ad4305c03e7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 53636 e1a35b8801fb949295040028cd2cba5e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 130970 25d88aae6168f72c58ca17584b3f83e0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 98468 ddb974591a687460f50c26a2e2682593
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 77212 a9ec9f2fe551ec07e56200b26f1de4f8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 1768830 477e2985e9f1fd2d4f333d651ce07e2f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 69612 2547b29a65a8391d3a085bbf2ce476aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 11764 88566d97534c428d1ef6b01b5adde2ab
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 36102 10638cf7adf98d9afcc1e1475dbaf05c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 132672 fa6f13f8c0c0d017f50dc160bf2961fc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 38578 32976528861368cdb936d5db4fc0c2b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 299158 458051a07217501718f6e2a742bec0a3
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 23726 0fbb9855c5833cb24187a701c10cdfbe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 26006 87108baca7e8450f580be0f6c77d95de
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 49328 c6fe9fa1f1e132f4906b21e555bfb079
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 51536 d2c7a02ac033097208c359312e95d246
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2308 5b98b064d0e5c18d8c32caa86b2e43e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2482 3c964c577c93d80cee55d06e78003951
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 40306 ad5c5c36d7dc08add999f8cf47d53b72
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 43848 0cfb559dfe56e4a50c99537f98392827
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 112606 9994a8d2bb1c9a45cf43416faca7f9fe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 120734 092bb2c1dfcece144429a277f96b56e9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 40906 84f84dc75718a347eb6623204cab6209
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 45996 69f5b1a8a9e82414d868ae459109f32c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 29024 1a12ad8c384bd5195208ce7eb478c011
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 29892 4a807f384985ae3376d509474716f13a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 211398 2e302e02bf08226ad9bf45c3a04840b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 225174 0c4edfa7ccdb502d5aefc7b02a2e81e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 45054 a2373aac90339698b2cba11e43978565
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 40220 06b0e3234fd6b0125df72fc04c4d0562
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1934 0887612df6acbc867949c33251427c00
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2198 d38a4ec22579275ff2f48805be734356
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 80760 0a71c80867de5b11bd73c9c6d2751448
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 86134 0531dff0f43a6073ae4e71e93e1d77ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 111580 ab42bedd2a1e1687015d5b6b4b327484
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 125734 3c526ccc2348c1f6dd65829c96fb1381
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 53412 13f7a9a412c8c38c4a22a0f4db2a2bd9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 58486 0a62b4bc8aa5f594de9efc6b9f1dec6a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 147964 9751a30ed03bc5bde2b48be1e5dce6e3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 161908 70564b18529d383509cb4c1d4898425a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 318412 7944aa213ac28d37d390b48b3d5a9a8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 288032 2b93681e1b268517863ee4bf27ba0899
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 115862 3cd4a494b7d9652bd77eb9dda6d2eeb9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 116548 a40033c7a63dda0aa5911caf2dd7f49a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1925072 2c1fefed78a6ebc795887a2f27c9db4e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2449126 39606af1d24872f0ff053ef5ddf790bd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb
Size/MD5: 872990 d1ced46d4302cb78b2d47c5ea678d6bc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb
Size/MD5: 872596 8602056ab95806f02667587737cb3b59
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb
Size/MD5: 865624 336f5e63d1fc8a9f55e7e36f4177f54a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_powerpc.deb
Size/MD5: 6947694 9ab99966a30e44788549998ae0e26798
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb
Size/MD5: 22783922 2c7ace12a48de978cea2e7e939c3c900
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb
Size/MD5: 23693062 18b76996711d54f91edd68a52b45d666
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb
Size/MD5: 22365356 f8a73866c9b4334ace774f26ddaa0e38
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 17782 6a4cc5fc57579f3f602f582acb1231fb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 17386 1abc2376b554610aec23e87f60998358
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 261350 a2a6eff082f29827c9505b45dee47f7d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 282620 93ef7729a3cc9f4639e9d34c8782d8c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 227808 73c5142c206284bb244b59586a93d8b6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 248952 d0c1d09bb0b125ae113a70baa7a06cc0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1048470 66d28a86b670f1166faeb1c25a1547ad
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1048600 178ea75b2bd02ef3b01c4cf940b6a713
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1738490 8fdc1918d06d76e358e7645e24d763b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1878020 0b6e4cc3971bb034e26a3aee110cbc58
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 250814 c48a5e0837fa30e3b1480c113c02d963
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 233524 676bf7f8905001fea721689f23ae5f6e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 13054 73a21ffbe4470fe4108886ee20990c35
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 13528 1105da0ce6deb9d13a19e8b6398827db
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 84794 ccbc384bd76aacf39ac078437d709d51
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 52204 acd012d94fac6fd62028de4920ff5a67
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 73922 a2d1c6a539934c1a852cf0b2c56ada43
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 85854 59c8914383ae0624690950d8f844c101
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 6624 b926e6807098f087b5eab77015ef1aee
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 7058 43cb29678a86a4ace2a784ef2c2e8843
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 60378 183583ac6a0ab738109499861a861ca2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 70420 da9263ada0b850362f022c36b6769f22
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 128550 5eaff599374f099cbb06bb709f1ce68c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 157944 8ef2e5efb4749e8e1725c58a185871bd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 108166 1a09b1fb98eb414ba847dc8634a28a62
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 126130 e2ae3a3d5d06c8e6a5394c2262381438
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 87294 610a552fd6a9c960f64c8ed4a74c5b39
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 93362 a7434712a48c99eba3cfd1dcdf4db489
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2014708 a089ebb3c11c6fd25f65c069adc4f1cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1988690 049558cbf765292686c49fc8e180ca0f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 104130 cfa3ef8f4085a002160c319cdc9899ed
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 115790 ac0661102201e3f682eda1052d987671
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 12738 f683a291e68f38a5c2785aed5452f77c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 14444 24e22f4de6be23c1fe122e8c3dbdfdc0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 39950 b8aa9421b4aaf324bc7349b026e3c30e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 41540 c174de599d57427fbbe0544bdea28cf0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 149344 f742184c85574c83ec84aa70cb9cdfea
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 168082 6f375034031b861fe42ba973c9390ded
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 42310 e24ddfc7d97416cdca5325a9ce197781
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 44918 de0152b64cf3da754a73ba952625e15b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 320326 87594e9f43ab0dff57a8ae731be77dfa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 324872 a53f9d6f2e8118894b3c5ee8a98b7441
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 50476 aea13d5d96a87d5b3a0cb897605f8226
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 2358 b0af3cd8de1581e95acdba1dd91796e9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 40380 c083f0781fb33b64329d10c233affde2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 110556 cea10ae3446945f5dcc6b94a8050b4ad
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 41214 b0728ed58d1e1a5bcc4309849d773e91
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 104224 54844dc4f0225e051453b6a01934edb3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 7438 7cfdeca11c465cea2c2e8d768b39969e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 149304 958f0b630326763cddddce5503f3319d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 1712530 f967805acb454413bbcc2f377f5b3e36
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb
Size/MD5: 773010 979da22c264d122841ea140319b365ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb
Size/MD5: 772604 3106b0711e0e311f93d92624247f1eea
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_sparc.deb
Size/MD5: 6964184 fb615cef69d2a79b16cfda4b67bf4e50
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb
Size/MD5: 15017856 479231852577fdd0e402556287a02059
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb
Size/MD5: 14831912 1bd18f6f1ccc6b70379e267a0173b9bb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 7436 87e52fb1ba93a9e9763a0f3984bc15a5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 248758 bc3db8ee9c85b0aaf1ec03290ae41cf3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 212566 70a9e482f9be5074d90bbd4ae5cf1246
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 1048480 c535170499441feef6ef8b3062de2d30
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 1482394 247faeb24ed7d02526dc54dfb194dec4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 10118 28a82b2b4d4934c028952b17676d515a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 40178 d44c9cb160749b87062ff38c0fc11340
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 9370 c7d50aabcba6ff111825da92f10dd219
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 61398 df892cd2f9e118248246eb7d3c273df4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 163276 481deef18ee50e039791747737619c3e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 64096 9ebc582fc849cdcf71ee887937313a22
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 1235396 479e0c0baad9c8cf96fe44603c2fb9b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 59308 83efde441d0de3f09bb163e53016a300
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 37430 3646c295a3bbadafbe6df1fb22d8391e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 280132 311d2d465db827f3e3f2e95bc265ddb6
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.diff.gz
Size/MD5: 4747158 57102623f2993049cb4d309f75748b5f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.dsc
Size/MD5: 2689 3d66528dd1a11628dd0e2ec5fadfa2b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz
Size/MD5: 59085601 e4aad2f8c445505cbbfa92864f5941ab
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-27.65_all.deb
Size/MD5: 4930936 41797a4c4537dc9e4abb06f5b811a6f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27_2.6.24-27.65_all.deb
Size/MD5: 8146690 ea0f32ddeaa300bc68f90838a6466257
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-27.65_all.deb
Size/MD5: 99216 bec450b038c03760a6f369323af1a0d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-27.65_all.deb
Size/MD5: 46970850 cadaea7041848682d5e46a181aa43fb4
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 28614 de37ceb847d7f811723dee03e7fc9ab9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 224184 6b392a2ef779b2048c78f46c1e833e2f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 52646 2c736bab70f1efeade320f9062b74729
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 40644 a6209cbd666c38e1c4bc75115fda79f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 48646 6affd584126a9ecd4d3560dfa69a201f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 86332 097b613836ca5101cd37cabfe7299adc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 36316 f3915273cbd0e4a218a543ac525d7674
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 648728 9021fcdfc468efb5a2994dab918aad7a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 209928 967a98f6cfa9c56dcecbe0872e98b617
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 39194 5ad172f156b5e2ba43fee3a69a09fb49
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 67996 9ca474a40f4225116d7d9befcde4dbb5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 145458 3e087634d61556643c32e342214a0642
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 287262 202933f0bb0a3d09ae278a991139eaf1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 2130554 f0a40b4f0002803063b074d4b2b22775
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_amd64.deb
Size/MD5: 673974 3ee01bd889b29b761f96eab35f839815
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_amd64.deb
Size/MD5: 1252948 e0734c904a26acf9daadc8dc13a5331c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_amd64.deb
Size/MD5: 1274832 4784ef460e510677dd0c62ba0e5d75a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_amd64.deb
Size/MD5: 674092 b2b2090661ff113ec00e1b08627238c3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_amd64.deb
Size/MD5: 1084370 ef5cd734b586855f7b94d5b93bb51c42
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_amd64.deb
Size/MD5: 17809172 46d4f01f3cb62fc8c006c25d291bdbde
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_amd64.deb
Size/MD5: 17781410 589743282c76d9ae95751cefae7dcd1f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_amd64.deb
Size/MD5: 21055946 71c5ed78b283260aa76abe43a5199869
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_amd64.deb
Size/MD5: 21440010 76e220b0a64e1b1fb76a54aaa5cde808
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_amd64.deb
Size/MD5: 707586 4d51f71c8ac5227c9f02fbc0c6552453
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 263678 73ef23d338fe298802ae13ea52af05a1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 176420 0709db4bda579f5146063e7bedeef8cf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 254102 7b20912de5e61b0206319019c4800ef1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 1641364 98d7399720bae5a9d3e1637cc6f13ce9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 143718 419053c97211aea3dd9b2aa0833bc6bc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 164466 16e2d4ad08a10d9e9d2b33dbee4c08ba
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 115858 74f2c34acf328f485356f38e86eb6aa2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 35056 5307b10f96b76f43c0bf983007f36021
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 64412 7cf4750ba6f0dd63678eae705da55fbf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 69706 dedcbc58256ac2a43ed625eb7cae6e81
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 21598 6d6c27b8756a70466451449e096bd149
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 8622 4414757aa7034cafa1e98d8bacf080f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 57232 8690d6c34e1ec87d85b2c20cb280acb9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 103044 73c875b66060da7f1d39f2a5f8eecf36
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 1212518 6e237c8e863f3cea5cc702afbd925b77
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 45500 1883d8bdf4ed7b2aebc1a407502bd556
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 12780 fa12802bfa4f6847c5409d4882e9aa9a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 498032 d5e81ea5e16357ae1be8c0ac77685256
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 75048 24c6c2fa1972611542270d68ccae59a6
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_amd64.deb
Size/MD5: 19256730 d7f5e8ae9464748ac2a6dbc46ed9f1c1
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_amd64.deb
Size/MD5: 17909990 e4e3916570b7b5f06645d2623111b0ef
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_amd64.deb
Size/MD5: 18911564 fd71e9397f8919af683848aa456c885f
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 23690 ceb5d148f00965516252470b41d00b56
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 26794 50bb7020338de7d00265de0765578291
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 218818 a3b52dd67e9817d4e60d8b048f542717
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 220482 60bf430685f9b39568dbb078edf6041c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 51932 f708bc6cc86f313031745601d3d31aa9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 52068 bd20c8c1eb151b2b8d989d5081f8386b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 38326 aeea101daeed1f87bb30f67c4011d737
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 39080 b8fc6fd4c6fa20a8cf2a92e150a1b969
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 45990 9c06ca831da0f4183ef6e15af4e9b3cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 46170 8d8cb61faaaf267e135ecd2844afd195
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 83246 6941b39723fc655f7dcf2846e5c8a47e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 83662 d3f22aca87d23a99c75b3e6464eb22fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 32396 402518c87d72b3dfc41656de51ebaa64
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 32672 7135f346092b651dafed111b91aee44d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 637694 e32a7d7a367597e18b305f6d97b93630
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 655982 7e8f7f69c261eaa0ce58ddb865205698
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 209878 1ca7ab42cb7cd39e37e711fabaae8b99
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 213640 bfc69b0b0b29485a95605fe7e091dd5c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 46544 90ef4a74882d5770a3f7d888ba288b35
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 47602 e55422dc48484675642c96bdbc673595
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 62270 cc798227f68e2c8c1d8a54b03bf0058a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 63626 a2d3587a68e63d2cf90e1cd3790d1079
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 130538 c07adcef7438ef51821f9a8b750f7973
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 137028 068fdde4394c7850abba6ea81e69c801
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 279080 76c07612b0081c38122b1929c7f19f34
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 277690 c635d04d78592fe9792024e84682ccc7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 2012458 d372c1d872861cd7c84ea9d06c4e8162
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 2089276 69416120cd161789b598b2b93034db07
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-386_2.6.24-27.65_i386.deb
Size/MD5: 655314 4adb56a8d5211bba1acc02d76e9fb65d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_i386.deb
Size/MD5: 658154 7d6f7bccbf83f9a32664588ab5faaabe
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_i386.deb
Size/MD5: 1242098 c22eebab07e9ce3d85526ce2945da263
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_i386.deb
Size/MD5: 1262772 85fe04ee16e27b961017cf148c4f1d21
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_i386.deb
Size/MD5: 659870 a3ebd23356d57307d124b62faf3fc2a2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-virtual_2.6.24-27.65_i386.deb
Size/MD5: 561726 410d756762ce992d36864ce38efc2e1d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_i386.deb
Size/MD5: 1059932 350947cab60fcafb13483ab14ca0ff95
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-386_2.6.24-27.65_i386.deb
Size/MD5: 18380540 1da620cffb3b62617fc8213134b951e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_i386.deb
Size/MD5: 18401264 dd7b7991e7f843ebcae7bc5c8700636d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_i386.deb
Size/MD5: 18513796 c8b5dac38c445a72681bd5dd1c9a1f98
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-virtual_2.6.24-27.65_i386.deb
Size/MD5: 8730742 fc3305910b00833b509a4e34199e4a67
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-386_2.6.24-27.65_i386.deb
Size/MD5: 25540786 ce01c05207f08195efd8b88b83a93549
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_i386.deb
Size/MD5: 26356028 ed8deb0b2243fd649476c43d245a9690
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_i386.deb
Size/MD5: 27372622 d07e093dc192ad5a49be8c45b5c85dd4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-virtual_2.6.24-27.65_i386.deb
Size/MD5: 24872642 c28ebc89c9a427352186dea53d81ffe8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_i386.deb
Size/MD5: 707576 d26794effd4e857da1db4d28e9407611
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 258852 b86f8c37480cbd19131432c908013dd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 264136 631fc78981097e46ee5643ec3cfc5616
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 163268 1c98e7380c4f80c461a6181344914fea
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 163034 9cc84b270528d0fef36320974b415392
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 236710 755a3caeceece8650e46706804c6e072
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 244984 cc330be20f314b308aa0fbcf95c0370c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 1810274 169e24dc79c5fbde1ca1a2a5520286d7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 1827436 cf166d9cdca76a06fd78b1a0669ed67b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 150836 169c287e6bc754d02924a719d34aad29
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 143018 ee925199234ec977618a5c3c3b03954f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 156072 9ff98bc4b62d033785de95858201c353
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 157158 75cdc15de6d5bdc90e05789eb00fe29d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 107222 37ce3c67bd74d5040aa4d22223cbb486
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 108526 7e50df25fcc29d44c2cfdc3e5c046a66
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 32958 b1b4b1a1b95db3b09923a39eb42c28e4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 33388 860c1b56a45914246929757c815f5ec4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 60694 99aca1f49a5cd919f85ef1600ca757ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 61158 bbe05be947e606b614108423a7ca0b83
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 82652 8ffbf8ae116bd81b7632e2e3a58e0a76
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 82954 1532b447c1a1cc43d1cbf46b1e14020f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 48562 d2569ab07923f67de18ed6c63940351c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 48452 dcf73534ccf880da82f6ec8bdad54db7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 8192 2c3bac93f50147f7f67fffdcbb601b66
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 8444 375a2103e5890c501433ae5b3d912fbb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 51104 8d242482ce8adca7ec8f5d0a40c04c20
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 52950 8449d644f2a2455da01bf48922757fd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 92156 232f32e69ea0f4daf4a17ad68542e45f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 92446 6525df043e2a865a6eb646f015140e31
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 1443710 2746c7d1f27f2638dd6f141c5d7e68ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 1427036 d049929f20e6cbec8c7338977af873a7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 43240 53538a90e2ae8dae72a91a8aa79ecb90
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 42806 3b1d48b0e38b9acebe7581278a8e0408
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 11402 83264faacaa7ff9c249144d8dd0061b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 12016 7e17c39f818116eae09203af5f5dd870
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 470484 bede1d05dc08ab51105feaff29b39093
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 472422 d08cc1bf2e88df1908f35afc77fd696a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 70518 751bdd069d86773b5a3cfc67a09b46a4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 71382 3aa45fd7cdb245416c60a2210066a353
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_i386.deb
Size/MD5: 20248150 fad37a976e62eb5c73f906fd44070b5a
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_i386.deb
Size/MD5: 18543176 2f3a767f3505c51ebac878d921d3f3d8
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_i386.deb
Size/MD5: 18782962 8a5a3287d174aa7fd1cceb71be94f347
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpia_2.6.24-27.65_lpia.deb
Size/MD5: 639434 d3cfd21a90ea311f0b1efa2ac28dfac0
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb
Size/MD5: 705462 81a381fb023a0e0074d8cfaa7fca88b8
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_lpia.deb
Size/MD5: 707532 c6bf8f82d8bbc4e2320343f58629a562
http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpia_2.6.24-27.65_lpia.deb
Size/MD5: 14516344 29b153dcb44d72c1e5862191cb266c6b
http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb
Size/MD5: 19816106 947ff90add29d1fc18a69145f39341d1
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 334046 06512921aae848be603af54dc56f72e6
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 318530 4e8164b49e3ad90d33c9275bd1c7b45d
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 62718 e53308b729496be4a0e343535769c74e
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 73002 10bf1560cb8abc507ea079f6a495f91b
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 41442 a9d6733876fcf91a271eb189eaffcb37
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 47826 1d54194b81d12ac7b00b910f625f7a59
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 89506 1d66e8fc56eb6437f783cb677e6c7061
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 105746 034c14e0418581e1b8b56913246e96de
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 44824 5430e2953cc84d26fd0c8e8c4e323a92
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 40932 93dc2a167cf8ab1d80426dd296997295
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 704830 ef370acc49192e464ef553984e361d88
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 770960 ac691fac4ab28cb6d9627fa6b7a5b773
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 243328 b280fefee27294e988529239616e68fe
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 246310 c1d7e140ca2ba026b6a168c6c9748476
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 69160 665a09e07612701e5c6bc7efee856e5c
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 132586 f0e732beade4d5154e887aaa1b1f3625
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 70252 d8f056e2c9d8aabe9acacfbe4e6c9de0
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 77462 d69a84be1856d83b83faf1fa820803f6
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 146272 11a1d0911e3fda9667661975972e08b2
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 165002 c4276844b0ea79946508c0cd3a816541
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 387992 53b23049b6f79a9609349927adec3443
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 350468 694a94354856e10bcc935e2a7ba38a51
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 2431460 3a8171d7d1e7e6b37573c6679812d2ae
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 3473330 1037b52b34e3b26b05f68bfafb48850a
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb
Size/MD5: 652854 26483fb509f744914f646c49eb7b4d6c
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb
Size/MD5: 657530 98dd4c49966d886237bed19fddb84057
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb
Size/MD5: 652742 c9f225771751b175bc9a3d1ccb9b2b91
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb
Size/MD5: 20175388 98b77e06737b717f07a9f436bf292879
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb
Size/MD5: 21378902 be6b07df3db6828d5d795954b3ad3c49
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb
Size/MD5: 19948474 1a42e203300936a0a6bbd91270ac925d
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_powerpc.deb
Size/MD5: 697738 b5f3e2a2bf27249b08f44ca708c75305
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 266748 d71a805e23acc800f21449d312975e04
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 307732 90c6243c8802cdc121bdf92145f7dc17
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 192250 b114447f81aee3dfc51a3c40f2015d66
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 201688 94056840984e621b385099d261ce2420
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 272012 b6790aca1401ed43b8c04befaef9af51
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 306006 50b970f3b69d4eda6d3e59353c9db152
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 1807766 ec7ddb35df35bb103f7fa00168c827cd
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 2119612 ee4db3863509964860b0a24a9a6d5951
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 235186 b6a1a89f7279818e17cac5d5b3a8b86e
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 225404 baf5ea09bdbab57626dee3afb306a39b
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 170438 b6bae0ce9350745a5c5ba8d969ae34ef
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 199752 9d4225f0960410c78279f61aa02471da
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 117942 e88c2b968d47d71ef068dcb5abd4d9fd
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 139272 5f4576b20a9dc27976d521d0942ad0c9
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 45372 918120c1bd011bbbb8b95529c0978f09
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 46836 10f5de3e02406e28d373098a6613860b
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 51132 610f6b349ffcb68ca7f58dc7928a7558
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 60292 9b17fdf2d2aa9cbcfd3dbfb1bfc3af41
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 74186 053cc99e1839e95e6e48198a187c3e48
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 87220 b730de88a2ee8d0b1503d2ee30f13e69
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 76092 0a6aab3a33606ec7e97d474de29a47db
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 30230 76c4d08ce66715d75db459c89405a0fb
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 8486 80580934d5e5f6909c396732bedf2055
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 10030 4e52e0e6b321b919404ffa406ccc2da1
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 57438 24e1b5d61bcbe2b2faf9f31d9b6f7d3b
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 68746 1b541e58e95b8022b84e7d050db97ecc
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 101184 97ff0fdbf93ef2526b1a97b962592e37
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 147834 eb62d695f6da016ae938924414bd15ed
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 1565722 3bf6b2bd7ef98c403f8cedf220978814
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 1514590 307c47dc707e3c96384e6ce043c745be
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 76672 863a1d5aaef2e7d8f5ec43318a2b3f7a
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 85976 b6bedff825f704ceb1269488d698bfbf
http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 12702 cc2c9e83433b8f4092748b933292a46b
http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 14560 60c8e6f2c5425b8bfea2cbee00dd50c2
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 449632 ff75fd65c13af279e6652e0d09505887
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 504134 364077fbb2c074eb8852249a757b89ae
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 83682 bcafd92384fdae95293c310f83443303
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 108840 2254f5416b8a0cd8d1cd52a57d7a064a
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 59570 0a8a1c6f109f6620c74d81880a6836ef
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 71732 e29b3839ae80a5cc8b8ca1756569e0bb
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 42454 35c72663f93201098e40f0fc36232ccc
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 91776 d7f14f387c9d325ba87761a2da581b5c
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 587190 a4606a71370a3dec9dc6a3aba35ec115
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 171076 2f15afec1e2aa78035659ac46b010cb3
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 22356 aa2c6396604a45f318881df2e562f625
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 46058 5633652b0f71f9e2098ce2798e29269f
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 152976 d7cbf92b5ae85f379d0335c693ccc256
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 2135270 f05d76791e5538fa887f7731d170dc58
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb
Size/MD5: 565588 5d632e2a56604e4feff30e310f17f024
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb
Size/MD5: 563928 4b591c5db77c0f5bc41ffff32a14ee31
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb
Size/MD5: 14098262 0170c4f2c460270add65ba17eb7acfd0
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb
Size/MD5: 13830862 e4b6c695ad5b3e4ad0b428947b4fd388
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_sparc.deb
Size/MD5: 752654 6e9b50c2f72a60edf4df6e51d5448cc7
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 270064 879ee6667df636551d565e10ae5162fd
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 190360 388a92b9849a34e99f6a3d2817ca9b05
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 263030 82e8bd5f9f922af935f6f787942f4b2f
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 1386520 98436d21f7255a6c923b50900bd2de4d
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 175444 37239b1899dd449d5b4985163c46d678
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 122106 1b86f75278b7fab22bbffd2c0010eef5
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 40398 81325db98acd64573c100455f0cb5289
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 48060 dd1b8744fcecf5959d2dac4a23b8cd34
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 8698 a2a5a2941546e0137d8c57a38ba9ab2f
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 60516 08d388a60ac9be5c7d80d479f94fd4aa
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 106838 b350cddddb73537859dce8203c49ac1d
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 1002034 0756e59f467bdefbc26dcb06a6201457
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 9518 7bf2df83ac5364fef90bf13ea616e7e3
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 391514 9e98f9f4757387d261d6c7a1e8c7d61d
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 75924 b375f2838ce3f024a9f2b58d02f9d98e
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.diff.gz
Size/MD5: 3279295 99a1653c9f3eb96475ee9776faff3701
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.dsc
Size/MD5: 2761 3b7c2f9d1b970a69db9a1c2c2bd5d95c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz
Size/MD5: 63721466 482b04f680ce6676114ccfaaf8f66a55
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-17.45_all.deb
Size/MD5: 3492310 1dbaf1873425d41dfce3b359fc95728e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17_2.6.27-17.45_all.deb
Size/MD5: 5906568 e4cb3deaf39ad7c3917d33f0f1082a40
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-17.45_all.deb
Size/MD5: 52050112 2852d57c251b525e97d6ba66a94f1be5
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 36530 ae958becd299698d5f30f722eb07cde7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 265218 1de0174009daaf9e0d3fb8f8e737fa40
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 53438 46087922e5b4128b6a5f52dcacfbf840
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 43030 e25c2b8fbd4f46654a1ebc6089ef31bc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 52344 4c16a22c0fe8f2a967f1503953ed5f8c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 89844 4cc23c275cc1fd6621ac977881b91345
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 38180 24f5566a9c89334d394fb48d7c3d4949
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 677070 84220f4d0562b59edd2f0865120d4494
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 158618 edbaf560c5847b8f520ad94cd3f8d2d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 46346 90f299bb91f23a67e0811ae8e0472e70
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 154240 3ccfee605d2ef5a5e87aeb71320b337b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 313106 896f96e4eb01ff9381aaa78b6e1dc72d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 2604320 b50756ed8aeeee4a72873b8c60df10b6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_amd64.deb
Size/MD5: 663304 ef966b97630e8096fcf279d6c43b3960
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_amd64.deb
Size/MD5: 662184 599a4bf3bad78733d35ad1b4a5601a25
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_amd64.deb
Size/MD5: 23073032 96da11b5c1a75a1694b4047c1a71b091
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_amd64.deb
Size/MD5: 23071096 162a682066d9c7d90df92c975698b2cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_amd64.deb
Size/MD5: 10479836 39042ef6e7f9049837b4d137450dc41a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_amd64.deb
Size/MD5: 675844 3d711e518906ef37120bccabeaa1da2d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 434926 cc27207ed63847b17eab47e1978c98fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 186500 940e6b351f4975369720543184596a04
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 275594 b525586af57630fd8b4e098cef404ad9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 1810688 13f3abe5b38ff8a704c985dc8f3275b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 151324 d883249df4fb86d6d9d1146db5fa1020
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 194282 ee6a6162a8b0615e73a89978fcb9d172
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 168150 696ed64f02936c7200cc9a468302de40
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 36428 ff94b9ab68b2108fd9d1d2475c211725
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 83436 3dceac801e8b0405790e1a28c960183f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 71992 2b936af85a4eceb6312ad7ef93a18c88
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 23240 1d34a195f16d39f7895a2bf36281a6c8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 9012 454b1c03d70fbf4a917ff2431b6b4f2b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 68544 cd2e39978716c3448e54d6862877957c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 110302 ecb1005946c139f2340aaee3e80cd152
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 1276186 d93285c15892be57cfb76798c746f88d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 47602 d2039335dc8bb4104fbb473b5ada0d96
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 13480 5299f432e2db456a3e0743fd786c18f1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 393936 83cfaf207498b9a60d4e97cd21309095
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 200806 5dfbdf4ce61cbe469582c94509160a42
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 13614 c860448fa643364e8776a4947cff9714
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 33948 74da15b4b68dc6a03f2da65175b021bd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 244732 aee21df42a017731c52c53100cbf2f20
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 55398 f4d1c18a70aec1e3e39572c36318115c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 41206 42a8188a1ad868fa58aa779b31908d65
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 48698 7e06c0fbdb39f426e1259d35e8f1505e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 86942 49099dad48131ce191b10c154f096d6a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 34064 c8cf2cb88451687abb047df2faae44f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 675492 3e953f324652ef7a01f93aeaa2dc5e55
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 158402 aa593e2736e7b717ea8c561b1e11c27b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 43624 b2ca8774a7cf447123ea811781e80dbf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 145226 0fbb95dc0bc59baf91447250f19e7d45
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 302390 991c8e4ef2dda71d6deda5599129a768
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 2436572 4b845d0a28c2b48ad0c29521bae3a0b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_i386.deb
Size/MD5: 645046 28f8ea5f653057c350d40feb64d68f2d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_i386.deb
Size/MD5: 645340 a4d347f729beffbf9ff1701d21a5f9b2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_i386.deb
Size/MD5: 23499764 59f3275c547e9f13f97eba55955725f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_i386.deb
Size/MD5: 23635906 c096ba5db0db8b87f67309a9e9c6ff5f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_i386.deb
Size/MD5: 10117090 7e1648c7b3a3ab2606263ecb20683ba1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_i386.deb
Size/MD5: 675850 3e91710602fec2d4aebafe62a6cdfe80
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 433078 d1439530f50069f41b4c30b010871b4f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 171298 68b786d8853574467c792efe3fa62ca5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 264104 3a49c641e4a146fdb634b298c51ca6e9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 1994518 105c6b0fb8b650949da502f3fee2018d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 150964 dc4178cced6d9c1823d24b2204c15ae9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 184058 a25940b16b7022a52f7b8c78e164a908
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 157856 c628cef1c909819dab1fe2d812dffeba
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 34500 2ea55d8e77aa3065af30ff4d440c059d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 78286 6d0f7704cdff848dbbfbd5fe60cf0ca7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 86190 c7d8ec25c3d35ea8455e9cf7c1b4ec64
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 51332 79b56b5e7f79a17d45fb7c55f64954b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 8796 e571105caa3bed5fc3576928b03eff31
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 64316 bcb0f12340567e9db7a5dcc3549dcf0e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 102092 a2556a5171c52abe48ba423b008c6f13
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 1450234 339572f5e579468fc438b1dd2cc2dcd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 44520 68267a8c684d01c673d4b41bf5d4af69
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 12642 80e228567fcb814cd67e54aec6abdb41
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 373158 483599df2e1b6c82a688b413b74e5b91
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 189720 156d822da222b7fc8b887a4d1b3b7c31
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 12992 7232aad22eb02ec694fa0d41d367a69c
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.diff.gz
Size/MD5: 7350773 c09bf21927b9609694b39cdd55af21cf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.dsc
Size/MD5: 3198 5ba9f01bd70b951901d1d1667b964b54
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz
Size/MD5: 66766084 062c29b626a55f09a65532538a6184d4
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-18.59_all.deb
Size/MD5: 3636694 05fda32db7067b32c0fe593e1acf0533
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18_2.6.28-18.59_all.deb
Size/MD5: 8701396 65f8df38ba832ad50c6486d22420efca
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-18.59_all.deb
Size/MD5: 56998214 3d33148ef29824c1060e1f66b470c6c4
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 234600 929bceffa24f85104c08edf073ac1f0e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 44110 6d94c9d8ecfe3b4673d25cce1db2b95b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 43316 d895b0ad91a70c9381fd7e17650fab75
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 51116 da4c61dc01f5b5e8fb61cdf14bbbb40a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 90082 dad217572b5b07064b9e12b0062d16b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 38016 5e886058b306b4937f5a4ebe22451db6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 521628 d9f3ffe45b307847935002619ac31ea0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 125818 6fbc3c76a739b91e01da41bd535f3791
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 58060 cc30f23edae38f46b0d56f621969fd62
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 312502 9a11c9f0f37fee6a92c59de9df5fca11
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 3872142 cdc4640244b192a5970dfc3d3efe4d7e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_amd64.deb
Size/MD5: 689228 bf7aedb2bbb365a73ed77a8976a2701e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_amd64.deb
Size/MD5: 689122 80cfc63043a2d7231f86ef3e68f0a131
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_amd64.deb
Size/MD5: 24344078 dca923a8044df0ba9c642d5f2b317867
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_amd64.deb
Size/MD5: 24335914 ad5a4fe70b4555e9399f9a45b58459f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_amd64.deb
Size/MD5: 10551276 b61ed90bb3d3f19f0d2e593c0e9f091a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_amd64.deb
Size/MD5: 766282 f86ee0c95591ea10b578e848b6fdeb5f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 215170 7939440a8813110d952d86b49113e146
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 189496 f7495840a58b11f4ebfaad4d8cf203fe
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 29412 54845dbae313e98befcc172b5e87ac2c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 274480 e029f99b6550bd014f26c45997f76dcc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 1933908 6fa450fb440effd7f4a1d643f5e80ab9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 163464 208a84b0506fcd9cadb25f1b7f9d26b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 194828 596399bbfa9a92e3116c8f8d3a7d1391
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 152994 3cf4fb6614c5798cdcca7c8d7fd04a5b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 36486 b3cf4deb0dc4e11f095eb9bcf81546df
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 5842 085134ad282a8b2580aa12a6ed64fd9e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 72152 5b6bf270db5279c7d79cbd5fca8e14f6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 22714 a01ded50b855c5ed0580072a2277b74a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 8874 f173072403f51e6e6da399debd91068f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 47442 e822623d7e4ae0bec0ea5094fed67dcf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 15656 2b2e6ad08af592fa3106adb4eb16324e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 1273594 d873a895c58da3fcd5b8a0ea91f9a5ee
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 47204 c80f48bd49fddaae0188cf56350445f8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 72706 dcc76877eef3af00d0280f96cafb6e45
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 126958 b184498c9d2a598d57e293bc09049cda
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 13472 1399e0100a81d92448659b83949a62a6
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 215860 fe00a3406a5496e200d5c4e5975469f0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 46662 d7a61d1e363f9766795132d3325f02c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 41352 7d84e783cf7fc4111eaf964395440369
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 47402 2cd024da2955f7e35fe4519c8df5add5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 86924 515a3a07357e06f49b2e4384e2af7b8c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 33578 452adbbc84f5a5218610ddad25eb3ea0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 525752 1a2c59458472f4a18538df9386396703
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 125654 8678d7c3409daf24a373b4d11a0d9263
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 54874 94d4465b06d14b20af5803f2afddf53d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 301338 64a58b9a7ee5d53c2d1a486fe32deb93
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 3746292 099947b9ddfb625da14b96bf1b9f59e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_i386.deb
Size/MD5: 673824 c36739d12d66db8de4b6e270b1c91464
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_i386.deb
Size/MD5: 676398 c7091523d59d0b1cdd4453e12d5983d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_i386.deb
Size/MD5: 24662186 cfa5f52488fb3767debfefaf8940f6b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_i386.deb
Size/MD5: 24777004 b524e2b45df5e9d30ebc81717b5c62d7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_i386.deb
Size/MD5: 10250016 09b9af49da34304c1dd280896ce9c0cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_i386.deb
Size/MD5: 766288 4858bc3941dc0e545195c0b911142a4c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 218106 f4f03360ad8e2ee23a58b534e8a2c045
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 174922 fbc6643612c01e91066a87b6ec9c7125
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 30064 c8e4db00aa9c0c3b75c47c103d87b4c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 262814 794c683379e359de14db8806fe984f78
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 2110070 da3e69dab278584e1abea5ee15d9b47d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 150230 7fc91b8ad535bfb705ba2cb2fc9ff57d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 184326 e505e555ac3bd0c33d00a47f7530f78c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 143584 209207f7e7887594a9d55d17bf1dca76
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 34576 cafc0f5f2db11f69d10e75815d3e9018
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 5504 21cfbb5c1aa4c8d82bf3e1412646263f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 86018 0dc7720bee90887f4ebf5c71cf93d611
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 47636 fbebe71b83526192c08fd6d797ee8cb1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 8714 14ed52e8c0a75151dd45acf3cb1ffc34
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 44692 27502a17d5ca35cc31a9fd79ae7d2f1d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 14780 2c9ea91e8d8da2bff76c38a6cdce748d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 1445966 33fa2ee03c566924552fc5b413e2ccf1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 44098 f740dcb377a692e2ff25a65424431e5b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 69290 a7e3130530005bf8fe4edabe8b003888
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 119528 a12c1a5bf9a112402d80e8f77ee87a1c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 12678 6646096dee2575f3bb33510e70bdd52b
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 215260 9a096eefa7f5e423c60fea41c314b9a5
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 46664 ba3b534d98d6717395ec66b402b3c701
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 40958 5950f34ca1fbd16f82a42020bc934ec6
http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 47312 0d7d48294720bbd387710d560756ce6a
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 86530 9e5c38cd42496250d5fcf951c6b5d4bd
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 33272 a8890faa31cf92122bcce2991374fe7e
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 523810 7b2a58ca4d024926c0f8101ab49242d6
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 125252 f48299cd45e2ef1a74017d1c7653976e
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 63568 135fe854fe31d2d8bd9cd09f40a266e5
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 300756 77668125ff976eaed45f3d2676a46c5f
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 3035296 186cc64995c4fd4404241de5399eb0fb
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-18-lpia_2.6.28-18.59_lpia.deb
Size/MD5: 641460 1a4d29b73378acb8bcf88658f88dd08e
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-18-lpia_2.6.28-18.59_lpia.deb
Size/MD5: 21796372 d7455e818bf972ef7eb0fe54b7bd96dc
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_lpia.deb
Size/MD5: 766260 b67d9c1432185123449ed6826ed9588d
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 303982 80fe6dcf6d68a46047ef6ddc2c098614
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 157406 2cc8f76d83482452bb6073656a80b2ee
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 24442 28180da41edae2700e4c8a0e4f1c656f
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 260414 49a0b6bd418a0ff1d274ce8f602e2733
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 2027576 241ee9a564502f3d8837806d5e6480d0
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 149398 b14f79b842c979418dec65e273836cd0
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 184736 a159624d12831598d35c3b00ba563182
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 143238 2720ae4f8cdad85066fc888e7fc3c796
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 34462 582363a3843fdbded2476793775ace76
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 5496 67c7245d730a7b241eb9947afeef7669
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 85646 6a31ffe0054c27df1506ae34162ab79e
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 47402 ff41a000c4a3abbed18330e905a01b7b
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 8718 15aa2d8fafced6b6e3b5a24c698b4089
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 63106 7a967940a04c1ee6a9626258e608b54c
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 14720 dc899d8630769d6270526c49f99a2af8
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 1447832 400eeba1e83569d777954b21b6df593c
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 43898 16b0a1310e3f70dccfc8d0d5f971b064
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 155186 b22b41e37f88fe49531f5580e0f7f712
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 172666 df244ff125096be469b1c56a30f1e05f
http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 8154 f2d765541e008431b4d3eae00f435b61
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.dsc
Size/MD5: 2450 610bb83247876f8a8b47a0fd0d46fae8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.tar.gz
Size/MD5: 87052080 62b9dcb9ad24e659db1aa085f9e5a456
http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.dsc
Size/MD5: 1906 a39c7ff46fb3ff74480d0e98366a486d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.tar.gz
Size/MD5: 81902928 c9e88b4f386710c3f22979986a7e3a34
http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.dsc
Size/MD5: 1943 25176b20de251c2e58bb95e2dd9c1c7b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.tar.gz
Size/MD5: 82470873 4d5238d3d11105852133d3eb802a95cc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.diff.gz
Size/MD5: 2811600 b2b44f12a786758d470e6a29c09d0388
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.dsc
Size/MD5: 3782 ae6bf5844769d00004b919a6f61d588c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31.orig.tar.gz
Size/MD5: 78278595 16c0355d3612806ef87addf7c9f8c9f9
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-doc_2.6.31-304.10_all.deb
Size/MD5: 3790328 e35ab5c36ee1bac625d2a57bd19e0c5c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-source-2.6.31_2.6.31-304.10_all.deb
Size/MD5: 64258256 70b947cc9e9012c9472f2c317f11ffae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304_2.6.31-304.10_all.deb
Size/MD5: 9662096 ac58cebef695901ea01bc7413b79109f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.31-19.56_all.deb
Size/MD5: 3791668 3836f273873fedf9d2293ee0d11df6ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19_2.6.31-19.56_all.deb
Size/MD5: 9531414 34d882276f33b0e37135c379a6e1c451
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.31_2.6.31-19.56_all.deb
Size/MD5: 62161518 9d3f3f79b9f14db8bd3dc68594eb8c8c
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_amd64.deb
Size/MD5: 603212 951db7e930eefc5fff9017c56badfb6e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_amd64.deb
Size/MD5: 18660056 e39dda7f87b093e927c34a928b842c7a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 221398 682a7dab5b571a7b2fd31f19daf724c1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 15536 55206db30b20aea4d7da38b342fc095d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 52128 1cde23d38ba6908e1123951ef4bc3c69
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 44828 94402e34a45cf232ae86f3cc08bf7f4f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 50072 65e128949b6f525d9028187fe1e7cc37
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 92518 338960088cec6b9b25ef2a96e96f3ebc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 37776 452d9c073d191ec2be1cad3aceb34490
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 537676 6bb8167794701151c613afe28a5c62c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 130666 ff5cf8923b89d0fa4b5c3c4a61ef93f7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 53846 ffdc544c68e862a0a3038c99ac2d73a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 310118 c2092f9a83a4f59145005f2c451d304b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 4353666 3a04bb875ae70561075d05d5bb208977
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_amd64.deb
Size/MD5: 694766 85017cb531a49ea743cb7b30341b5ffa
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-server_2.6.31-19.56_amd64.deb
Size/MD5: 694938 550a64d6d54ee5f34f1fb9eefbd4cc3e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_amd64.deb
Size/MD5: 28924984 3001e6d36f6bf76621997bdbeb864234
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-server_2.6.31-19.56_amd64.deb
Size/MD5: 28885946 ff6296f4c684dd9facb011fc51b0b6f0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_amd64.deb
Size/MD5: 11740736 287948976d92a7cae832a34ce33a99b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_amd64.deb
Size/MD5: 743052 35cb9d5d80b77a2586d08ffb65d3212a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 168272 fc4758b6b91802971538d3a3c519056d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 202768 73cfe4be43d350582d171ff0e178b6b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 27268 ae850a5e0ba4381a290b8f21ff88737f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 311688 3dab8c023e4aad0df74c5193aeaca49b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 2282064 f09b0e8828effab3770bfc1da159a8f2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 158666 6765112bf6fed248c08465e47b4dab00
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 203112 fed91a4bc3d356a5a9bb1c6110337413
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 161072 faec6563ccef41e925482b36619fca7c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 38056 505cbeb1fdbf55eea7664a19dcedc11f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 5762 a3ba57f83594477b27886cb3f4bd1b0d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 73750 53978367ed22b3daba246878064b72c2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 22240 8a1036af3dacffb432813cc8422f6ae8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 9548 f1e71c2129cc33f1ff139401b7b81547
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 39844 48e4aa79753fdb3ce1877ca1817b9fc6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 23484 f1be46cb2947ebe6b6d2e5b571d71a35
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 1389556 2ba51ea53e5454f75c8b39f21481e45d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 47382 89f1dff9282f3c667cf1b8c2bc41353c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 51636 41311bd8c8459ba04789539733e6ff5c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 128972 9697c034ed2bb74b5d18c5ae31fe1af0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 15814 8f46e8ddd6cac16dbdbc7c89cc94bee0
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_i386.deb
Size/MD5: 573528 fa913abed6caeb5c33eb2167f730956f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_i386.deb
Size/MD5: 17943372 803487f6122441604ec3062e7bb98228
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 198832 3282a330510666a582f6b8c0269d2f53
http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 32458 03e2d90ce28677b7956fa2a72726d02e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 49938 c0d1953d9212f1569f04e8c8ba0db7ca
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 42118 db5bcc80727cd1013bc8393df2a88e4c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 45954 2d497ad958e7e7fc1b57ce51ff6b3570
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 87386 8e3ab58cf14ac0e97a334a65ae3e42ba
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 33754 bdbf52c3d681cca0ecdced183d2d37c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 534176 5f166aa72d31a95df7cdb60abe4a0fc2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 128172 821c97524ce74e0685b135140c5261d7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 49748 9423b0562b984b85856d219d7b67fa27
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 295726 0736ef03d01a5e5e4fdf284ad2be5409
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 4185460 831a6068ef18d08ff697df14dead1668
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-386_2.6.31-19.56_i386.deb
Size/MD5: 674832 6c28f2a428900b7c3ecd857dd2363150
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb
Size/MD5: 674164 daade678beff67e96da61f42286bb8d4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_i386.deb
Size/MD5: 674252 0786c96b6d902a71c6f1a2e5aa202345
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-386_2.6.31-19.56_i386.deb
Size/MD5: 28775482 99e9b99d437aa88ec42e838367ca0c3b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb
Size/MD5: 28938194 19d1d147a9e9dfb49fcd30b9d065d289
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_i386.deb
Size/MD5: 28836780 00047de0d649be8b91c813fe7ee482b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_i386.deb
Size/MD5: 11193984 1848c77671f6d9129f990e1a0a9940d0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_i386.deb
Size/MD5: 743050 af6030dae8f05d7ef583ee7d6f31be8b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 172774 c11dd36baffeccf283ce48e122d7c791
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 186104 072e07c277b4f37611b21aad4390ccb0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 28372 82c8b14ef6982a48d3a8459d56ede43c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 292792 6c99c3b65ff7b159af94edf70358cb4a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 2400232 94729dcb0c5adb15ded7b3302c4005eb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 142004 9e43481b4e46409d8e711a628ce5e40a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 189566 83afe6de56cab613b4f890723a82a6b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 148522 b96767af921427e880579659ba7b757a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 35306 a6a1cbe7a75490632f24cad479916315
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 6842 86b286685eabaf8b6d28d3f922249503
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 86058 c014cfa81ab99a01793d25b995c7d75f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 46424 d525bcf1a39f6a21f09d52d24e6a0eb3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 8916 f9efb7f192c3cc22c14df58803a64dfc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 36282 1d843fa9ef5beed8582f2924d0b53bcc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 21660 3ad0b4572c12885957a3b753fc3b9fe3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 1495010 630f37fe420a74a22b4ca2eba4960999
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 44088 fddf56b0285ec3d0e6fc61e0fe8b86e2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 48484 2614a20d6d57892a8789091eeeaa67b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 117810 ff004889bca11286287a59c36fa24c0e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 14526 4c9cb3d5598c843bf5b90ddf0292d3c1
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 198810 76156647956f29c9e519aeac038c63bb
http://ports.ubuntu.com/pool/main/l/linux/char-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 32452 9a5dd5fe15dda0be28f7afd966e89af9
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 49936 31c4008b50016b2a6c3a90703f2becbb
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 42148 931518b24b123d3749719c35b2b23759
http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 45950 297c686f52a35049b3b2c87a96aebf68
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 87366 ec3f16cc0aeeef91b8c887ff347b6b0a
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 33750 a29ddd339c071c5b948c96e30f36f650
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 534366 b15b19f3e6c581d22514700dbd6502d8
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 128202 3d0f559a80187074bb210e3dae3bbfa0
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 49732 41abb7e30f0bdac62c5cd064c4b0ac3e
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 295732 12e912ce1f15d580960e7956de0c4ae0
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 4186814 7c18e86a3f5a5a985488ad67718887f9
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-lpia_2.6.31-19.56_lpia.deb
Size/MD5: 674880 5dd2779cd5be613c330b7dc35410f271
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-lpia_2.6.31-19.56_lpia.deb
Size/MD5: 28831528 8eaab1870eda62e8ee231e429c361455
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_lpia.deb
Size/MD5: 742994 99d2d0609d9032e2810e19c92fc92834
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 172836 8b15eb5579853f45dc49055351df4225
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 186092 0eb0ceb5c23748d829f3e1d7977a35be
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 28366 0301ac544cf27b3dce660787d7575804
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 292736 16e84844c99e73b4e00419c38d78db3d
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 2400366 43dda8f1a10775e382e7a328381265db
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 141998 930123e6b57798468d7085ae9f549150
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 189564 8d6e18aedb4b970a3643207b96589863
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 148506 78efdbf1323c68be564ad06205842cb6
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 35300 054cf95e7af87d6f744b69eb8166f275
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 6828 5dbf32d40e88f471614e5cf286670e8f
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 86054 f24e7eaa3608985960e54a9048a24fb6
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 46410 80945eba79f53965effd546d23a8560b
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 8906 e1c6021a615a4363dde2cf4a893fa53b
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 36270 eb2848e19ec2351b9102bc640e546991
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 21660 cfb271e26dfd127871f5d27547e0a7ba
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 1494736 44113d529e3f4d3828f8719facd86370
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 44068 98817942a8188bd9281def20a1d327bb
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 48474 ebc9e58b5f98182006d6e3bb9c5ce179
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 117786 9b864dfc32d19a8cf2d61a68894835e9
http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 14524 9ad51e3871197eb84b193bd9a3b29ec2
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 321488 509ad8549565d0d87fe246df5b26c7af
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 263628 b7028cc16ec749cc2fdd86e985c7bc6a
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 58850 3e2f18df29a75debc326e5919c9c13da
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 67040 8fdde64943d01e5c6a372424d3d24a03
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 45914 6a21bb6fc6dce2767be6f974ffdab524
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 51296 4c928d4f04bf96f5cdc5ccf7d3a60c81
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 90684 eac2ea55da023924723593afffbb5d2c
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 105146 c407a156a5e56f284fa682d87d2ed50e
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 39492 38f377d5a0bdbbbb642545aa6d7f641c
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 39270 47f890e2a1418595d92858350aa16475
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 580998 825045ff82a442eaf1a21a5448b0cefb
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 626388 b56b5416b642ba57471e6e125b99a32f
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 149292 930001a305b0f78060f3472fe46cde00
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 147332 ef6994c30f19462a7fc0cb7cd8f4dacc
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 79750 75c6da2308e05334f89f62917aee5b3d
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 84136 caf2a7e924b03340e579e9bdc0a7ba50
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 402954 9fc3d4860f5c32aff3ac252379938fef
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 342516 5737df8ea2adfc45ecae9d322931187a
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 3813204 3ac91a51b3525bfbb0f6166fc140d7db
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 5193132 54dce7348221bcc93bbc01512d553a16
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb
Size/MD5: 784762 523b94315bff20137df79c5308abd5b7
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb
Size/MD5: 801042 2a8e55b23ad4dc09ee3cbb2fdc23cc28
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb
Size/MD5: 783708 185ba99656f4fa37874e0241e9f25dbb
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb
Size/MD5: 24820746 adc5365726ba88565ad89953707bd012
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb
Size/MD5: 25829918 fc82da730c6d730c5a4ac87d30594749
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb
Size/MD5: 24656226 7791f88107e97c5419f0e2d2f850c38e
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_powerpc.deb
Size/MD5: 728146 1dabe36864839475aab9293825cfc3e4
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 271924 8fb200d91f158f9b0eb209df5a5ffcd4
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 294610 317f7d34e3cd0ac823fcc5d48bcc9a7f
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 210546 041508a9555e18e2b8b4cab41b26f397
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 216984 845e2e452ef869aa3b39ea47bfa0280b
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 25798 19a7cae7e4f693c269f54dc0f2762f33
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 28984 419926b33e2b573f8d3ccaa5ade657f1
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 314922 83dcb63807ffb50682219b20333c23bc
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 357524 a32753bfca44b1afb9b11f72b25ebb9e
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 2027754 9b45ff8446ec0bad5befec2dc3ecdb72
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 2247744 35d212f7569bb03564a7f0294879557f
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 213544 3fb9afb7247290ffb3508744ab6cbb9f
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 209776 e42b20eb402cb2a55fea2a80f5cef162
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 210242 78939115c860efacb83481c0687f1a7a
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 244856 8fcff5fb05c0921681ec2bb44637c624
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 111834 a6b65e618a3240d51f36f37911d1d7cc
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 131610 dc5625deacbac446e71517f5902376b1
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 49028 ac60e4bf193e7725de6d8999c6231915
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 44082 531b2cbe15ec2f62fe61bd7002b1df02
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 5852 f049a9332d469b247e451868b4f22cce
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 6504 32fb4de3cd714598281c2d4d5d2ee6d6
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 79118 e98cffbfe6f6cbffcfa6dce199dc6c46
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 85190 e648dc2d3e124d68c47d4ec18836097f
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 74318 19b737ad1f43e7be1c6cc7e211085424
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 27228 0b5b4529d140289e616bded832055cbc
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 8538 9010c080bd63660bf529930565d49f62
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 9818 e909c37d26354ddbdceddc72628d71b3
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 58830 ae6573a0664b5486360156dd6711776c
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 70140 83085dfd5f4bb24ab67dd967e6b609cc
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 23714 86a598e1b13e4d6963475732e7a1097a
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 30804 b382bc0bfffd61156d0f8b3dc90bd307
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 1556894 ea2800c85a0115ad2e524a8b4ab4cb91
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 1509110 e42499f8bdbad020301a11617f6b65a8
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 81698 095ff78875bae0b90edd07ac3b51993d
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 88530 1a36ce88a0c6f7b495c869da15bf9d69
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 64400 8ff9a2aef998409440c1139f3db8c7ee
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 76990 392faa17f8c688e3856d91fb657eba09
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 141540 636e6d1827591a3aa46b82d7dc0b8ab6
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 151356 0f39f4d13770ceab049be6fb9c83fc16
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 139430 14f825a3334b18614059312527002767
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 70106 6dde178febff58a546142209374e1616
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 46510 64b0be995ce3d697a84cd3b0665ffe68
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 93974 28048300aba15f2a3937723bc0afc5cd
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 588788 c17e7feb3442296b7ed93c92cb988625
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 148426 6f429deb9df760daf28c04ad93ea6758
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 75862 6f382de52d9e1b52611c70a703895e5d
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 2892370 ec9440bb8ee05a7ac071992c5711139f
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb
Size/MD5: 601506 1b56c59b3df953a640760b876d752465
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb
Size/MD5: 600680 166e5056f971d5fa031230c1af67d028
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb
Size/MD5: 20496992 6ebab55c96d6be71ffb8c3a493d31a74
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb
Size/MD5: 20193918 98b3c6e44f8e302cca36530b434e9525
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_sparc.deb
Size/MD5: 740254 b1a453339b4d68717a445f07b87b53a4
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 266068 1b8caecb838a9dd9b9c765f6603197a3
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 209168 e0e78f6a435e0ca46d5680e08d6e8db0
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 26268 f730be03c2b96e53e779a5d3df4cde93
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 314080 b673ee07d0c907d6ba00a561b915868d
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 1675490 8642bd711b6643bd26ddc80674cef9e4
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 222882 136f6b9e24a16823f7309438fd0bd60a
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 121954 75090ea655204cc898db4634fc8aa021
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 38798 a11bcf765626194255c1d5a7d0106c2a
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 100798 af5903bc65fd381528f733fb1ba4100f
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 8932 ebcb23a73a538276e41fcff9b7bb1d15
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 62926 7eba529ee44c2e107b693605dcbf1247
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 120960 8f63ad112de0797974650631dee53d13
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 1217912 87a2a4f21ee86e0f36bc5298a226513b
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 101576 057a15ca3fa891e47216adcf5ae071f7
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 200148 f90834ae24c0f516ef83fa5aa66bafbb
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 184674 d704744a26941df63b9195288306fa7b
.
ESXi 4.1
ESXi410-201010401-SG Download link: http://bit.ly/bb3xjV md5sum: 05f1049c7a595481cd682e92fe8d3285 sha1sum: f6993c185f7d1cb971a4ae6e017e0246b8c25a76 http://kb.vmware.com/kb/1027753
ESX 4.1
ESX410-201010001 Download link: http://bit.ly/a3Ffw8 md5sum: ff4435fd3c74764f064e047c6e5e7809 sha1sum: 322981f4dbb9e5913c8f38684369444ff7e265b3 http://kb.vmware.com/kb/1027027
ESX410-201010001 contains the following security bulletins: ESX410-201010401-SG (COS kernel) | http://kb.vmware.com/kb/1027013 ESX410-201010419-SG (Likewise) | http://kb.vmware.com/kb/1027026 ESX410-201010404-SG (NSS) | http://kb.vmware.com/kb/1027016 ESX410-201010409-SG (tar) | http://kb.vmware.com/kb/1027019 ESX410-201010412-SG (Perl) | http://kb.vmware.com/kb/1027022 ESX410-201010413-SG (cpio) | http://kb.vmware.com/kb/1027023 ESX410-201010410-SG (cURL) | http://kb.vmware.com/kb/1027020 ESX410-201010401-SG (vmkernel64, VMX, CIM)| http://kb.vmware.com/kb/1027013 ESX410-201010414-SG (vmware-esx-pam-config)| http://kb.vmware.com/kb/1027024 ESX410-201010402-SG (GnuTLS, NSS, and openSSL)| http://kb.vmware.com/kb/1027014
ESX410-201010001 also contains the following non-security bulletins ESX410-201010405-BG ESX410-201010415-BG
To install an individual bulletin use esxupdate with the -b option.
The vulnerabilities are caused due to various problems related to "do_mremap()" and "MREMAP_FIXED", which can be exploited to e.g. cause a system crash on certain architectures.
PROVIDED AND/OR DISCOVERED BY: Disclosed in GIT commits.
ORIGINAL ADVISORY: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Note: Debian carefully tracks all known security issues across every linux kernel package in all releases under active security support. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, updates for lower priority issues will normally not be released for all kernels at the same time. Rather, they will be released in a staggered or "leap-frog" fashion
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0654", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "lt", "trust": 1.8, "vendor": "linux", "version": "2.6.32.4" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.32" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.32.3" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "3.0.3" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "3.5" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "3.x" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.0" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.32.2" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.32.1" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.29.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.6.32.4" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel -test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.4" }, { "model": "kernel 2.6.18-8.1.8.el5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.1" }, { "model": "kernel 2.6.21-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.8" }, { "model": "kernel -test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.6" }, { "model": "kernel 2.6.31-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.4" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.6" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29.1" }, { "model": "kernel -rc6-git6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.4" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.267" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.7" }, { "model": "kernel -test9-cvs", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.214" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel 2.6.32-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "kernel 2.6.22-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel 2.6.31-rc9", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.16" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.3" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel 2.6.24-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.09" }, { "model": "kernel -test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel 2.6.29-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.3" }, { "model": "kernel -git7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel 2.6.31-git11", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.23" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.12" }, { "model": "kernel 2.6.29-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.13" }, { "model": "kernel 2.6.31-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.31-rc5-git3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.12" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "esx server esx410-201101201", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.11" }, { "model": "kernel -git1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.11" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.5" }, { "model": "kernel 2.6.32-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.1" }, { "model": "kernel -git14", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.273" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.5" }, { "model": "kernel -test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.8" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.2" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel 2.6.22-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.3" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel 2.6.27-git3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.7" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20-2" }, { "model": "kernel -rc8-git5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.12" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.6" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.10" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.1" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.4" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel -test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.14" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.11" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.9" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.3" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.3" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "enterprise mrg for red hat enterprise linux version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "v15" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2712" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18-53" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.4" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.2" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.5" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel 2.6.25-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.4" }, { "model": "kernel 2.6.32-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.9" }, { "model": "kernel -rc8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel 2.6.32-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15-27.48" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.24" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.5" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.3" }, { "model": "kernel 2.6.20-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22" }, { "model": "kernel 2.6.32-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.12" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel -git8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -git5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "kernel 2.6.24-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel 2.6.32-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.22" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.3" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.1" }, { "model": "kernel 2.6.21-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.3" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel -git13", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel -test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel -git8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel 2.6.21-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.26-rc5-git1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.8" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.3" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.10" }, { "model": "kernel 2.6.21-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.3" }, { "model": "kernel -test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.2" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.11" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.12" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2519" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.2" }, { "model": "kernel -test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.6" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.4" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.3" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1613" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.17" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.11" }, { "model": "kernel 2.6.29-rc2-git1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.32-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.8" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.1" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.19" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.4" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.7" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.21" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.276" }, { "model": "kernel 2.6.31-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20" }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.17" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.315" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.5" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1627" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.4" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.12" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel -test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" } ], "sources": [ { "db": "BID", "id": "37906" }, { "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "db": "CNNVD", "id": "CNNVD-201002-150" }, { "db": "NVD", "id": "CVE-2010-0291" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:linux:linux_kernel", "vulnerable": true }, { "cpe22Uri": "cpe:/a:vmware:esx", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001721" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Al Viro", "sources": [ { "db": "BID", "id": "37906" }, { "db": "CNNVD", "id": "CNNVD-201002-150" } ], "trust": 0.9 }, "cve": "CVE-2010-0291", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2010-0291", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-42896", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-0291", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2010-0291", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201002-150", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-42896", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2010-0291", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-42896" }, { "db": "VULMON", "id": "CVE-2010-0291" }, { "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "db": "CNNVD", "id": "CNNVD-201002-150" }, { "db": "NVD", "id": "CVE-2010-0291" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\". The Linux kernel is prone to multiple denial-of-service vulnerabilities when mapping memory addresses. \nLocal attackers may leverage these issues to crash the kernel and deny service to legitimate users. Other attacks may also be possible. \nThese issues have been resolved in the 2.6.32.4 kernel. Linux Kernel is the kernel used by the open source operating system Linux. There is a permissions vulnerability in the Linux kernel. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2011-0003\nSynopsis: Third party component updates for VMware vCenter\n Server, vCenter Update Manager, ESXi and ESX\nIssue date: 2011-02-10\nUpdated on: 2011-02-10 (initial release of advisory)\nCVE numbers: --- Apache Tomcat ---\n CVE-2009-2693 CVE-2009-2901 CVE-2009-2902\n CVE-2009-3548 CVE-2010-2227 CVE-2010-1157\n --- Apache Tomcat Manager ---\n CVE-2010-2928\n --- cURL ---\n CVE-2010-0734\n --- COS Kernel ---\n CVE-2010-1084 CVE-2010-2066 CVE-2010-2070\n CVE-2010-2226 CVE-2010-2248 CVE-2010-2521\n CVE-2010-2524 CVE-2010-0008 CVE-2010-0415\n CVE-2010-0437 CVE-2009-4308 CVE-2010-0003\n CVE-2010-0007 CVE-2010-0307 CVE-2010-1086\n CVE-2010-0410 CVE-2010-0730 CVE-2010-1085\n CVE-2010-0291 CVE-2010-0622 CVE-2010-1087\n CVE-2010-1173 CVE-2010-1437 CVE-2010-1088\n CVE-2010-1187 CVE-2010-1436 CVE-2010-1641\n CVE-2010-3081\n --- Microsoft SQL Express ---\n CVE-2008-5416 CVE-2008-0085 CVE-2008-0086\n CVE-2008-0107 CVE-2008-0106\n --- OpenSSL ---\n CVE-2010-0740 CVE-2010-0433\n CVE-2010-3864 CVE-2010-2939\n --- Oracle (Sun) JRE ---\n CVE-2009-3555 CVE-2010-0082 CVE-2010-0084\n CVE-2010-0085 CVE-2010-0087 CVE-2010-0088\n CVE-2010-0089 CVE-2010-0090 CVE-2010-0091\n CVE-2010-0092 CVE-2010-0093 CVE-2010-0094\n CVE-2010-0095 CVE-2010-0837 CVE-2010-0838\n CVE-2010-0839 CVE-2010-0840 CVE-2010-0841\n CVE-2010-0842 CVE-2010-0843 CVE-2010-0844\n CVE-2010-0845 CVE-2010-0846 CVE-2010-0847\n CVE-2010-0848 CVE-2010-0849 CVE-2010-0850\n CVE-2010-0886 CVE-2010-3556 CVE-2010-3566\n CVE-2010-3567 CVE-2010-3550 CVE-2010-3561\n CVE-2010-3573 CVE-2010-3565 CVE-2010-3568\n CVE-2010-3569 CVE-2010-1321 CVE-2010-3548\n CVE-2010-3551 CVE-2010-3562 CVE-2010-3571\n CVE-2010-3554 CVE-2010-3559 CVE-2010-3572\n CVE-2010-3553 CVE-2010-3549 CVE-2010-3557\n CVE-2010-3541 CVE-2010-3574\n --- pam_krb5 ---\n CVE-2008-3825 CVE-2009-1384\n- ------------------------------------------------------------------------\n\n1. Summary\n\n Update 1 for vCenter Server 4.1, vCenter Update Manager 4.1, vSphere\n Hypervisor (ESXi) 4.1, ESXi 4.1, addresses several security issues. \n\n\n2. Relevant releases\n\n vCenter Server 4.1 without Update 1,\n\n vCenter Update Manager 4.1 without Update 1,\n\n ESXi 4.1 without patch ESXi410-201101201-SG,\n\n ESX 4.1 without patch ESX410-201101201-SG. \n\n\n3. Problem Description\n\n a. vCenter Server and vCenter Update Manager update Microsoft\n SQL Server 2005 Express Edition to Service Pack 3\n\n Microsoft SQL Server 2005 Express Edition (SQL Express)\n distributed with vCenter Server 4.1 Update 1 and vCenter Update\n Manager 4.1 Update 1 is upgraded from SQL Express Service Pack 2\n to SQL Express Service Pack 3, to address multiple security\n issues that exist in the earlier releases of Microsoft SQL Express. \n\n Customers using other database solutions need not update for\n these issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2008-5416, CVE-2008-0085, CVE-2008-0086,\n CVE-2008-0107 and CVE-2008-0106 to the issues addressed in MS SQL\n Express Service Pack 3. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter 4.1 Windows Update 1\n vCenter 4.0 Windows affected, patch pending\n VirtualCenter 2.5 Windows affected, no patch planned\n\n Update Manager 4.1 Windows Update 1\n Update Manager 4.0 Windows affected, patch pending\n Update Manager 1.0 Windows affected, no patch planned\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX any ESX not affected\n\n * Hosted products are VMware Workstation, Player, ACE, Fusion. \n\n b. vCenter Apache Tomcat Management Application Credential Disclosure\n\n The Apache Tomcat Manager application configuration file contains\n logon credentials that can be read by unprivileged local users. \n\n The issue is resolved by removing the Manager application in\n vCenter 4.1 Update 1. \n\n If vCenter 4.1 is updated to vCenter 4.1 Update 1 the logon\n credentials are not present in the configuration file after the\n update. \n\n VMware would like to thank Claudio Criscione of Secure Networking\n for reporting this issue to us. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2010-2928 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter 4.1 Windows Update 1\n vCenter 4.0 Windows not affected\n VirtualCenter 2.5 Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX any ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n c. vCenter Server and ESX, Oracle (Sun) JRE is updated to version\n 1.6.0_21\n\n Oracle (Sun) JRE update to version 1.6.0_21, which addresses\n multiple security issues that existed in earlier releases of\n Oracle (Sun) JRE. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the following names to the security issues fixed in\n Oracle (Sun) JRE 1.6.0_19: CVE-2009-3555, CVE-2010-0082,\n CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088,\n CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092,\n CVE-2010-0093, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837,\n CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841,\n CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0845,\n CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849,\n CVE-2010-0850. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the following name to the security issue fixed in\n Oracle (Sun) JRE 1.6.0_20: CVE-2010-0886. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter 4.1 Windows Update 1\n vCenter 4.0 Windows not applicable **\n VirtualCenter 2.5 Windows not applicable **\n\n Update Manager 4.1 Windows not applicable **\n Update Manager 4.0 Windows not applicable **\n Update Manager 1.0 Windows not applicable **\n\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201101201-SG\n ESX 4.0 ESX not applicable **\n ESX 3.5 ESX not applicable **\n ESX 3.0.3 ESX not applicable **\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n ** this product uses the Oracle (Sun) JRE 1.5.0 family\n\nd. vCenter Update Manager Oracle (Sun) JRE is updated to version\n 1.5.0_26\n\n Oracle (Sun) JRE update to version 1.5.0_26, which addresses\n multiple security issues that existed in earlier releases of\n Oracle (Sun) JRE. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the following names to the security issues fixed in\n Oracle (Sun) JRE 1.5.0_26: CVE-2010-3556, CVE-2010-3566,\n CVE-2010-3567, CVE-2010-3550, CVE-2010-3561, CVE-2010-3573,\n CVE-2010-3565,CVE-2010-3568, CVE-2010-3569, CVE-2009-3555,\n CVE-2010-1321, CVE-2010-3548, CVE-2010-3551, CVE-2010-3562,\n CVE-2010-3571, CVE-2010-3554, CVE-2010-3559, CVE-2010-3572,\n CVE-2010-3553, CVE-2010-3549, CVE-2010-3557, CVE-2010-3541,\n CVE-2010-3574. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter 4.1 Windows not applicable **\n vCenter 4.0 Windows affected, patch pending\n VirtualCenter 2.5 Windows affected, no patch planned\n\n Update Manager 4.1 Windows Update 1\n Update Manager 4.0 Windows affected, patch pending\n Update Manager 1.0 Windows affected, no patch planned\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX not applicable **\n ESX 4.0 ESX affected, patch pending\n ESX 3.5 ESX affected, no patch planned\n ESX 3.0.3 ESX affected, no patch planned\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n ** this product uses the Oracle (Sun) JRE 1.6.0 family\n\n e. vCenter Server and ESX Apache Tomcat updated to version 6.0.28\n\n Apache Tomcat updated to version 6.0.28, which addresses multiple\n security issues that existed in earlier releases of Apache Tomcat\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the following names to the security issues fixed in\n Apache Tomcat 6.0.24: CVE-2009-2693, CVE-2009-2901, CVE-2009-2902,i\n and CVE-2009-3548. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the following names to the security issues fixed in\n Apache Tomcat 6.0.28: CVE-2010-2227, CVE-2010-1157. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter 4.1 Windows Update 1\n vCenter 4.0 Windows affected, patch pending\n VirtualCenter 2.5 Windows not applicable **\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201101201-SG\n ESX 4.0 ESX affected, patch pending\n ESX 3.5 ESX not applicable **\n ESX 3.0.3 ESX not applicable **\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n ** this product uses the Apache Tomcat 5.5 family\n\n f. vCenter Server third party component OpenSSL updated to version\n 0.9.8n\n\n The version of the OpenSSL library in vCenter Server is updated to\n 0.9.8n. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2010-0740 and CVE-2010-0433 to the\n issues addressed in this version of OpenSSL. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter 4.1 Windows Update 1\n vCenter 4.0 Windows affected, patch pending\n VirtualCenter 2.5 Windows affected, no patch planned\n\n hosted * any any not applicable\n\n ESXi any ESXi not applicable\n\n ESX any ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n g. ESX third party component OpenSSL updated to version 0.9.8p\n\n The version of the ESX OpenSSL library is updated to 0.9.8p. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2010-3864 and CVE-2010-2939 to the\n issues addressed in this update. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not applicable\n\n hosted * any any not applicable\n ESXi 4.1 ESXi ESXi410-201101201-SG\n ESXi 4.0 ESXi affected, patch pending\n ESXi 3.5 ESXi affected, patch pending\n\n ESX 4.1 ESX ESX410-201101201-SG\n ESX 4.0 ESX affected, patch pending\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n h. ESXi third party component cURL updated\n\n The version of cURL library in ESXi is updated. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2010-0734 to the issues addressed in\n this update. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 4.1 ESXi ESXi410-201101201-SG\n ESXi 4.0 ESXi affected, patch pending\n ESXi 3.5 ESXi affected, patch pending\n\n ESX any ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n i. ESX third party component pam_krb5 updated\n\n The version of pam_krb5 library is updated. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2008-3825 and CVE-2009-1384 to the\n issues addressed in the update. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201101201-SG\n ESX 4.0 ESX not affected\n ESX 3.5 ESX not affected\n ESX 3.0.3 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n j. ESX third party update for Service Console kernel\n\n The Service Console kernel is updated to include kernel version\n 2.6.18-194.11.1. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2010-1084, CVE-2010-2066, CVE-2010-2070,\n CVE-2010-2226, CVE-2010-2248, CVE-2010-2521, CVE-2010-2524,\n CVE-2010-0008, CVE-2010-0415, CVE-2010-0437, CVE-2009-4308,\n CVE-2010-0003, CVE-2010-0007, CVE-2010-0307, CVE-2010-1086,\n CVE-2010-0410, CVE-2010-0730, CVE-2010-1085, CVE-2010-0291,\n CVE-2010-0622, CVE-2010-1087, CVE-2010-1173, CVE-2010-1437,\n CVE-2010-1088, CVE-2010-1187, CVE-2010-1436, CVE-2010-1641, and\n CVE-2010-3081 to the issues addressed in the update. \n\n Note: This update also addresses the 64-bit compatibility mode\n stack pointer underflow issue identified by CVE-2010-3081. This\n issue was patched in an ESX 4.1 patch prior to the release of\n ESX 4.1 Update 1. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201101201-SG\n ESX 4.0 ESX affected, patch pending\n ESX 3.5 ESX not applicable\n ESX 3.0.3 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the checksum of your downloaded file. \n\n VMware vCenter Server 4.1 Update 1 and modules\n ----------------------------------------------\n\nhttp://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0\n Release Notes:\n http://downloads.vmware.com/support/pubs/vs_pages/vsp_pubs_esx41_vc41.html\n\n File type: .iso\n md5sum: 729cf247aa5d33ceec431c86377eee1a\n sha1sum: c1e10a5fcbc1ae9d13348d43541d574c563d66f0\n\n File type: .zip\n md5sum: fd1441bef48a153f2807f6823790e2f0\n sha1sum: 31737a816ed1c08ab3a505fb6db2483f49ad7c19\n\n VMware vSphere Client\n File type: .exe\n md5sum: cb6aa91ada1289575355d79e8c2a9f8e\n sha1sum: f9e3d8eb83196ae7c31aab554e344a46b722b1e4\n\n ESXi 4.1 Installable Update 1\n -----------------------------\n\nhttp://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0\n Release Notes:\n\nhttp://downloads.vmware.com/support/vsphere4/doc/vsp_esxi41_u1_rel_notes.html\n http://kb.vmware.com/kb/1027919\n\n File type: .iso\n MD5SUM: d68d6c2e040a87cd04cd18c04c22c998\n SHA1SUM: bbaacc0d34503822c14f6ccfefb6a5b62d18ae64\n\n ESXi 4.1 Update 1 (upgrade ZIP from ESXi 4.1)\n File type: .zip\n MD5SUM: 2f1e009c046b20042fae3b7ca42a840f\n SHA1SUM: 1c9c644012dec657a705ddd3d033cbfb87a1fab1\n\n ESXi 4.1 Update 1 (upgrade ZIP from ESXi 4.0)\n File type: .zip\n MD5SUM: 67b924618d196dafaf268a7691bd1a0f\n SHA1SUM: 9d74b639e703259d9e49c0341158e0d4e45de516 \t\n\n ESXi 4.1 Update 1 (upgrade ZIP from ESXi 3.5)\n File type: .zip\n MD5SUM: a6024b9f6c6b7b2c629696afc6d07cf4\n SHA1SUM: b3841de1a30617ac68d5a861882aa72de3a93488 \t\n\n VMware Tools CD image for Linux Guest OSes\n File type: .iso\n MD5SUM: dad66fa8ece1dd121c302f45444daa70\n SHA1SUM: 56535a2cfa7799607356c6fd0a7d9f041da614af \t\n\n VMware vSphere Client\n File type: .exe\n MD5SUM: cb6aa91ada1289575355d79e8c2a9f8e\n SHA1SUM: f9e3d8eb83196ae7c31aab554e344a46b722b1e4\n\n ESXi Installable Update 1 contains the following security bulletins:\n ESXi410-201101201-SG. \n\n ESX 4.1 Update 1\n ----------------\n\nhttp://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0\n Release Notes:\n\nhttp://downloads.vmware.com/support/vsphere4/doc/vsp_esx41_u1_rel_notes.html\n http://kb.vmware.com/kb/1029353\n\n ESX 4.1 Update 1 (DVD ISO)\n File type: .iso\n md5sum: b9a275b419a20c7bedf31c0bf64f504e\n sha1sum: 2d85edcaca8218013585e1eab00bc80db6d96e11 \t\n\n ESX 4.1 Update 1 (upgrade ZIP from ESX 4.1)\n File type: .zip\n md5sum: 2d81a87e994aa2b329036f11d90b4c14\n sha1sum: c2bfc0cf7ac03d24afd5049ddbd09a865aad1798 \t\n\n Pre-upgrade package for ESX 4.0 to ESX 4.1 Update 1\n File type: .zip\n md5sum: 75f8cebfd55d8a81deb57c27def963c2\n sha1sum: 889c15aa8008fe0e29439d0ab3468c2beb1c4fe2 \t\n\n ESX 4.1 Update 1 (upgrade ZIP from ESX 4.0)\n File type: .zip\n md5sum: 1dc9035cd10e7e60d27e7a7aef57b4c2\n sha1sum: e6d3fb65d83a3e263d0f634a3572025854ff8922 \t\n\n VMware Tools CD image for Linux Guest OSes\n File type: .iso\n md5sum: dad66fa8ece1dd121c302f45444daa70\n sha1sum: 56535a2cfa7799607356c6fd0a7d9f041da614af \t\n\n VMware vSphere Client\n File type: .exe\n md5sum: cb6aa91ada1289575355d79e8c2a9f8e\n sha1sum: f9e3d8eb83196ae7c31aab554e344a46b722b1e4\n\n ESX410-Update01 contains the following security bulletins:\n ESX410-201101201-SG (COS kernel, pam_krb5, cURL, OpenSSL,\n Apache Tomcat, Oracle (Sun) JRE) | http://kb.vmware.com/kb/1027904\n ESX410-201101226-SG (glibc) | http://kb.vmware.com/kb/1031330\n\n ESX410-Update01 also contains the following non-security bulletins\n ESX410-201101211-UG, ESX410-201101213-UG, ESX410-201101215-UG,\n ESX410-201101202-UG, ESX410-201101203-UG, ESX410-201101204-UG,\n ESX410-201101206-UG, ESX410-201101207-UG, ESX410-201101208-UG,\n ESX410-201101214-UG, ESX410-201101216-UG, ESX410-201101217-UG,\n ESX410-201101218-UG, ESX410-201101219-UG, ESX410-201101220-UG,\n ESX410-201101221-UG, ESX410-201101222-UG, ESX410-201101225-UG. \n\n To install an individual bulletin use esxupdate with the -b option. \n\n\n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5416\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0085\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0086\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0107\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0106\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2928\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0082\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0090\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0093\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0845\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0850\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0886\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0433\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1084\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2070\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2226\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2248\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2521\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2524\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0008\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0415\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0437\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4308\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0003\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0307\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1086\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0410\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0730\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1085\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0291\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0622\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1087\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1173\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1437\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1088\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1187\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1436\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3561\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3554\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2011-02-10 VMSA-2011-0003\nInitial security advisory in conjunction with the release of vCenter\nServer 4.1 Update 1, vCenter Update Manager 4.1 Update 1, ESXi 4.1\nUpdate 1, and ESX 4.1 Update 1 on 2011-02-10. \n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Advisories\nhttp://www.vmware.com/security/advisories\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2011 VMware Inc. All rights reserved. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (MingW32)\n\niEYEARECAAYFAk1U1eoACgkQS2KysvBH1xm3swCfeh4sWvPOubDT1K7QlRj3SjW9\ndxYAmwbNLMR9IG/rKZDYh9hqcf4IldCX\n=2pVj\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ----------------------------------------------------------------------\nDebian Security Advisory DSA-2004-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier\nFebruary 27, 2010 http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage : linux-2.6.24\nVulnerability : privilege escalation/denial of service/sensitive memory leak\nProblem type : local/remote\nDebian-specific: no\nCVE Id(s) : CVE-2009-2691 CVE-2009-2695 CVE-2009-3080 CVE-2009-3726\n CVE-2009-3889 CVE-2009-4005 CVE-2009-4020 CVE-2009-4021\n CVE-2009-4138 CVE-2009-4308 CVE-2009-4536 CVE-2009-4538\n CVE-2010-0003 CVE-2010-0007 CVE-2010-0291 CVE-2010-0410\n CVE-2010-0415 CVE-2010-0622\n\nNOTE: This kernel update marks the final planned kernel security\nupdate for the 2.6.24 kernel in the Debian release \u0027etch\u0027. Although\nsecurity support for \u0027etch\u0027 officially ended on Feburary 15th, 2010,\nthis update was already in preparation before that date. Local users may be\n able to read this data for setuid processes while the ELF binary\n is being loaded. \n\nCVE-2009-2695\n\n Eric Paris provided several fixes to increase the protection\n provided by the mmap_min_addr tunable against NULL pointer\n dereference vulnerabilities. \n\nCVE-2009-3080\n\n Dave Jones reported an issue in the gdth SCSI driver. \n\nCVE-2009-3726\n\n Trond Myklebust reported an issue where a malicious NFS server\n could cause a denial of service condition on its clients by\n returning incorrect attributes during an open call. \n\nCVE-2009-3889\n\n Joe Malicki discovered an issue in the megaraid_sas driver. \n Insufficient permissions on the sysfs dbg_lvl interface allow\n local users to modify the debug logging behavior. \n\nCVE-2009-4005\n\n Roel Kluin discovered an issue in the hfc_usb driver, an ISDN\n driver for Colognechip HFC-S USB chip. A potential read overflow\n exists which may allow remote users to cause a denial of service\n condition (oops). \n\nCVE-2009-4020\n\n Amerigo Wang discovered an issue in the HFS filesystem that would\n allow a denial of service by a local user who has sufficient\n privileges to mount a specially crafted filesystem. Avati discovered an issue in the fuse subsystem. For this to be exploitable, the local user must\n have sufficient privileges to mount a filesystem. \n\nCVE-2009-4536 \u0026 CVE-2009-4538\n\n Fabian Yamaguchi reported issues in the e1000 and e1000e drivers\n for Intel gigabit network adapters which allow remote users to\n bypass packet filters using specially crafted Ethernet frames. \n \nCVE-2010-0003\n\n Andi Kleen reported a defect which allows local users to gain read\n access to memory reachable by the kernel when the\n print-fatal-signals option is enabled. This option is disabled by\n default. \n\nCVE-2010-0007\n\n Florian Westphal reported a lack of capability checking in the\n ebtables netfilter subsystem. If the ebtables module is loaded,\n local users can add and modify ebtables rules. \n\nCVE-2010-0410\n\n Sebastian Krahmer discovered an issue in the netlink connector\n subsystem that permits local users to allocate large amounts of\n system memory resulting in a denial of service (out of memory). \n\nCVE-2010-0415\n\n Ramon de Carvalho Valle discovered an issue in the sys_move_pages\n interface, limited to amd64, ia64 and powerpc64 flavors in Debian. \n\nCVE-2010-0622\n\n Jermome Marchand reported an issue in the futex subsystem that\n allows a local user to force an invalid futex state which results\n in a denial of service (oops). \n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 2.6.24-6~etchnhalf.9etch3. \n\nWe recommend that you upgrade your linux-2.6.24 packages. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386,\nia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.dsc\n Size/MD5 checksum: 5118 e05bb21e7655cbfa39aed8d4fd6842eb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.diff.gz\n Size/MD5 checksum: 4099250 127bad8d653046d37fc52115d4e3a332\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz\n Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 4263554 6c56ff077d17eba766af47544ce0f414\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 83890 62cfd18ed176359831502e70d80b291a\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 46871628 328ad30d3c07f90c56d821f76e186b40\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 1550090 1f114fdc3123f135017dbdcd0e4839c6\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 1009878 c7b7abff092940a400703b9168e46daa\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 98248 a2a391008f8855d8358d5f18d9d76044\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 329786 a212d2b3a94f8a04611c0f20d3d324b9\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 27236282 b5bc553c4bf3a49843c45814fab72443\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 83428 f5f27b9de4905239e6315c77393f1f03\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 83454 5d152b5b6aa505982ebc7122a770b29b\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 26641900 c799e7d48937975036b46edf032ecd87\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 26620162 eb1c3c27f1ac81959dc0f2ab497aee35\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 3455268 da2d2cc2b7c4253ac408c30fcfddb28f\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 329788 f589f8815f7adf02f8884e2dd3ac613f\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 329336 14bf085655b30adc8ab8f6ed4207d415\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 19482308 c49d2962c1a391fb00fb1b5f0598b24e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 3656476 f2f5de65037664d03208fcea83bf2ee2\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 83422 600c7216143f43f9c61b0c2ccd118ea0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 83434 36f1d8f21ec39a473536dbeda2332e62\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 346940 d3f12fdd61f90749fdd08d857b326327\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 9357734 3e1165a0795d7db5f7ed8ef84205064b\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 298744 50d8bfa3c06134e190409399a36c5aa9\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 83546 1742ab93afadd1827009bf1d714e76eb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 83578 07906e33f9ad267d986991c93eef1048\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 10778670 cc38a718ad5fd1c6e92d23e416610bd6\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 308138 34dbc7720b1844833f0b71aa307c37fa\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 310714 6a2c6fbbc1dd000b8a532227e3b8b5ae\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 3939512 91c2ba626e754fe407d6dcf3fa01337a\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 10786892 4d44a4ff751969855a01ad754a7c2b22\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 14375048 fe6ed4dea09aa205d801476667ef03cb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 13847788 4adc3106a987d84e12215156a379f460\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 259624 ac09dcabb624984b7321a5f6b6dbef54\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 83578 e152e18748e5c80b6d06715db836cf83\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 260838 44bc8ad5796c124b53d85a8c3a4ed912\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 262420 ff0641f04c409dd606c34373e8e16269\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 14830990 cce09e8022bee915dcde5dd8b9525428\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 13333594 a4dc863b0c84b9006c723db9a581c92e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 83546 990eb24056c7f6a63a4d55ec39563bae\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 3446386 6ebfa4544252648df48cfb085cc3d2cc\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 258962 75184bed1f0b42cd8e002f93ed42198a\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 3656680 c5499cb98cdcdcadc48e3aa5bdf1d379\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 19214268 e3f564cae5a85355f4b5a9248a11af98\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 19148424 dd1d713c896888370a1667a16571c08c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 346982 6a6a08f74f9690705e6d770d1f3f2566\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 359548 b10fe011746b0df5fbd2587292af34ae\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 19482314 5d9cc150e340aea40e253a757cfdc423\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 83452 32a1614212e964a4423b161b34cd758d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 19213598 4f459c2d2cdb87a6f945cbee7d4500d4\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 358212 58ba32b0701643f043ab38a487cae609\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 83424 c1e8493aff96df5b0fe33f5af4686f98\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 358752 4e3e9ef18a14fd191444591df571f80c\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 3569470 9ae824064bfc785f4b3512db78119e46\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 32206374 badd40dd68e2c6634c65f79d9536e34d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 83432 64a48fa9283b1741e22f0a22dbb93b20\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 83456 235a5572d5e109a4b575080a8262dc57\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 319938 d7dc0120458e93119879dcdd1e48017e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 32025762 7595d7dc21d3273f46b35b8c00b0e195\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 320226 34731a37b519d726b133093e04d937c3\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 22243472 532341ea0847ea19414413f7659ff13d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 248638 ce9da5c377d6328e9bb9be1c3945fff8\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 12001172 817c44fd5afbeef1b9f172522ff21bcb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 10553972 20ddd95631b93efd52ae0aa38a5cd6d4\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 83600 a7b66d71779dea207a3d49cb9f692fdb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 27858364 54998117445c20f413331d1197355745\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 17212542 bf6c996fd387eef151e0db60d1bd00f2\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 313302 314b57dc807eb91f617c10b1497e1617\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 314602 2c127076bf189be2836a4c3a4c7736af\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 3804368 fbcb3bdd668db166ad3f08e6dbfbc6e0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 17194888 9bce41a8b9936a16a3aa9cca675b9638\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 83540 8acdb1b4a4bc57f55b9cc5b2b04043a4\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 229412 0b93c7c909eca04fad4fa45e3e73e96c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 248700 13266a2acd5fcbd75d11049dd5e5ad58\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 218314 4174dec1c73ca114469cbb88fba32926\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 16567710 29d2ab68b4259a1822a2ca19e9494f5d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 309868 d69b27ef946f2ac62b115e0200fe8002\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 26988356 f0d885b353b15dc42e4e76da8a8fb129\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 248150 7c585f74e0752a631050b13b9740c0c3\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 13318088 0b0a8b724245ac10817b03c4cf734827\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 83484 a678208f18017a9c87d45548916fd98e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 311392 5b1f0957a2756b04be6c95ae8ca5e2c8\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 21736368 02da1a4e543b8c5082476b156281cb31\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 247968 929ca712a0aa0984f9dc2a6f68f405a5\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 16632240 c9de1dfccb8a5cb5d5d652ca694a7108\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 3805532 be10a8b64da3adf7ece3846b0b0bf930\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 83434 ac0cb9b5939e4ea82c3c83a1a1d473ed\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 248174 50e84058a7d710f013f92e1fe68a705c\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 322474 2d7e39cf0b78d98125a0baba377f1af0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 19195556 bb2bd8e203cee7b3c6739d5c5d11901a\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 324008 3b021bb4b3dac72dc68e701f4a209939\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 295928 ca2bf1c3c12f409e469c516877a8e91c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 21170062 4022dbff73ebfde3a846ce38896cf09c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 322502 4b76cce255e1fcc72cb82053cd34a1a2\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 17459240 ad749c6e735e58d775b7190ff3d26e50\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 83466 a041c0fdb383832cf725723ce22e40c0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 83430 392d415932625b1a69dc6494d2f737e0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 3674486 200fdcca2140a97f961a37d70db620d5\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 19487244 b42ad8431643d89a1f8b0e6e0aaeb39e\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 83532 a1c34683fe304f1a86bbc28f6cbc654c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 83556 bf7fed1ef4da92d782409fe8345f861a\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 6976486 5b5db16fea4336068bbcd5bff56ad575\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 7228452 75c044fa17d6071de36579a1491c2e1b\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 3431908 18825f85900faca81b21e48d43af6ee7\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 197006 0a44248e77ec1ff027edd032ebe5b2c6\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 1503494 bd7f7b7bd4e120472bf60ad0b7d9184e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 196810 f03114c2f256a97b15f88d2659f9501b\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 83428 1ea7179752fbb45e10e731991583db68\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 263546 ef894d6917cbe692ec9197048538d5e7\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 3651402 a0194c650712040f81e97d5b3b62bc79\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 264892 0b642e20f00b52c20b6ae9e0ee1f78b8\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 83442 6d109d7f131dab564736e2ac6a85dd29\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 13318532 dbce062bfa560c331b75bed073868e1d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 13019464 b0b153fafa43b650e996a9d84bbb26d7\n\n These changes will probably be included in the oldstable distribution on\n its next update. ===========================================================\nUbuntu Security Notice USN-894-1 February 05, 2010\nlinux, linux-source-2.6.15 vulnerabilities\nCVE-2009-4020, CVE-2009-4021, CVE-2009-4031, CVE-2009-4138,\nCVE-2009-4141, CVE-2009-4308, CVE-2009-4536, CVE-2009-4538,\nCVE-2010-0003, CVE-2010-0006, CVE-2010-0007, CVE-2010-0291\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\nUbuntu 9.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n linux-image-2.6.15-55-386 2.6.15-55.82\n linux-image-2.6.15-55-686 2.6.15-55.82\n linux-image-2.6.15-55-amd64-generic 2.6.15-55.82\n linux-image-2.6.15-55-amd64-k8 2.6.15-55.82\n linux-image-2.6.15-55-amd64-server 2.6.15-55.82\n linux-image-2.6.15-55-amd64-xeon 2.6.15-55.82\n linux-image-2.6.15-55-hppa32 2.6.15-55.82\n linux-image-2.6.15-55-hppa32-smp 2.6.15-55.82\n linux-image-2.6.15-55-hppa64 2.6.15-55.82\n linux-image-2.6.15-55-hppa64-smp 2.6.15-55.82\n linux-image-2.6.15-55-itanium 2.6.15-55.82\n linux-image-2.6.15-55-itanium-smp 2.6.15-55.82\n linux-image-2.6.15-55-k7 2.6.15-55.82\n linux-image-2.6.15-55-mckinley 2.6.15-55.82\n linux-image-2.6.15-55-mckinley-smp 2.6.15-55.82\n linux-image-2.6.15-55-powerpc 2.6.15-55.82\n linux-image-2.6.15-55-powerpc-smp 2.6.15-55.82\n linux-image-2.6.15-55-powerpc64-smp 2.6.15-55.82\n linux-image-2.6.15-55-server 2.6.15-55.82\n linux-image-2.6.15-55-server-bigiron 2.6.15-55.82\n linux-image-2.6.15-55-sparc64 2.6.15-55.82\n linux-image-2.6.15-55-sparc64-smp 2.6.15-55.82\n\nUbuntu 8.04 LTS:\n linux-image-2.6.24-27-386 2.6.24-27.65\n linux-image-2.6.24-27-generic 2.6.24-27.65\n linux-image-2.6.24-27-hppa32 2.6.24-27.65\n linux-image-2.6.24-27-hppa64 2.6.24-27.65\n linux-image-2.6.24-27-itanium 2.6.24-27.65\n linux-image-2.6.24-27-lpia 2.6.24-27.65\n linux-image-2.6.24-27-lpiacompat 2.6.24-27.65\n linux-image-2.6.24-27-mckinley 2.6.24-27.65\n linux-image-2.6.24-27-openvz 2.6.24-27.65\n linux-image-2.6.24-27-powerpc 2.6.24-27.65\n linux-image-2.6.24-27-powerpc-smp 2.6.24-27.65\n linux-image-2.6.24-27-powerpc64-smp 2.6.24-27.65\n linux-image-2.6.24-27-rt 2.6.24-27.65\n linux-image-2.6.24-27-server 2.6.24-27.65\n linux-image-2.6.24-27-sparc64 2.6.24-27.65\n linux-image-2.6.24-27-sparc64-smp 2.6.24-27.65\n linux-image-2.6.24-27-virtual 2.6.24-27.65\n linux-image-2.6.24-27-xen 2.6.24-27.65\n\nUbuntu 8.10:\n linux-image-2.6.27-17-generic 2.6.27-17.45\n linux-image-2.6.27-17-server 2.6.27-17.45\n linux-image-2.6.27-17-virtual 2.6.27-17.45\n\nUbuntu 9.04:\n linux-image-2.6.28-18-generic 2.6.28-18.59\n linux-image-2.6.28-18-imx51 2.6.28-18.59\n linux-image-2.6.28-18-iop32x 2.6.28-18.59\n linux-image-2.6.28-18-ixp4xx 2.6.28-18.59\n linux-image-2.6.28-18-lpia 2.6.28-18.59\n linux-image-2.6.28-18-server 2.6.28-18.59\n linux-image-2.6.28-18-versatile 2.6.28-18.59\n linux-image-2.6.28-18-virtual 2.6.28-18.59\n\nUbuntu 9.10:\n kernel-image-2.6.31-108-imx51-di 2.6.31-108.21\n linux-image-2.6.31-19-386 2.6.31-19.56\n linux-image-2.6.31-19-generic 2.6.31-19.56\n linux-image-2.6.31-19-generic-pae 2.6.31-19.56\n linux-image-2.6.31-19-ia64 2.6.31-19.56\n linux-image-2.6.31-19-lpia 2.6.31-19.56\n linux-image-2.6.31-19-powerpc 2.6.31-19.56\n linux-image-2.6.31-19-powerpc-smp 2.6.31-19.56\n linux-image-2.6.31-19-powerpc64-smp 2.6.31-19.56\n linux-image-2.6.31-19-server 2.6.31-19.56\n linux-image-2.6.31-19-sparc64 2.6.31-19.56\n linux-image-2.6.31-19-sparc64-smp 2.6.31-19.56\n linux-image-2.6.31-19-virtual 2.6.31-19.56\n linux-image-2.6.31-211-dove 2.6.31-211.22\n linux-image-2.6.31-211-dove-z0 2.6.31-211.22\n linux-image-2.6.31-304-ec2 2.6.31-304.10\n\nAfter a standard system upgrade you need to reboot your computer to\neffect the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change (except for Ubuntu 6.06)\nthe kernel updates have been given a new version number, which requires\nyou to recompile and reinstall all third party kernel modules you\nmight have installed. Unless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-server, linux-powerpc), a standard system\nupgrade will automatically perform this as well. \n\nDetails follow:\n\nAmerigo Wang and Eric Sesterhenn discovered that the HFS and ext4\nfilesystems did not correctly check certain disk structures. Ubuntu 9.10 was not\naffected. (CVE-2009-4021)\n\nIt was discovered that KVM did not correctly decode certain guest\ninstructions. A local attacker in a guest could exploit this to\ntrigger high scheduling latency in the host, leading to a denial of\nservice. Ubuntu 6.06 was not affected. Ubuntu 6.06 was not\naffected. (CVE-2009-4138)\n\nTavis Ormandy discovered that the kernel did not correctly handle\nO_ASYNC on locked files. Only Ubuntu 9.04 and 9.10 were affected. (CVE-2009-4141)\n\nNeil Horman and Eugene Teo discovered that the e1000 and e1000e\nnetwork drivers did not correctly check the size of Ethernet frames. (CVE-2009-4536, CVE-2009-4538)\n\nIt was discovered that \"print-fatal-signals\" reporting could show\narbitrary kernel memory contents. A local attacker could exploit\nthis, leading to a loss of privacy. (CVE-2010-0003)\n\nOlli Jarva and Tuomo Untinen discovered that IPv6 did not correctly\nhandle jumbo frames. Only Ubuntu 9.04 and 9.10 were\naffected. A local attacker could disrupt network\ntraffic, leading to a denial of service. (CVE-2010-0291)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.diff.gz\n Size/MD5: 2928444 765d0254f54d27d447de8f0b39548848\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.dsc\n Size/MD5: 2921 682576890de917043eccf6fc9398aed2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz\n Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-55.82_all.deb\n Size/MD5: 5170062 ef1a9c95890c4ba600a3e5523d49bb59\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-55.82_all.deb\n Size/MD5: 96386 b184441d2f44037554d037d217688393\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82_all.deb\n Size/MD5: 44742098 b5215eb163e357a179dbf36169ae1fa2\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 22350 d8934981c2fdd09168a5e576cc1b809a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 44768 74be7582e8f82aeb48af59731ce128be\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 2312 d464c76f98a4142add7a69aca1305739\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 36294 a65060e99feff7e2ecef38be6d92fbc3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 102366 04d59c868ce03dc83b69116b022735b8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 38892 e80a653bb000e86f38da594d4bc1742d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 49160 a512718368004f81e83063ea8972c871\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 176612 81ab4c185b3af1dea1a082283c1ec9b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 36776 fcb0833daefa645545a2451824094b21\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 142346 3e6446140bfad0b19c512c69377d8026\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 51060 a11ceed7ccb1b96c2a8b2e7f840061b9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 140710 e1789bb9d7cdd542a862e8ef209de802\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 287606 f3cc835959f215c209dc5a825596849c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 97828 05627ddbba40a6517ae7f8ca75f195c1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 1652102 c9eea2df3fdde2a5e7d2f4dff99e6772\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb\n Size/MD5: 872314 6e8f80e117e13665c95fb75593853d49\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb\n Size/MD5: 872448 1a70a906bccd7642241535f79feddb57\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb\n Size/MD5: 874570 0da9cd27666b58b5328e18dbc01c9b2e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb\n Size/MD5: 872194 375aad441654cdcd2338c5809e6319ad\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_amd64.deb\n Size/MD5: 6926870 c5868857ae3e12da5ffd91ec60d75501\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb\n Size/MD5: 20817720 06e066129d82d4fa8e41a2a058dcb9f0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb\n Size/MD5: 20798158 1e5bf064dc2aab9880b30448d06eba9d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb\n Size/MD5: 21635636 0bb9fd3f753b4dcedf70fa8f36c48467\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb\n Size/MD5: 19905244 a04e5f6463fe334c28598cbf13506043\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 15630 8d1da510f959f7b9a2d0aa73ab80ae39\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 240360 20cd65fa275cfe8a83743ddb5a95f528\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 202666 71d8be83541874d6c675945838b9e223\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 1048610 9125e9e6c294bb450e37643b3ed7397e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 1543634 ff7af4dcfc269a529f0adef3823a7244\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 161692 5623fa9ad6b280d0a5271917e89ca8ab\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 9832 bd5218587371f5b309ef2d1f77f98420\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 80870 20f034d6199d2902130f8bba12f48afe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 49294 e4a805200acaaea274e67995602294e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 35158 0869bee234a54b1afe362123606efe66\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 70890 74ad81f0209c505c41d61c143b90f879\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 6218 ab28cdccb61315cac14d9046821e264d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 9060 6b179cd944eb7f83f03147e09025e6be\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 57924 5465064d051dec863ad3f4f1a91553f6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 123380 18eabdae11c2d77a1694f0cd467107a3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 101078 efbe32714c0fed5aec8a70095af299df\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 79272 2fbe8585b11e0fa73fad8e94298082bf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 1595398 3e11b94ed4701d1d84b6aeb303782d97\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 72352 e413c3057779de1b3c8f0c4d8d7fb577\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 12648 41487d8dc828d7f94a5c8ed495f06a99\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 33806 ebf707126fa6326899d648786afa8779\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 138512 ff1e0d4f0e9c5efc7bbae4d92194da5d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 38938 75eb074224a6373013e621cdd5931a51\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 278876 1586e5c6fc3fedf7f63f19c35a4fd9e8\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 18976 940a7c03cfe47e9d0543f49849c8765f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 43482 466c625f614e3624fa548bc5f96efa74\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 105216 d45ce18fb4d9c2cf5da6d14ae69a86c4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 2284 de2293fa5c6e5493307a1913b606ad20\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 34572 4e302b4f7144fd504b2475a4103a3bf5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 97044 eeafb6c943244dd33659e7e7db9a9f76\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 37128 d4d67e516f236bf54a00697b71a3219b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 44122 1657e3520cbd2fbc832cf91bd6366a38\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 167738 7431ddaa7c8f0c9b6e583129cdc839f7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 33954 8251d509fb9bacd314f62cc90bda5b96\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 137972 9b8295fffc47ab4cf16ec34f7ef8b7aa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 46892 c12096744faa1ca0735b62ea045b0c65\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 133162 5805bb2e2bfab6158d8d217b08079cc2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 273806 be7956f256f494fe4f40e7e7129bdcd7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 102330 d6a81f9c342c0ebe2010b66d4a7c59ae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 1597678 ab989d0c749b837c67a2a839f139fbb2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-386_2.6.15-55.82_i386.deb\n Size/MD5: 863294 c444f51c8b2752c6a7bb7e6890917ae2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-686_2.6.15-55.82_i386.deb\n Size/MD5: 862506 1508b314277964abb0d05e8a274d2a26\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-k7_2.6.15-55.82_i386.deb\n Size/MD5: 863628 69ee54c68825997e29779c3a2ab66625\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb\n Size/MD5: 866414 fa045eb17626dde56b96d70431e9515b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server_2.6.15-55.82_i386.deb\n Size/MD5: 865826 30916e33e56490d9a2acf31c03690e64\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_i386.deb\n Size/MD5: 6918500 a2bb7aa892eb2d21ea3d04f519b72482\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-386_2.6.15-55.82_i386.deb\n Size/MD5: 21724666 e1390cea2d5e21dee938aaf3f88786f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-686_2.6.15-55.82_i386.deb\n Size/MD5: 22516786 35a5512e74cf490346c35fd56f695fca\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-k7_2.6.15-55.82_i386.deb\n Size/MD5: 22265258 07155a925272e66ace552f82d16b1b79\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb\n Size/MD5: 23626692 d229112410ce8c9c9947f2f7cd32c883\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server_2.6.15-55.82_i386.deb\n Size/MD5: 23179552 9b108d16a1fc1716b78c4417150e311e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 15512 4a2a37534dc2bc6b0ce12df135d07105\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 238510 544c418a7426a5248e33ff549c6f4035\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 197134 9ec57cc477f5bc4e0dba11002d3988e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 1048370 cd87ff58b5cbea9c04eac21cf1b0784c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 1741406 0b97758852f283e148ec2ce290e678ef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 160884 ce6d2a16b8a3af5706b694fe6f8ac4f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 9162 d5f4619ccc32c2ed8296823cd3c19e3e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 76468 9f0911cef3a4b7afb14f1bd537ad337e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 53554 afc415fd0a28c363579986fc48464671\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 33048 c710f55e8853bec0935df3338f2370c2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 85618 b6ed96be15afaf31e6670a78ff1f4733\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 6024 b0a622b932e40a7011d5e9ec9bd21eb3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 8762 6234ceb3aa1422433ee60ad4305c03e7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 53636 e1a35b8801fb949295040028cd2cba5e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 130970 25d88aae6168f72c58ca17584b3f83e0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 98468 ddb974591a687460f50c26a2e2682593\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 77212 a9ec9f2fe551ec07e56200b26f1de4f8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 1768830 477e2985e9f1fd2d4f333d651ce07e2f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 69612 2547b29a65a8391d3a085bbf2ce476aa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 11764 88566d97534c428d1ef6b01b5adde2ab\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 36102 10638cf7adf98d9afcc1e1475dbaf05c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 132672 fa6f13f8c0c0d017f50dc160bf2961fc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 38578 32976528861368cdb936d5db4fc0c2b5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 299158 458051a07217501718f6e2a742bec0a3\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 23726 0fbb9855c5833cb24187a701c10cdfbe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 26006 87108baca7e8450f580be0f6c77d95de\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 49328 c6fe9fa1f1e132f4906b21e555bfb079\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 51536 d2c7a02ac033097208c359312e95d246\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2308 5b98b064d0e5c18d8c32caa86b2e43e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2482 3c964c577c93d80cee55d06e78003951\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 40306 ad5c5c36d7dc08add999f8cf47d53b72\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 43848 0cfb559dfe56e4a50c99537f98392827\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 112606 9994a8d2bb1c9a45cf43416faca7f9fe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 120734 092bb2c1dfcece144429a277f96b56e9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 40906 84f84dc75718a347eb6623204cab6209\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 45996 69f5b1a8a9e82414d868ae459109f32c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 29024 1a12ad8c384bd5195208ce7eb478c011\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 29892 4a807f384985ae3376d509474716f13a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 211398 2e302e02bf08226ad9bf45c3a04840b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 225174 0c4edfa7ccdb502d5aefc7b02a2e81e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 45054 a2373aac90339698b2cba11e43978565\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 40220 06b0e3234fd6b0125df72fc04c4d0562\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1934 0887612df6acbc867949c33251427c00\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2198 d38a4ec22579275ff2f48805be734356\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 80760 0a71c80867de5b11bd73c9c6d2751448\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 86134 0531dff0f43a6073ae4e71e93e1d77ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 111580 ab42bedd2a1e1687015d5b6b4b327484\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 125734 3c526ccc2348c1f6dd65829c96fb1381\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 53412 13f7a9a412c8c38c4a22a0f4db2a2bd9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 58486 0a62b4bc8aa5f594de9efc6b9f1dec6a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 147964 9751a30ed03bc5bde2b48be1e5dce6e3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 161908 70564b18529d383509cb4c1d4898425a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 318412 7944aa213ac28d37d390b48b3d5a9a8d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 288032 2b93681e1b268517863ee4bf27ba0899\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 115862 3cd4a494b7d9652bd77eb9dda6d2eeb9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 116548 a40033c7a63dda0aa5911caf2dd7f49a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1925072 2c1fefed78a6ebc795887a2f27c9db4e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2449126 39606af1d24872f0ff053ef5ddf790bd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb\n Size/MD5: 872990 d1ced46d4302cb78b2d47c5ea678d6bc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb\n Size/MD5: 872596 8602056ab95806f02667587737cb3b59\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb\n Size/MD5: 865624 336f5e63d1fc8a9f55e7e36f4177f54a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_powerpc.deb\n Size/MD5: 6947694 9ab99966a30e44788549998ae0e26798\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb\n Size/MD5: 22783922 2c7ace12a48de978cea2e7e939c3c900\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb\n Size/MD5: 23693062 18b76996711d54f91edd68a52b45d666\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb\n Size/MD5: 22365356 f8a73866c9b4334ace774f26ddaa0e38\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 17782 6a4cc5fc57579f3f602f582acb1231fb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 17386 1abc2376b554610aec23e87f60998358\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 261350 a2a6eff082f29827c9505b45dee47f7d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 282620 93ef7729a3cc9f4639e9d34c8782d8c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 227808 73c5142c206284bb244b59586a93d8b6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 248952 d0c1d09bb0b125ae113a70baa7a06cc0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1048470 66d28a86b670f1166faeb1c25a1547ad\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1048600 178ea75b2bd02ef3b01c4cf940b6a713\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1738490 8fdc1918d06d76e358e7645e24d763b5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1878020 0b6e4cc3971bb034e26a3aee110cbc58\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 250814 c48a5e0837fa30e3b1480c113c02d963\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 233524 676bf7f8905001fea721689f23ae5f6e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 13054 73a21ffbe4470fe4108886ee20990c35\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 13528 1105da0ce6deb9d13a19e8b6398827db\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 84794 ccbc384bd76aacf39ac078437d709d51\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 52204 acd012d94fac6fd62028de4920ff5a67\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 73922 a2d1c6a539934c1a852cf0b2c56ada43\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 85854 59c8914383ae0624690950d8f844c101\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 6624 b926e6807098f087b5eab77015ef1aee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 7058 43cb29678a86a4ace2a784ef2c2e8843\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 60378 183583ac6a0ab738109499861a861ca2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 70420 da9263ada0b850362f022c36b6769f22\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 128550 5eaff599374f099cbb06bb709f1ce68c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 157944 8ef2e5efb4749e8e1725c58a185871bd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 108166 1a09b1fb98eb414ba847dc8634a28a62\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 126130 e2ae3a3d5d06c8e6a5394c2262381438\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 87294 610a552fd6a9c960f64c8ed4a74c5b39\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 93362 a7434712a48c99eba3cfd1dcdf4db489\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2014708 a089ebb3c11c6fd25f65c069adc4f1cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1988690 049558cbf765292686c49fc8e180ca0f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 104130 cfa3ef8f4085a002160c319cdc9899ed\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 115790 ac0661102201e3f682eda1052d987671\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 12738 f683a291e68f38a5c2785aed5452f77c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 14444 24e22f4de6be23c1fe122e8c3dbdfdc0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 39950 b8aa9421b4aaf324bc7349b026e3c30e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 41540 c174de599d57427fbbe0544bdea28cf0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 149344 f742184c85574c83ec84aa70cb9cdfea\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 168082 6f375034031b861fe42ba973c9390ded\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 42310 e24ddfc7d97416cdca5325a9ce197781\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 44918 de0152b64cf3da754a73ba952625e15b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 320326 87594e9f43ab0dff57a8ae731be77dfa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 324872 a53f9d6f2e8118894b3c5ee8a98b7441\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 50476 aea13d5d96a87d5b3a0cb897605f8226\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 2358 b0af3cd8de1581e95acdba1dd91796e9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 40380 c083f0781fb33b64329d10c233affde2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 110556 cea10ae3446945f5dcc6b94a8050b4ad\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 41214 b0728ed58d1e1a5bcc4309849d773e91\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 104224 54844dc4f0225e051453b6a01934edb3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 7438 7cfdeca11c465cea2c2e8d768b39969e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 149304 958f0b630326763cddddce5503f3319d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 1712530 f967805acb454413bbcc2f377f5b3e36\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb\n Size/MD5: 773010 979da22c264d122841ea140319b365ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb\n Size/MD5: 772604 3106b0711e0e311f93d92624247f1eea\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_sparc.deb\n Size/MD5: 6964184 fb615cef69d2a79b16cfda4b67bf4e50\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb\n Size/MD5: 15017856 479231852577fdd0e402556287a02059\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb\n Size/MD5: 14831912 1bd18f6f1ccc6b70379e267a0173b9bb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 7436 87e52fb1ba93a9e9763a0f3984bc15a5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 248758 bc3db8ee9c85b0aaf1ec03290ae41cf3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 212566 70a9e482f9be5074d90bbd4ae5cf1246\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 1048480 c535170499441feef6ef8b3062de2d30\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 1482394 247faeb24ed7d02526dc54dfb194dec4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 10118 28a82b2b4d4934c028952b17676d515a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 40178 d44c9cb160749b87062ff38c0fc11340\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 9370 c7d50aabcba6ff111825da92f10dd219\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 61398 df892cd2f9e118248246eb7d3c273df4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 163276 481deef18ee50e039791747737619c3e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 64096 9ebc582fc849cdcf71ee887937313a22\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 1235396 479e0c0baad9c8cf96fe44603c2fb9b9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 59308 83efde441d0de3f09bb163e53016a300\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 37430 3646c295a3bbadafbe6df1fb22d8391e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 280132 311d2d465db827f3e3f2e95bc265ddb6\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.diff.gz\n Size/MD5: 4747158 57102623f2993049cb4d309f75748b5f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.dsc\n Size/MD5: 2689 3d66528dd1a11628dd0e2ec5fadfa2b0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz\n Size/MD5: 59085601 e4aad2f8c445505cbbfa92864f5941ab\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-27.65_all.deb\n Size/MD5: 4930936 41797a4c4537dc9e4abb06f5b811a6f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27_2.6.24-27.65_all.deb\n Size/MD5: 8146690 ea0f32ddeaa300bc68f90838a6466257\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-27.65_all.deb\n Size/MD5: 99216 bec450b038c03760a6f369323af1a0d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-27.65_all.deb\n Size/MD5: 46970850 cadaea7041848682d5e46a181aa43fb4\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 28614 de37ceb847d7f811723dee03e7fc9ab9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 224184 6b392a2ef779b2048c78f46c1e833e2f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 52646 2c736bab70f1efeade320f9062b74729\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 40644 a6209cbd666c38e1c4bc75115fda79f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 48646 6affd584126a9ecd4d3560dfa69a201f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 86332 097b613836ca5101cd37cabfe7299adc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 36316 f3915273cbd0e4a218a543ac525d7674\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 648728 9021fcdfc468efb5a2994dab918aad7a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 209928 967a98f6cfa9c56dcecbe0872e98b617\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 39194 5ad172f156b5e2ba43fee3a69a09fb49\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 67996 9ca474a40f4225116d7d9befcde4dbb5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 145458 3e087634d61556643c32e342214a0642\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 287262 202933f0bb0a3d09ae278a991139eaf1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 2130554 f0a40b4f0002803063b074d4b2b22775\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_amd64.deb\n Size/MD5: 673974 3ee01bd889b29b761f96eab35f839815\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_amd64.deb\n Size/MD5: 1252948 e0734c904a26acf9daadc8dc13a5331c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_amd64.deb\n Size/MD5: 1274832 4784ef460e510677dd0c62ba0e5d75a3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_amd64.deb\n Size/MD5: 674092 b2b2090661ff113ec00e1b08627238c3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_amd64.deb\n Size/MD5: 1084370 ef5cd734b586855f7b94d5b93bb51c42\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_amd64.deb\n Size/MD5: 17809172 46d4f01f3cb62fc8c006c25d291bdbde\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_amd64.deb\n Size/MD5: 17781410 589743282c76d9ae95751cefae7dcd1f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_amd64.deb\n Size/MD5: 21055946 71c5ed78b283260aa76abe43a5199869\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_amd64.deb\n Size/MD5: 21440010 76e220b0a64e1b1fb76a54aaa5cde808\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_amd64.deb\n Size/MD5: 707586 4d51f71c8ac5227c9f02fbc0c6552453\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 263678 73ef23d338fe298802ae13ea52af05a1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 176420 0709db4bda579f5146063e7bedeef8cf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 254102 7b20912de5e61b0206319019c4800ef1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 1641364 98d7399720bae5a9d3e1637cc6f13ce9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 143718 419053c97211aea3dd9b2aa0833bc6bc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 164466 16e2d4ad08a10d9e9d2b33dbee4c08ba\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 115858 74f2c34acf328f485356f38e86eb6aa2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 35056 5307b10f96b76f43c0bf983007f36021\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 64412 7cf4750ba6f0dd63678eae705da55fbf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 69706 dedcbc58256ac2a43ed625eb7cae6e81\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 21598 6d6c27b8756a70466451449e096bd149\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 8622 4414757aa7034cafa1e98d8bacf080f9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 57232 8690d6c34e1ec87d85b2c20cb280acb9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 103044 73c875b66060da7f1d39f2a5f8eecf36\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 1212518 6e237c8e863f3cea5cc702afbd925b77\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 45500 1883d8bdf4ed7b2aebc1a407502bd556\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 12780 fa12802bfa4f6847c5409d4882e9aa9a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 498032 d5e81ea5e16357ae1be8c0ac77685256\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 75048 24c6c2fa1972611542270d68ccae59a6\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_amd64.deb\n Size/MD5: 19256730 d7f5e8ae9464748ac2a6dbc46ed9f1c1\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_amd64.deb\n Size/MD5: 17909990 e4e3916570b7b5f06645d2623111b0ef\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_amd64.deb\n Size/MD5: 18911564 fd71e9397f8919af683848aa456c885f\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 23690 ceb5d148f00965516252470b41d00b56\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 26794 50bb7020338de7d00265de0765578291\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 218818 a3b52dd67e9817d4e60d8b048f542717\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 220482 60bf430685f9b39568dbb078edf6041c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 51932 f708bc6cc86f313031745601d3d31aa9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 52068 bd20c8c1eb151b2b8d989d5081f8386b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 38326 aeea101daeed1f87bb30f67c4011d737\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 39080 b8fc6fd4c6fa20a8cf2a92e150a1b969\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 45990 9c06ca831da0f4183ef6e15af4e9b3cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 46170 8d8cb61faaaf267e135ecd2844afd195\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 83246 6941b39723fc655f7dcf2846e5c8a47e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 83662 d3f22aca87d23a99c75b3e6464eb22fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 32396 402518c87d72b3dfc41656de51ebaa64\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 32672 7135f346092b651dafed111b91aee44d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 637694 e32a7d7a367597e18b305f6d97b93630\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 655982 7e8f7f69c261eaa0ce58ddb865205698\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 209878 1ca7ab42cb7cd39e37e711fabaae8b99\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 213640 bfc69b0b0b29485a95605fe7e091dd5c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 46544 90ef4a74882d5770a3f7d888ba288b35\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 47602 e55422dc48484675642c96bdbc673595\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 62270 cc798227f68e2c8c1d8a54b03bf0058a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 63626 a2d3587a68e63d2cf90e1cd3790d1079\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 130538 c07adcef7438ef51821f9a8b750f7973\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 137028 068fdde4394c7850abba6ea81e69c801\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 279080 76c07612b0081c38122b1929c7f19f34\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 277690 c635d04d78592fe9792024e84682ccc7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 2012458 d372c1d872861cd7c84ea9d06c4e8162\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 2089276 69416120cd161789b598b2b93034db07\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-386_2.6.24-27.65_i386.deb\n Size/MD5: 655314 4adb56a8d5211bba1acc02d76e9fb65d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_i386.deb\n Size/MD5: 658154 7d6f7bccbf83f9a32664588ab5faaabe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_i386.deb\n Size/MD5: 1242098 c22eebab07e9ce3d85526ce2945da263\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_i386.deb\n Size/MD5: 1262772 85fe04ee16e27b961017cf148c4f1d21\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_i386.deb\n Size/MD5: 659870 a3ebd23356d57307d124b62faf3fc2a2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-virtual_2.6.24-27.65_i386.deb\n Size/MD5: 561726 410d756762ce992d36864ce38efc2e1d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_i386.deb\n Size/MD5: 1059932 350947cab60fcafb13483ab14ca0ff95\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-386_2.6.24-27.65_i386.deb\n Size/MD5: 18380540 1da620cffb3b62617fc8213134b951e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_i386.deb\n Size/MD5: 18401264 dd7b7991e7f843ebcae7bc5c8700636d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_i386.deb\n Size/MD5: 18513796 c8b5dac38c445a72681bd5dd1c9a1f98\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-virtual_2.6.24-27.65_i386.deb\n Size/MD5: 8730742 fc3305910b00833b509a4e34199e4a67\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-386_2.6.24-27.65_i386.deb\n Size/MD5: 25540786 ce01c05207f08195efd8b88b83a93549\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_i386.deb\n Size/MD5: 26356028 ed8deb0b2243fd649476c43d245a9690\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_i386.deb\n Size/MD5: 27372622 d07e093dc192ad5a49be8c45b5c85dd4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-virtual_2.6.24-27.65_i386.deb\n Size/MD5: 24872642 c28ebc89c9a427352186dea53d81ffe8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_i386.deb\n Size/MD5: 707576 d26794effd4e857da1db4d28e9407611\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 258852 b86f8c37480cbd19131432c908013dd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 264136 631fc78981097e46ee5643ec3cfc5616\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 163268 1c98e7380c4f80c461a6181344914fea\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 163034 9cc84b270528d0fef36320974b415392\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 236710 755a3caeceece8650e46706804c6e072\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 244984 cc330be20f314b308aa0fbcf95c0370c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 1810274 169e24dc79c5fbde1ca1a2a5520286d7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 1827436 cf166d9cdca76a06fd78b1a0669ed67b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 150836 169c287e6bc754d02924a719d34aad29\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 143018 ee925199234ec977618a5c3c3b03954f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 156072 9ff98bc4b62d033785de95858201c353\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 157158 75cdc15de6d5bdc90e05789eb00fe29d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 107222 37ce3c67bd74d5040aa4d22223cbb486\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 108526 7e50df25fcc29d44c2cfdc3e5c046a66\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 32958 b1b4b1a1b95db3b09923a39eb42c28e4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 33388 860c1b56a45914246929757c815f5ec4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 60694 99aca1f49a5cd919f85ef1600ca757ef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 61158 bbe05be947e606b614108423a7ca0b83\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 82652 8ffbf8ae116bd81b7632e2e3a58e0a76\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 82954 1532b447c1a1cc43d1cbf46b1e14020f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 48562 d2569ab07923f67de18ed6c63940351c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 48452 dcf73534ccf880da82f6ec8bdad54db7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 8192 2c3bac93f50147f7f67fffdcbb601b66\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 8444 375a2103e5890c501433ae5b3d912fbb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 51104 8d242482ce8adca7ec8f5d0a40c04c20\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 52950 8449d644f2a2455da01bf48922757fd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 92156 232f32e69ea0f4daf4a17ad68542e45f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 92446 6525df043e2a865a6eb646f015140e31\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 1443710 2746c7d1f27f2638dd6f141c5d7e68ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 1427036 d049929f20e6cbec8c7338977af873a7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 43240 53538a90e2ae8dae72a91a8aa79ecb90\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 42806 3b1d48b0e38b9acebe7581278a8e0408\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 11402 83264faacaa7ff9c249144d8dd0061b0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 12016 7e17c39f818116eae09203af5f5dd870\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 470484 bede1d05dc08ab51105feaff29b39093\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 472422 d08cc1bf2e88df1908f35afc77fd696a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 70518 751bdd069d86773b5a3cfc67a09b46a4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 71382 3aa45fd7cdb245416c60a2210066a353\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_i386.deb\n Size/MD5: 20248150 fad37a976e62eb5c73f906fd44070b5a\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_i386.deb\n Size/MD5: 18543176 2f3a767f3505c51ebac878d921d3f3d8\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_i386.deb\n Size/MD5: 18782962 8a5a3287d174aa7fd1cceb71be94f347\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpia_2.6.24-27.65_lpia.deb\n Size/MD5: 639434 d3cfd21a90ea311f0b1efa2ac28dfac0\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb\n Size/MD5: 705462 81a381fb023a0e0074d8cfaa7fca88b8\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_lpia.deb\n Size/MD5: 707532 c6bf8f82d8bbc4e2320343f58629a562\n http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpia_2.6.24-27.65_lpia.deb\n Size/MD5: 14516344 29b153dcb44d72c1e5862191cb266c6b\n http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb\n Size/MD5: 19816106 947ff90add29d1fc18a69145f39341d1\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 334046 06512921aae848be603af54dc56f72e6\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 318530 4e8164b49e3ad90d33c9275bd1c7b45d\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 62718 e53308b729496be4a0e343535769c74e\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 73002 10bf1560cb8abc507ea079f6a495f91b\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 41442 a9d6733876fcf91a271eb189eaffcb37\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 47826 1d54194b81d12ac7b00b910f625f7a59\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 89506 1d66e8fc56eb6437f783cb677e6c7061\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 105746 034c14e0418581e1b8b56913246e96de\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 44824 5430e2953cc84d26fd0c8e8c4e323a92\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 40932 93dc2a167cf8ab1d80426dd296997295\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 704830 ef370acc49192e464ef553984e361d88\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 770960 ac691fac4ab28cb6d9627fa6b7a5b773\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 243328 b280fefee27294e988529239616e68fe\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 246310 c1d7e140ca2ba026b6a168c6c9748476\n http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 69160 665a09e07612701e5c6bc7efee856e5c\n http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 132586 f0e732beade4d5154e887aaa1b1f3625\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 70252 d8f056e2c9d8aabe9acacfbe4e6c9de0\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 77462 d69a84be1856d83b83faf1fa820803f6\n http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 146272 11a1d0911e3fda9667661975972e08b2\n http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 165002 c4276844b0ea79946508c0cd3a816541\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 387992 53b23049b6f79a9609349927adec3443\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 350468 694a94354856e10bcc935e2a7ba38a51\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 2431460 3a8171d7d1e7e6b37573c6679812d2ae\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 3473330 1037b52b34e3b26b05f68bfafb48850a\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb\n Size/MD5: 652854 26483fb509f744914f646c49eb7b4d6c\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb\n Size/MD5: 657530 98dd4c49966d886237bed19fddb84057\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb\n Size/MD5: 652742 c9f225771751b175bc9a3d1ccb9b2b91\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb\n Size/MD5: 20175388 98b77e06737b717f07a9f436bf292879\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb\n Size/MD5: 21378902 be6b07df3db6828d5d795954b3ad3c49\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb\n Size/MD5: 19948474 1a42e203300936a0a6bbd91270ac925d\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_powerpc.deb\n Size/MD5: 697738 b5f3e2a2bf27249b08f44ca708c75305\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 266748 d71a805e23acc800f21449d312975e04\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 307732 90c6243c8802cdc121bdf92145f7dc17\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 192250 b114447f81aee3dfc51a3c40f2015d66\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 201688 94056840984e621b385099d261ce2420\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 272012 b6790aca1401ed43b8c04befaef9af51\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 306006 50b970f3b69d4eda6d3e59353c9db152\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 1807766 ec7ddb35df35bb103f7fa00168c827cd\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 2119612 ee4db3863509964860b0a24a9a6d5951\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 235186 b6a1a89f7279818e17cac5d5b3a8b86e\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 225404 baf5ea09bdbab57626dee3afb306a39b\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 170438 b6bae0ce9350745a5c5ba8d969ae34ef\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 199752 9d4225f0960410c78279f61aa02471da\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 117942 e88c2b968d47d71ef068dcb5abd4d9fd\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 139272 5f4576b20a9dc27976d521d0942ad0c9\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 45372 918120c1bd011bbbb8b95529c0978f09\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 46836 10f5de3e02406e28d373098a6613860b\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 51132 610f6b349ffcb68ca7f58dc7928a7558\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 60292 9b17fdf2d2aa9cbcfd3dbfb1bfc3af41\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 74186 053cc99e1839e95e6e48198a187c3e48\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 87220 b730de88a2ee8d0b1503d2ee30f13e69\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 76092 0a6aab3a33606ec7e97d474de29a47db\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 30230 76c4d08ce66715d75db459c89405a0fb\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 8486 80580934d5e5f6909c396732bedf2055\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 10030 4e52e0e6b321b919404ffa406ccc2da1\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 57438 24e1b5d61bcbe2b2faf9f31d9b6f7d3b\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 68746 1b541e58e95b8022b84e7d050db97ecc\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 101184 97ff0fdbf93ef2526b1a97b962592e37\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 147834 eb62d695f6da016ae938924414bd15ed\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 1565722 3bf6b2bd7ef98c403f8cedf220978814\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 1514590 307c47dc707e3c96384e6ce043c745be\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 76672 863a1d5aaef2e7d8f5ec43318a2b3f7a\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 85976 b6bedff825f704ceb1269488d698bfbf\n http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 12702 cc2c9e83433b8f4092748b933292a46b\n http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 14560 60c8e6f2c5425b8bfea2cbee00dd50c2\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 449632 ff75fd65c13af279e6652e0d09505887\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 504134 364077fbb2c074eb8852249a757b89ae\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 83682 bcafd92384fdae95293c310f83443303\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 108840 2254f5416b8a0cd8d1cd52a57d7a064a\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 59570 0a8a1c6f109f6620c74d81880a6836ef\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 71732 e29b3839ae80a5cc8b8ca1756569e0bb\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 42454 35c72663f93201098e40f0fc36232ccc\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 91776 d7f14f387c9d325ba87761a2da581b5c\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 587190 a4606a71370a3dec9dc6a3aba35ec115\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 171076 2f15afec1e2aa78035659ac46b010cb3\n http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 22356 aa2c6396604a45f318881df2e562f625\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 46058 5633652b0f71f9e2098ce2798e29269f\n http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 152976 d7cbf92b5ae85f379d0335c693ccc256\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 2135270 f05d76791e5538fa887f7731d170dc58\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb\n Size/MD5: 565588 5d632e2a56604e4feff30e310f17f024\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb\n Size/MD5: 563928 4b591c5db77c0f5bc41ffff32a14ee31\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb\n Size/MD5: 14098262 0170c4f2c460270add65ba17eb7acfd0\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb\n Size/MD5: 13830862 e4b6c695ad5b3e4ad0b428947b4fd388\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_sparc.deb\n Size/MD5: 752654 6e9b50c2f72a60edf4df6e51d5448cc7\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 270064 879ee6667df636551d565e10ae5162fd\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 190360 388a92b9849a34e99f6a3d2817ca9b05\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 263030 82e8bd5f9f922af935f6f787942f4b2f\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 1386520 98436d21f7255a6c923b50900bd2de4d\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 175444 37239b1899dd449d5b4985163c46d678\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 122106 1b86f75278b7fab22bbffd2c0010eef5\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 40398 81325db98acd64573c100455f0cb5289\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 48060 dd1b8744fcecf5959d2dac4a23b8cd34\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 8698 a2a5a2941546e0137d8c57a38ba9ab2f\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 60516 08d388a60ac9be5c7d80d479f94fd4aa\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 106838 b350cddddb73537859dce8203c49ac1d\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 1002034 0756e59f467bdefbc26dcb06a6201457\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 9518 7bf2df83ac5364fef90bf13ea616e7e3\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 391514 9e98f9f4757387d261d6c7a1e8c7d61d\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 75924 b375f2838ce3f024a9f2b58d02f9d98e\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.diff.gz\n Size/MD5: 3279295 99a1653c9f3eb96475ee9776faff3701\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.dsc\n Size/MD5: 2761 3b7c2f9d1b970a69db9a1c2c2bd5d95c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz\n Size/MD5: 63721466 482b04f680ce6676114ccfaaf8f66a55\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-17.45_all.deb\n Size/MD5: 3492310 1dbaf1873425d41dfce3b359fc95728e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17_2.6.27-17.45_all.deb\n Size/MD5: 5906568 e4cb3deaf39ad7c3917d33f0f1082a40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-17.45_all.deb\n Size/MD5: 52050112 2852d57c251b525e97d6ba66a94f1be5\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 36530 ae958becd299698d5f30f722eb07cde7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 265218 1de0174009daaf9e0d3fb8f8e737fa40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 53438 46087922e5b4128b6a5f52dcacfbf840\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 43030 e25c2b8fbd4f46654a1ebc6089ef31bc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 52344 4c16a22c0fe8f2a967f1503953ed5f8c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 89844 4cc23c275cc1fd6621ac977881b91345\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 38180 24f5566a9c89334d394fb48d7c3d4949\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 677070 84220f4d0562b59edd2f0865120d4494\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 158618 edbaf560c5847b8f520ad94cd3f8d2d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 46346 90f299bb91f23a67e0811ae8e0472e70\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 154240 3ccfee605d2ef5a5e87aeb71320b337b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 313106 896f96e4eb01ff9381aaa78b6e1dc72d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 2604320 b50756ed8aeeee4a72873b8c60df10b6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_amd64.deb\n Size/MD5: 663304 ef966b97630e8096fcf279d6c43b3960\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_amd64.deb\n Size/MD5: 662184 599a4bf3bad78733d35ad1b4a5601a25\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_amd64.deb\n Size/MD5: 23073032 96da11b5c1a75a1694b4047c1a71b091\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_amd64.deb\n Size/MD5: 23071096 162a682066d9c7d90df92c975698b2cd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_amd64.deb\n Size/MD5: 10479836 39042ef6e7f9049837b4d137450dc41a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_amd64.deb\n Size/MD5: 675844 3d711e518906ef37120bccabeaa1da2d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 434926 cc27207ed63847b17eab47e1978c98fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 186500 940e6b351f4975369720543184596a04\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 275594 b525586af57630fd8b4e098cef404ad9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 1810688 13f3abe5b38ff8a704c985dc8f3275b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 151324 d883249df4fb86d6d9d1146db5fa1020\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 194282 ee6a6162a8b0615e73a89978fcb9d172\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 168150 696ed64f02936c7200cc9a468302de40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 36428 ff94b9ab68b2108fd9d1d2475c211725\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 83436 3dceac801e8b0405790e1a28c960183f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 71992 2b936af85a4eceb6312ad7ef93a18c88\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 23240 1d34a195f16d39f7895a2bf36281a6c8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 9012 454b1c03d70fbf4a917ff2431b6b4f2b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 68544 cd2e39978716c3448e54d6862877957c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 110302 ecb1005946c139f2340aaee3e80cd152\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 1276186 d93285c15892be57cfb76798c746f88d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 47602 d2039335dc8bb4104fbb473b5ada0d96\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 13480 5299f432e2db456a3e0743fd786c18f1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 393936 83cfaf207498b9a60d4e97cd21309095\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 200806 5dfbdf4ce61cbe469582c94509160a42\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 13614 c860448fa643364e8776a4947cff9714\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 33948 74da15b4b68dc6a03f2da65175b021bd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 244732 aee21df42a017731c52c53100cbf2f20\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 55398 f4d1c18a70aec1e3e39572c36318115c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 41206 42a8188a1ad868fa58aa779b31908d65\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 48698 7e06c0fbdb39f426e1259d35e8f1505e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 86942 49099dad48131ce191b10c154f096d6a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 34064 c8cf2cb88451687abb047df2faae44f9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 675492 3e953f324652ef7a01f93aeaa2dc5e55\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 158402 aa593e2736e7b717ea8c561b1e11c27b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 43624 b2ca8774a7cf447123ea811781e80dbf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 145226 0fbb95dc0bc59baf91447250f19e7d45\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 302390 991c8e4ef2dda71d6deda5599129a768\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 2436572 4b845d0a28c2b48ad0c29521bae3a0b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_i386.deb\n Size/MD5: 645046 28f8ea5f653057c350d40feb64d68f2d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_i386.deb\n Size/MD5: 645340 a4d347f729beffbf9ff1701d21a5f9b2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_i386.deb\n Size/MD5: 23499764 59f3275c547e9f13f97eba55955725f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_i386.deb\n Size/MD5: 23635906 c096ba5db0db8b87f67309a9e9c6ff5f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_i386.deb\n Size/MD5: 10117090 7e1648c7b3a3ab2606263ecb20683ba1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_i386.deb\n Size/MD5: 675850 3e91710602fec2d4aebafe62a6cdfe80\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 433078 d1439530f50069f41b4c30b010871b4f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 171298 68b786d8853574467c792efe3fa62ca5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 264104 3a49c641e4a146fdb634b298c51ca6e9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 1994518 105c6b0fb8b650949da502f3fee2018d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 150964 dc4178cced6d9c1823d24b2204c15ae9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 184058 a25940b16b7022a52f7b8c78e164a908\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 157856 c628cef1c909819dab1fe2d812dffeba\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 34500 2ea55d8e77aa3065af30ff4d440c059d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 78286 6d0f7704cdff848dbbfbd5fe60cf0ca7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 86190 c7d8ec25c3d35ea8455e9cf7c1b4ec64\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 51332 79b56b5e7f79a17d45fb7c55f64954b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 8796 e571105caa3bed5fc3576928b03eff31\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 64316 bcb0f12340567e9db7a5dcc3549dcf0e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 102092 a2556a5171c52abe48ba423b008c6f13\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 1450234 339572f5e579468fc438b1dd2cc2dcd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 44520 68267a8c684d01c673d4b41bf5d4af69\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 12642 80e228567fcb814cd67e54aec6abdb41\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 373158 483599df2e1b6c82a688b413b74e5b91\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 189720 156d822da222b7fc8b887a4d1b3b7c31\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 12992 7232aad22eb02ec694fa0d41d367a69c\n\nUpdated packages for Ubuntu 9.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.diff.gz\n Size/MD5: 7350773 c09bf21927b9609694b39cdd55af21cf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.dsc\n Size/MD5: 3198 5ba9f01bd70b951901d1d1667b964b54\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz\n Size/MD5: 66766084 062c29b626a55f09a65532538a6184d4\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-18.59_all.deb\n Size/MD5: 3636694 05fda32db7067b32c0fe593e1acf0533\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18_2.6.28-18.59_all.deb\n Size/MD5: 8701396 65f8df38ba832ad50c6486d22420efca\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-18.59_all.deb\n Size/MD5: 56998214 3d33148ef29824c1060e1f66b470c6c4\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 234600 929bceffa24f85104c08edf073ac1f0e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 44110 6d94c9d8ecfe3b4673d25cce1db2b95b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 43316 d895b0ad91a70c9381fd7e17650fab75\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 51116 da4c61dc01f5b5e8fb61cdf14bbbb40a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 90082 dad217572b5b07064b9e12b0062d16b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 38016 5e886058b306b4937f5a4ebe22451db6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 521628 d9f3ffe45b307847935002619ac31ea0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 125818 6fbc3c76a739b91e01da41bd535f3791\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 58060 cc30f23edae38f46b0d56f621969fd62\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 312502 9a11c9f0f37fee6a92c59de9df5fca11\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 3872142 cdc4640244b192a5970dfc3d3efe4d7e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_amd64.deb\n Size/MD5: 689228 bf7aedb2bbb365a73ed77a8976a2701e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_amd64.deb\n Size/MD5: 689122 80cfc63043a2d7231f86ef3e68f0a131\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_amd64.deb\n Size/MD5: 24344078 dca923a8044df0ba9c642d5f2b317867\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_amd64.deb\n Size/MD5: 24335914 ad5a4fe70b4555e9399f9a45b58459f9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_amd64.deb\n Size/MD5: 10551276 b61ed90bb3d3f19f0d2e593c0e9f091a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_amd64.deb\n Size/MD5: 766282 f86ee0c95591ea10b578e848b6fdeb5f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 215170 7939440a8813110d952d86b49113e146\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 189496 f7495840a58b11f4ebfaad4d8cf203fe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 29412 54845dbae313e98befcc172b5e87ac2c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 274480 e029f99b6550bd014f26c45997f76dcc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 1933908 6fa450fb440effd7f4a1d643f5e80ab9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 163464 208a84b0506fcd9cadb25f1b7f9d26b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 194828 596399bbfa9a92e3116c8f8d3a7d1391\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 152994 3cf4fb6614c5798cdcca7c8d7fd04a5b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 36486 b3cf4deb0dc4e11f095eb9bcf81546df\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 5842 085134ad282a8b2580aa12a6ed64fd9e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 72152 5b6bf270db5279c7d79cbd5fca8e14f6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 22714 a01ded50b855c5ed0580072a2277b74a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 8874 f173072403f51e6e6da399debd91068f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 47442 e822623d7e4ae0bec0ea5094fed67dcf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 15656 2b2e6ad08af592fa3106adb4eb16324e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 1273594 d873a895c58da3fcd5b8a0ea91f9a5ee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 47204 c80f48bd49fddaae0188cf56350445f8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 72706 dcc76877eef3af00d0280f96cafb6e45\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 126958 b184498c9d2a598d57e293bc09049cda\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 13472 1399e0100a81d92448659b83949a62a6\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 215860 fe00a3406a5496e200d5c4e5975469f0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 46662 d7a61d1e363f9766795132d3325f02c4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 41352 7d84e783cf7fc4111eaf964395440369\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 47402 2cd024da2955f7e35fe4519c8df5add5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 86924 515a3a07357e06f49b2e4384e2af7b8c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 33578 452adbbc84f5a5218610ddad25eb3ea0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 525752 1a2c59458472f4a18538df9386396703\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 125654 8678d7c3409daf24a373b4d11a0d9263\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 54874 94d4465b06d14b20af5803f2afddf53d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 301338 64a58b9a7ee5d53c2d1a486fe32deb93\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 3746292 099947b9ddfb625da14b96bf1b9f59e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_i386.deb\n Size/MD5: 673824 c36739d12d66db8de4b6e270b1c91464\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_i386.deb\n Size/MD5: 676398 c7091523d59d0b1cdd4453e12d5983d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_i386.deb\n Size/MD5: 24662186 cfa5f52488fb3767debfefaf8940f6b5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_i386.deb\n Size/MD5: 24777004 b524e2b45df5e9d30ebc81717b5c62d7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_i386.deb\n Size/MD5: 10250016 09b9af49da34304c1dd280896ce9c0cd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_i386.deb\n Size/MD5: 766288 4858bc3941dc0e545195c0b911142a4c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 218106 f4f03360ad8e2ee23a58b534e8a2c045\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 174922 fbc6643612c01e91066a87b6ec9c7125\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 30064 c8e4db00aa9c0c3b75c47c103d87b4c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 262814 794c683379e359de14db8806fe984f78\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 2110070 da3e69dab278584e1abea5ee15d9b47d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 150230 7fc91b8ad535bfb705ba2cb2fc9ff57d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 184326 e505e555ac3bd0c33d00a47f7530f78c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 143584 209207f7e7887594a9d55d17bf1dca76\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 34576 cafc0f5f2db11f69d10e75815d3e9018\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 5504 21cfbb5c1aa4c8d82bf3e1412646263f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 86018 0dc7720bee90887f4ebf5c71cf93d611\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 47636 fbebe71b83526192c08fd6d797ee8cb1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 8714 14ed52e8c0a75151dd45acf3cb1ffc34\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 44692 27502a17d5ca35cc31a9fd79ae7d2f1d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 14780 2c9ea91e8d8da2bff76c38a6cdce748d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 1445966 33fa2ee03c566924552fc5b413e2ccf1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 44098 f740dcb377a692e2ff25a65424431e5b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 69290 a7e3130530005bf8fe4edabe8b003888\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 119528 a12c1a5bf9a112402d80e8f77ee87a1c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 12678 6646096dee2575f3bb33510e70bdd52b\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 215260 9a096eefa7f5e423c60fea41c314b9a5\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 46664 ba3b534d98d6717395ec66b402b3c701\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 40958 5950f34ca1fbd16f82a42020bc934ec6\n http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 47312 0d7d48294720bbd387710d560756ce6a\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 86530 9e5c38cd42496250d5fcf951c6b5d4bd\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 33272 a8890faa31cf92122bcce2991374fe7e\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 523810 7b2a58ca4d024926c0f8101ab49242d6\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 125252 f48299cd45e2ef1a74017d1c7653976e\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 63568 135fe854fe31d2d8bd9cd09f40a266e5\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 300756 77668125ff976eaed45f3d2676a46c5f\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 3035296 186cc64995c4fd4404241de5399eb0fb\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-18-lpia_2.6.28-18.59_lpia.deb\n Size/MD5: 641460 1a4d29b73378acb8bcf88658f88dd08e\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-18-lpia_2.6.28-18.59_lpia.deb\n Size/MD5: 21796372 d7455e818bf972ef7eb0fe54b7bd96dc\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_lpia.deb\n Size/MD5: 766260 b67d9c1432185123449ed6826ed9588d\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 303982 80fe6dcf6d68a46047ef6ddc2c098614\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 157406 2cc8f76d83482452bb6073656a80b2ee\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 24442 28180da41edae2700e4c8a0e4f1c656f\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 260414 49a0b6bd418a0ff1d274ce8f602e2733\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 2027576 241ee9a564502f3d8837806d5e6480d0\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 149398 b14f79b842c979418dec65e273836cd0\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 184736 a159624d12831598d35c3b00ba563182\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 143238 2720ae4f8cdad85066fc888e7fc3c796\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 34462 582363a3843fdbded2476793775ace76\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 5496 67c7245d730a7b241eb9947afeef7669\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 85646 6a31ffe0054c27df1506ae34162ab79e\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 47402 ff41a000c4a3abbed18330e905a01b7b\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 8718 15aa2d8fafced6b6e3b5a24c698b4089\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 63106 7a967940a04c1ee6a9626258e608b54c\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 14720 dc899d8630769d6270526c49f99a2af8\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 1447832 400eeba1e83569d777954b21b6df593c\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 43898 16b0a1310e3f70dccfc8d0d5f971b064\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 155186 b22b41e37f88fe49531f5580e0f7f712\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 172666 df244ff125096be469b1c56a30f1e05f\n http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 8154 f2d765541e008431b4d3eae00f435b61\n\nUpdated packages for Ubuntu 9.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.dsc\n Size/MD5: 2450 610bb83247876f8a8b47a0fd0d46fae8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.tar.gz\n Size/MD5: 87052080 62b9dcb9ad24e659db1aa085f9e5a456\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.dsc\n Size/MD5: 1906 a39c7ff46fb3ff74480d0e98366a486d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.tar.gz\n Size/MD5: 81902928 c9e88b4f386710c3f22979986a7e3a34\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.dsc\n Size/MD5: 1943 25176b20de251c2e58bb95e2dd9c1c7b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.tar.gz\n Size/MD5: 82470873 4d5238d3d11105852133d3eb802a95cc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.diff.gz\n Size/MD5: 2811600 b2b44f12a786758d470e6a29c09d0388\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.dsc\n Size/MD5: 3782 ae6bf5844769d00004b919a6f61d588c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31.orig.tar.gz\n Size/MD5: 78278595 16c0355d3612806ef87addf7c9f8c9f9\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-doc_2.6.31-304.10_all.deb\n Size/MD5: 3790328 e35ab5c36ee1bac625d2a57bd19e0c5c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-source-2.6.31_2.6.31-304.10_all.deb\n Size/MD5: 64258256 70b947cc9e9012c9472f2c317f11ffae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304_2.6.31-304.10_all.deb\n Size/MD5: 9662096 ac58cebef695901ea01bc7413b79109f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.31-19.56_all.deb\n Size/MD5: 3791668 3836f273873fedf9d2293ee0d11df6ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19_2.6.31-19.56_all.deb\n Size/MD5: 9531414 34d882276f33b0e37135c379a6e1c451\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.31_2.6.31-19.56_all.deb\n Size/MD5: 62161518 9d3f3f79b9f14db8bd3dc68594eb8c8c\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_amd64.deb\n Size/MD5: 603212 951db7e930eefc5fff9017c56badfb6e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_amd64.deb\n Size/MD5: 18660056 e39dda7f87b093e927c34a928b842c7a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 221398 682a7dab5b571a7b2fd31f19daf724c1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 15536 55206db30b20aea4d7da38b342fc095d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 52128 1cde23d38ba6908e1123951ef4bc3c69\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 44828 94402e34a45cf232ae86f3cc08bf7f4f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 50072 65e128949b6f525d9028187fe1e7cc37\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 92518 338960088cec6b9b25ef2a96e96f3ebc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 37776 452d9c073d191ec2be1cad3aceb34490\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 537676 6bb8167794701151c613afe28a5c62c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 130666 ff5cf8923b89d0fa4b5c3c4a61ef93f7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 53846 ffdc544c68e862a0a3038c99ac2d73a3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 310118 c2092f9a83a4f59145005f2c451d304b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 4353666 3a04bb875ae70561075d05d5bb208977\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_amd64.deb\n Size/MD5: 694766 85017cb531a49ea743cb7b30341b5ffa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-server_2.6.31-19.56_amd64.deb\n Size/MD5: 694938 550a64d6d54ee5f34f1fb9eefbd4cc3e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_amd64.deb\n Size/MD5: 28924984 3001e6d36f6bf76621997bdbeb864234\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-server_2.6.31-19.56_amd64.deb\n Size/MD5: 28885946 ff6296f4c684dd9facb011fc51b0b6f0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_amd64.deb\n Size/MD5: 11740736 287948976d92a7cae832a34ce33a99b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_amd64.deb\n Size/MD5: 743052 35cb9d5d80b77a2586d08ffb65d3212a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 168272 fc4758b6b91802971538d3a3c519056d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 202768 73cfe4be43d350582d171ff0e178b6b5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 27268 ae850a5e0ba4381a290b8f21ff88737f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 311688 3dab8c023e4aad0df74c5193aeaca49b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 2282064 f09b0e8828effab3770bfc1da159a8f2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 158666 6765112bf6fed248c08465e47b4dab00\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 203112 fed91a4bc3d356a5a9bb1c6110337413\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 161072 faec6563ccef41e925482b36619fca7c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 38056 505cbeb1fdbf55eea7664a19dcedc11f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 5762 a3ba57f83594477b27886cb3f4bd1b0d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 73750 53978367ed22b3daba246878064b72c2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 22240 8a1036af3dacffb432813cc8422f6ae8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 9548 f1e71c2129cc33f1ff139401b7b81547\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 39844 48e4aa79753fdb3ce1877ca1817b9fc6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 23484 f1be46cb2947ebe6b6d2e5b571d71a35\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 1389556 2ba51ea53e5454f75c8b39f21481e45d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 47382 89f1dff9282f3c667cf1b8c2bc41353c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 51636 41311bd8c8459ba04789539733e6ff5c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 128972 9697c034ed2bb74b5d18c5ae31fe1af0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 15814 8f46e8ddd6cac16dbdbc7c89cc94bee0\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_i386.deb\n Size/MD5: 573528 fa913abed6caeb5c33eb2167f730956f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_i386.deb\n Size/MD5: 17943372 803487f6122441604ec3062e7bb98228\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 198832 3282a330510666a582f6b8c0269d2f53\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 32458 03e2d90ce28677b7956fa2a72726d02e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 49938 c0d1953d9212f1569f04e8c8ba0db7ca\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 42118 db5bcc80727cd1013bc8393df2a88e4c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 45954 2d497ad958e7e7fc1b57ce51ff6b3570\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 87386 8e3ab58cf14ac0e97a334a65ae3e42ba\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 33754 bdbf52c3d681cca0ecdced183d2d37c4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 534176 5f166aa72d31a95df7cdb60abe4a0fc2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 128172 821c97524ce74e0685b135140c5261d7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 49748 9423b0562b984b85856d219d7b67fa27\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 295726 0736ef03d01a5e5e4fdf284ad2be5409\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 4185460 831a6068ef18d08ff697df14dead1668\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-386_2.6.31-19.56_i386.deb\n Size/MD5: 674832 6c28f2a428900b7c3ecd857dd2363150\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb\n Size/MD5: 674164 daade678beff67e96da61f42286bb8d4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_i386.deb\n Size/MD5: 674252 0786c96b6d902a71c6f1a2e5aa202345\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-386_2.6.31-19.56_i386.deb\n Size/MD5: 28775482 99e9b99d437aa88ec42e838367ca0c3b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb\n Size/MD5: 28938194 19d1d147a9e9dfb49fcd30b9d065d289\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_i386.deb\n Size/MD5: 28836780 00047de0d649be8b91c813fe7ee482b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_i386.deb\n Size/MD5: 11193984 1848c77671f6d9129f990e1a0a9940d0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_i386.deb\n Size/MD5: 743050 af6030dae8f05d7ef583ee7d6f31be8b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 172774 c11dd36baffeccf283ce48e122d7c791\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 186104 072e07c277b4f37611b21aad4390ccb0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 28372 82c8b14ef6982a48d3a8459d56ede43c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 292792 6c99c3b65ff7b159af94edf70358cb4a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 2400232 94729dcb0c5adb15ded7b3302c4005eb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 142004 9e43481b4e46409d8e711a628ce5e40a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 189566 83afe6de56cab613b4f890723a82a6b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 148522 b96767af921427e880579659ba7b757a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 35306 a6a1cbe7a75490632f24cad479916315\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 6842 86b286685eabaf8b6d28d3f922249503\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 86058 c014cfa81ab99a01793d25b995c7d75f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 46424 d525bcf1a39f6a21f09d52d24e6a0eb3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 8916 f9efb7f192c3cc22c14df58803a64dfc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 36282 1d843fa9ef5beed8582f2924d0b53bcc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 21660 3ad0b4572c12885957a3b753fc3b9fe3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 1495010 630f37fe420a74a22b4ca2eba4960999\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 44088 fddf56b0285ec3d0e6fc61e0fe8b86e2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 48484 2614a20d6d57892a8789091eeeaa67b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 117810 ff004889bca11286287a59c36fa24c0e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 14526 4c9cb3d5598c843bf5b90ddf0292d3c1\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 198810 76156647956f29c9e519aeac038c63bb\n http://ports.ubuntu.com/pool/main/l/linux/char-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 32452 9a5dd5fe15dda0be28f7afd966e89af9\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 49936 31c4008b50016b2a6c3a90703f2becbb\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 42148 931518b24b123d3749719c35b2b23759\n http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 45950 297c686f52a35049b3b2c87a96aebf68\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 87366 ec3f16cc0aeeef91b8c887ff347b6b0a\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 33750 a29ddd339c071c5b948c96e30f36f650\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 534366 b15b19f3e6c581d22514700dbd6502d8\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 128202 3d0f559a80187074bb210e3dae3bbfa0\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 49732 41abb7e30f0bdac62c5cd064c4b0ac3e\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 295732 12e912ce1f15d580960e7956de0c4ae0\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 4186814 7c18e86a3f5a5a985488ad67718887f9\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-lpia_2.6.31-19.56_lpia.deb\n Size/MD5: 674880 5dd2779cd5be613c330b7dc35410f271\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-lpia_2.6.31-19.56_lpia.deb\n Size/MD5: 28831528 8eaab1870eda62e8ee231e429c361455\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_lpia.deb\n Size/MD5: 742994 99d2d0609d9032e2810e19c92fc92834\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 172836 8b15eb5579853f45dc49055351df4225\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 186092 0eb0ceb5c23748d829f3e1d7977a35be\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 28366 0301ac544cf27b3dce660787d7575804\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 292736 16e84844c99e73b4e00419c38d78db3d\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 2400366 43dda8f1a10775e382e7a328381265db\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 141998 930123e6b57798468d7085ae9f549150\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 189564 8d6e18aedb4b970a3643207b96589863\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 148506 78efdbf1323c68be564ad06205842cb6\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 35300 054cf95e7af87d6f744b69eb8166f275\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 6828 5dbf32d40e88f471614e5cf286670e8f\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 86054 f24e7eaa3608985960e54a9048a24fb6\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 46410 80945eba79f53965effd546d23a8560b\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 8906 e1c6021a615a4363dde2cf4a893fa53b\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 36270 eb2848e19ec2351b9102bc640e546991\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 21660 cfb271e26dfd127871f5d27547e0a7ba\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 1494736 44113d529e3f4d3828f8719facd86370\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 44068 98817942a8188bd9281def20a1d327bb\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 48474 ebc9e58b5f98182006d6e3bb9c5ce179\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 117786 9b864dfc32d19a8cf2d61a68894835e9\n http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 14524 9ad51e3871197eb84b193bd9a3b29ec2\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 321488 509ad8549565d0d87fe246df5b26c7af\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 263628 b7028cc16ec749cc2fdd86e985c7bc6a\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 58850 3e2f18df29a75debc326e5919c9c13da\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 67040 8fdde64943d01e5c6a372424d3d24a03\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 45914 6a21bb6fc6dce2767be6f974ffdab524\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 51296 4c928d4f04bf96f5cdc5ccf7d3a60c81\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 90684 eac2ea55da023924723593afffbb5d2c\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 105146 c407a156a5e56f284fa682d87d2ed50e\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 39492 38f377d5a0bdbbbb642545aa6d7f641c\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 39270 47f890e2a1418595d92858350aa16475\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 580998 825045ff82a442eaf1a21a5448b0cefb\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 626388 b56b5416b642ba57471e6e125b99a32f\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 149292 930001a305b0f78060f3472fe46cde00\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 147332 ef6994c30f19462a7fc0cb7cd8f4dacc\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 79750 75c6da2308e05334f89f62917aee5b3d\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 84136 caf2a7e924b03340e579e9bdc0a7ba50\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 402954 9fc3d4860f5c32aff3ac252379938fef\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 342516 5737df8ea2adfc45ecae9d322931187a\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 3813204 3ac91a51b3525bfbb0f6166fc140d7db\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 5193132 54dce7348221bcc93bbc01512d553a16\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb\n Size/MD5: 784762 523b94315bff20137df79c5308abd5b7\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb\n Size/MD5: 801042 2a8e55b23ad4dc09ee3cbb2fdc23cc28\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb\n Size/MD5: 783708 185ba99656f4fa37874e0241e9f25dbb\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb\n Size/MD5: 24820746 adc5365726ba88565ad89953707bd012\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb\n Size/MD5: 25829918 fc82da730c6d730c5a4ac87d30594749\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb\n Size/MD5: 24656226 7791f88107e97c5419f0e2d2f850c38e\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_powerpc.deb\n Size/MD5: 728146 1dabe36864839475aab9293825cfc3e4\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 271924 8fb200d91f158f9b0eb209df5a5ffcd4\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 294610 317f7d34e3cd0ac823fcc5d48bcc9a7f\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 210546 041508a9555e18e2b8b4cab41b26f397\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 216984 845e2e452ef869aa3b39ea47bfa0280b\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 25798 19a7cae7e4f693c269f54dc0f2762f33\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 28984 419926b33e2b573f8d3ccaa5ade657f1\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 314922 83dcb63807ffb50682219b20333c23bc\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 357524 a32753bfca44b1afb9b11f72b25ebb9e\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 2027754 9b45ff8446ec0bad5befec2dc3ecdb72\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 2247744 35d212f7569bb03564a7f0294879557f\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 213544 3fb9afb7247290ffb3508744ab6cbb9f\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 209776 e42b20eb402cb2a55fea2a80f5cef162\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 210242 78939115c860efacb83481c0687f1a7a\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 244856 8fcff5fb05c0921681ec2bb44637c624\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 111834 a6b65e618a3240d51f36f37911d1d7cc\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 131610 dc5625deacbac446e71517f5902376b1\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 49028 ac60e4bf193e7725de6d8999c6231915\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 44082 531b2cbe15ec2f62fe61bd7002b1df02\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 5852 f049a9332d469b247e451868b4f22cce\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 6504 32fb4de3cd714598281c2d4d5d2ee6d6\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 79118 e98cffbfe6f6cbffcfa6dce199dc6c46\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 85190 e648dc2d3e124d68c47d4ec18836097f\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 74318 19b737ad1f43e7be1c6cc7e211085424\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 27228 0b5b4529d140289e616bded832055cbc\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 8538 9010c080bd63660bf529930565d49f62\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 9818 e909c37d26354ddbdceddc72628d71b3\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 58830 ae6573a0664b5486360156dd6711776c\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 70140 83085dfd5f4bb24ab67dd967e6b609cc\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 23714 86a598e1b13e4d6963475732e7a1097a\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 30804 b382bc0bfffd61156d0f8b3dc90bd307\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 1556894 ea2800c85a0115ad2e524a8b4ab4cb91\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 1509110 e42499f8bdbad020301a11617f6b65a8\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 81698 095ff78875bae0b90edd07ac3b51993d\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 88530 1a36ce88a0c6f7b495c869da15bf9d69\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 64400 8ff9a2aef998409440c1139f3db8c7ee\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 76990 392faa17f8c688e3856d91fb657eba09\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 141540 636e6d1827591a3aa46b82d7dc0b8ab6\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 151356 0f39f4d13770ceab049be6fb9c83fc16\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 139430 14f825a3334b18614059312527002767\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 70106 6dde178febff58a546142209374e1616\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 46510 64b0be995ce3d697a84cd3b0665ffe68\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 93974 28048300aba15f2a3937723bc0afc5cd\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 588788 c17e7feb3442296b7ed93c92cb988625\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 148426 6f429deb9df760daf28c04ad93ea6758\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 75862 6f382de52d9e1b52611c70a703895e5d\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 2892370 ec9440bb8ee05a7ac071992c5711139f\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb\n Size/MD5: 601506 1b56c59b3df953a640760b876d752465\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb\n Size/MD5: 600680 166e5056f971d5fa031230c1af67d028\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb\n Size/MD5: 20496992 6ebab55c96d6be71ffb8c3a493d31a74\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb\n Size/MD5: 20193918 98b3c6e44f8e302cca36530b434e9525\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_sparc.deb\n Size/MD5: 740254 b1a453339b4d68717a445f07b87b53a4\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 266068 1b8caecb838a9dd9b9c765f6603197a3\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 209168 e0e78f6a435e0ca46d5680e08d6e8db0\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 26268 f730be03c2b96e53e779a5d3df4cde93\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 314080 b673ee07d0c907d6ba00a561b915868d\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 1675490 8642bd711b6643bd26ddc80674cef9e4\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 222882 136f6b9e24a16823f7309438fd0bd60a\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 121954 75090ea655204cc898db4634fc8aa021\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 38798 a11bcf765626194255c1d5a7d0106c2a\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 100798 af5903bc65fd381528f733fb1ba4100f\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 8932 ebcb23a73a538276e41fcff9b7bb1d15\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 62926 7eba529ee44c2e107b693605dcbf1247\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 120960 8f63ad112de0797974650631dee53d13\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 1217912 87a2a4f21ee86e0f36bc5298a226513b\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 101576 057a15ca3fa891e47216adcf5ae071f7\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 200148 f90834ae24c0f516ef83fa5aa66bafbb\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 184674 d704744a26941df63b9195288306fa7b\n\n. \n\n ESXi 4.1\n --------\n ESXi410-201010401-SG\n Download link: http://bit.ly/bb3xjV\n md5sum: 05f1049c7a595481cd682e92fe8d3285\n sha1sum: f6993c185f7d1cb971a4ae6e017e0246b8c25a76\n http://kb.vmware.com/kb/1027753\n\n ESX 4.1\n -------\n ESX410-201010001\n Download link: http://bit.ly/a3Ffw8\n md5sum: ff4435fd3c74764f064e047c6e5e7809\n sha1sum: 322981f4dbb9e5913c8f38684369444ff7e265b3\n http://kb.vmware.com/kb/1027027\n\n ESX410-201010001 contains the following security bulletins:\n ESX410-201010401-SG (COS kernel) | http://kb.vmware.com/kb/1027013\n ESX410-201010419-SG (Likewise) | http://kb.vmware.com/kb/1027026\n ESX410-201010404-SG (NSS) | http://kb.vmware.com/kb/1027016\n ESX410-201010409-SG (tar) | http://kb.vmware.com/kb/1027019\n ESX410-201010412-SG (Perl) | http://kb.vmware.com/kb/1027022\n ESX410-201010413-SG (cpio) | http://kb.vmware.com/kb/1027023\n ESX410-201010410-SG (cURL) | http://kb.vmware.com/kb/1027020\n ESX410-201010401-SG (vmkernel64,\n VMX, CIM)| http://kb.vmware.com/kb/1027013\n ESX410-201010414-SG\n (vmware-esx-pam-config)| http://kb.vmware.com/kb/1027024\n ESX410-201010402-SG (GnuTLS, NSS,\n and openSSL)| http://kb.vmware.com/kb/1027014\n\n ESX410-201010001 also contains the following non-security bulletins\n ESX410-201010405-BG ESX410-201010415-BG\n\n To install an individual bulletin use esxupdate with the -b option. \n\nThe vulnerabilities are caused due to various problems related to\n\"do_mremap()\" and \"MREMAP_FIXED\", which can be exploited to e.g. \ncause a system crash on certain architectures. \n\nPROVIDED AND/OR DISCOVERED BY:\nDisclosed in GIT commits. \n\nORIGINAL ADVISORY:\nhttp://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nNote: Debian carefully tracks all known security issues across every\nlinux kernel package in all releases under active security support. \nHowever, given the high frequency at which low-severity security\nissues are discovered in the kernel and the resource requirements of\ndoing an update, updates for lower priority issues will normally not\nbe released for all kernels at the same time. Rather, they will be\nreleased in a staggered or \"leap-frog\" fashion", "sources": [ { "db": "NVD", "id": "CVE-2010-0291" }, { "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "db": "BID", "id": "37906" }, { "db": "VULHUB", "id": "VHN-42896" }, { "db": "VULMON", "id": "CVE-2010-0291" }, { "db": "PACKETSTORM", "id": "98419" }, { "db": "PACKETSTORM", "id": "86790" }, { "db": "PACKETSTORM", "id": "85958" }, { "db": "PACKETSTORM", "id": "95883" }, { "db": "PACKETSTORM", "id": "85423" }, { "db": "PACKETSTORM", "id": "86286" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-0291", "trust": 3.4 }, { "db": "BID", "id": "37906", "trust": 2.9 }, { "db": "SECUNIA", "id": "39033", "trust": 2.6 }, { "db": "SECUNIA", "id": "38492", "trust": 1.8 }, { "db": "SECUNIA", "id": "43315", "trust": 1.8 }, { "db": "SECUNIA", "id": "38229", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2010-001721", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201002-150", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-42896", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2010-0291", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "98419", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86790", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "85958", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "95883", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "85423", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86286", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-42896" }, { "db": "VULMON", "id": "CVE-2010-0291" }, { "db": "BID", "id": "37906" }, { "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "db": "PACKETSTORM", "id": "98419" }, { "db": "PACKETSTORM", "id": "86790" }, { "db": "PACKETSTORM", "id": "85958" }, { "db": "PACKETSTORM", "id": "95883" }, { "db": "PACKETSTORM", "id": "85423" }, { "db": "PACKETSTORM", "id": "86286" }, { "db": "CNNVD", "id": "CNNVD-201002-150" }, { "db": "NVD", "id": "CVE-2010-0291" } ] }, "id": "VAR-201001-0654", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-42896" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:36:17.824000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "kernel-2.6.18-194.3.AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1216" }, { "title": "ChangeLog-2.6.32.4", "trust": 0.8, "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4" }, { "title": "RHSA-2010:0161", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0161.html" }, { "title": "RHSA-2010:0504", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0504.html" }, { "title": "VMSA-2010-0016", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/VMSA-2010-0016.html" }, { "title": "VMSA-2011-0003", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "title": "ChangeLog-2.6.32.4", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=2979" }, { "title": "VMware Security Advisories: VMware ESX third party update for Service Console kernel", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=fc09ad2748a073df3195434d27659026" }, { "title": "Ubuntu Security Notice: linux, linux-source-2.6.15 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-894-1" }, { "title": "Debian Security Advisories: DSA-2005-1 linux-2.6.24 -- privilege escalation/denial of service/sensitive memory leak", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=730b40b3a3f2a9a1f3cba6257e5248fb" }, { "title": "VMware Security Advisories: VMware ESXi and ESX third party updates for Service Console and Likewise components", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=d087ff2df978e84e36dbce58f6a59022" }, { "title": "VMware Security Advisories: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=ea953b0a91a1816979ec1d304d5e3d93" } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-0291" }, { "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "db": "CNNVD", "id": "CNNVD-201002-150" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-42896" }, { "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "db": "NVD", "id": "CVE-2010-0291" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.securityfocus.com/bid/37906" }, { "trust": 2.6, "url": "http://secunia.com/advisories/39033" }, { "trust": 2.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "trust": 2.0, "url": "http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2" }, { "trust": 1.9, "url": "http://www.kernel.org/pub/linux/kernel/v2.6/changelog-2.6.32.4" }, { "trust": 1.8, "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "trust": 1.8, "url": "http://secunia.com/advisories/38492" }, { "trust": 1.8, "url": "http://secunia.com/advisories/43315" }, { "trust": 1.8, "url": "http://www.debian.org/security/2010/dsa-1996" }, { "trust": 1.8, "url": "http://www.debian.org/security/2010/dsa-2005" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2010-0161.html" }, { "trust": 1.8, "url": "http://groups.google.com/group/linux.kernel/msg/895f20870532241e" }, { "trust": 1.8, "url": "http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090" }, { "trust": 1.8, "url": "http://www.vmware.com/security/advisories/vmsa-2011-0003.html" }, { "trust": 1.8, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11824" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=05d72faa6d13c9d857478a5d35c85db9adada685" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=097eed103862f9c6a97f2e415e21d1134017b135" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=0ec62d290912bb4b989be7563851bc364ec73b56" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=2ea1d13f64efdf49319e86c87d9ba38c30902782" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=54f5de709984bae0d31d823ff03de755f9dcac54" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=564b3bffc619dcbdd160de597b0547a7017ea010" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=570dcf2c15463842e384eb597a87c1e39bead99b" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=9206de95b1ea68357996ec02be5db0638a0de2c1" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=935874141df839c706cd6cdc438e85eb69d1525e" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=aa65607373a4daf2010e8c3867b6317619f3c1a3" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=bb52d6694002b9d632bb355f64daa045c6293a4e" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=ecc1a8993751de4e82eb18640d631dae1f626bd6" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=f106af4e90eadd76cfc0b5325f659619e08fb762" }, { "trust": 1.7, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=f8b7256096a20436f6d0926747e3ac3d64c81d24" }, { "trust": 1.7, "url": "http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2" }, { "trust": 1.7, "url": "http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0291" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0291" }, { "trust": 0.8, "url": "http://secunia.com/advisories/38229" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0003" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0007" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0291" }, { "trust": 0.3, "url": "http://www.linux.org/" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100092686" }, { "trust": 0.3, "url": "http://www.ubuntu.com/usn/usn-894-1" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4308" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4536" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4538" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0415" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1088" }, { "trust": 0.2, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0307" }, { "trust": 0.2, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0415" }, { "trust": 0.2, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.2, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1087" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0622" }, { "trust": 0.2, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1321" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1437" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4020" }, { "trust": 0.2, "url": "http://www.debian.org/security/faq" }, { "trust": 0.2, "url": "http://security.debian.org/" }, { "trust": 0.2, "url": "http://www.debian.org/security/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4138" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0622" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0410" }, { "trust": 0.2, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4021" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0307" }, { "trust": 0.1, "url": "http://marc.info/?l=linux-arch\u0026amp;m=126004438008670\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=oss-security\u0026amp;m=126388181420690\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=oss-security\u0026amp;m=126393370931972\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=oss-security\u0026amp;m=126395874130875\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=oss-security\u0026amp;m=126396065732697\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=oss-security\u0026amp;m=126396609004884\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=oss-security\u0026amp;m=126399980216047\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=oss-security\u0026amp;m=126400443123998\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=oss-security\u0026amp;m=126406814304720\u0026amp;w=2" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=935874141df839c706cd6cdc438e85eb69d1525e" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aa65607373a4daf2010e8c3867b6317619f3c1a3" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8b7256096a20436f6d0926747e3ac3d64c81d24" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0ec62d290912bb4b989be7563851bc364ec73b56" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c4caa778157dbbf04116f0ac2111e389b5cd7a29" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f106af4e90eadd76cfc0b5325f659619e08fb762" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2c6a10161d0b5fc047b5bd81b03693b9af99fab5" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9206de95b1ea68357996ec02be5db0638a0de2c1" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8c7b49b3ecd48923eb64ff57e07a1cdb74782970" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=54f5de709984bae0d31d823ff03de755f9dcac54" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=097eed103862f9c6a97f2e415e21d1134017b135" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e77414e0aad6a1b063ba5e5750c582c75327ea6a" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05d72faa6d13c9d857478a5d35c85db9adada685" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2ea1d13f64efdf49319e86c87d9ba38c30902782" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ecc1a8993751de4e82eb18640d631dae1f626bd6" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bb52d6694002b9d632bb355f64daa045c6293a4e" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=564b3bffc619dcbdd160de597b0547a7017ea010" }, { "trust": 0.1, "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=570dcf2c15463842e384eb597a87c1e39bead99b" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.vmware.com/security/advisories/vmsa-2010-0017.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/894-1/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3556" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0086" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0085" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1086" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0730" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027919" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2939" }, { "trust": 0.1, "url": "http://downloads.vmware.com/support/vsphere4/doc/vsp_esxi41_u1_rel_notes.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3571" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0095" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0092" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0093" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3555" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3548" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1031330" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3554" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3562" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0088" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0084" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0091" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0089" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3557" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3550" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0085" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1384" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3567" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0838" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0086" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0837" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3553" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0106" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2227" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0107" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2902" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2901" }, { "trust": 0.1, "url": "http://downloads.vmware.com/support/vsphere4/doc/vsp_esx41_u1_rel_notes.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1085" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0091" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0841" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0840" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2248" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3561" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3541" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3559" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3565" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027904" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0107" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0093" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0433" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0842" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0082" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3574" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0886" }, { "trust": 0.1, "url": "http://downloads.vmware.com/d/info/datacenter_downloads/vmware_vsphere_4/4_0" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0734" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1157" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0094" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0007" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0850" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2524" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0839" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0090" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-3825" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1084" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5416" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1384" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0008" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0088" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0849" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2070" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4308" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3549" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3548" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2693" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3568" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0084" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5416" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3864" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3825" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0410" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3572" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0092" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0003" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3555" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0094" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3566" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0847" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0740" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0082" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0437" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0844" }, { "trust": 0.1, "url": "http://downloads.vmware.com/support/pubs/vs_pages/vsp_pubs_esx41_vc41.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3548" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2066" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0089" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2902" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0087" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0087" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2693" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1029353" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0085" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0846" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2226" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1173" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0008" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1641" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2928" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0106" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0845" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0848" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0095" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1187" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2521" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3569" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0085" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0090" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2901" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3081" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3551" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0843" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2691" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3080" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3889" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4005" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2695" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3726" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-18-lpia_2.6.28-18.59_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-lpia_2.6.31-19.56_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304_2.6.31-304.10_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.31-19.56_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-k7_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-55.82_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-17.45_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-386_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpia_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-k7_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4031" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-virtual_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-18.59_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-virtual_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-doc_2.6.31-304.10_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27_2.6.24-27.65_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-55.82_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4141" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-27.65_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-17.45_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-686_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-source-2.6.31_2.6.31-304.10_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0006" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-686_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-27.65_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-386_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18_2.6.28-18.59_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-386_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpia_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-27.65_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17_2.6.27-17.45_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19_2.6.31-19.56_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-386_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-virtual_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.31_2.6.31-19.56_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-lpia_2.6.31-19.56_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-386_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-386_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/char-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-18-lpia_2.6.28-18.59_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-server_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-386_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-18.59_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-server_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027027" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027016" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisoiries" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027026" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027023" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0844" }, { "trust": 0.1, "url": "http://bit.ly/bb3xjv" }, { "trust": 0.1, "url": "http://www.vmware.com/security" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0844" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1437" }, { "trust": 0.1, "url": "http://bit.ly/a3ffw8" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027019" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027022" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027024" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0846" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027013" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1087" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027753" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1321" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0845" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027020" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4212" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1088" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0846" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4212" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0845" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1027014" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/blog/71/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38229/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mips_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r4k-ip22_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0309" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-ip32_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r4k-ip22_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny2.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-ip32_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny1.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0298" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mips_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4027" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r4k-ip22_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3939" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-ip32_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny2.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r4k-ip22_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0306" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-ip32_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-21lenny3_mipsel.deb" } ], "sources": [ { "db": "VULHUB", "id": "VHN-42896" }, { "db": "VULMON", "id": "CVE-2010-0291" }, { "db": "BID", "id": "37906" }, { "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "db": "PACKETSTORM", "id": "98419" }, { "db": "PACKETSTORM", "id": "86790" }, { "db": "PACKETSTORM", "id": "85958" }, { "db": "PACKETSTORM", "id": "95883" }, { "db": "PACKETSTORM", "id": "85423" }, { "db": "PACKETSTORM", "id": "86286" }, { "db": "CNNVD", "id": "CNNVD-201002-150" }, { "db": "NVD", "id": "CVE-2010-0291" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-42896" }, { "db": "VULMON", "id": "CVE-2010-0291" }, { "db": "BID", "id": "37906" }, { "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "db": "PACKETSTORM", "id": "98419" }, { "db": "PACKETSTORM", "id": "86790" }, { "db": "PACKETSTORM", "id": "85958" }, { "db": "PACKETSTORM", "id": "95883" }, { "db": "PACKETSTORM", "id": "85423" }, { "db": "PACKETSTORM", "id": "86286" }, { "db": "CNNVD", "id": "CNNVD-201002-150" }, { "db": "NVD", "id": "CVE-2010-0291" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-02-15T00:00:00", "db": "VULHUB", "id": "VHN-42896" }, { "date": "2010-02-15T00:00:00", "db": "VULMON", "id": "CVE-2010-0291" }, { "date": "2010-01-19T00:00:00", "db": "BID", "id": "37906" }, { "date": "2010-07-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "date": "2011-02-11T13:13:00", "db": "PACKETSTORM", "id": "98419" }, { "date": "2010-03-01T21:20:35", "db": "PACKETSTORM", "id": "86790" }, { "date": "2010-02-05T16:17:54", "db": "PACKETSTORM", "id": "85958" }, { "date": "2010-11-16T18:01:26", "db": "PACKETSTORM", "id": "95883" }, { "date": "2010-01-20T14:46:34", "db": "PACKETSTORM", "id": "85423" }, { "date": "2010-02-15T20:31:13", "db": "PACKETSTORM", "id": "86286" }, { "date": "2010-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201002-150" }, { "date": "2010-02-15T18:30:00.720000", "db": "NVD", "id": "CVE-2010-0291" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-13T00:00:00", "db": "VULHUB", "id": "VHN-42896" }, { "date": "2018-11-16T00:00:00", "db": "VULMON", "id": "CVE-2010-0291" }, { "date": "2015-03-19T08:08:00", "db": "BID", "id": "37906" }, { "date": "2011-03-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001721" }, { "date": "2023-02-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201002-150" }, { "date": "2024-11-21T01:11:54.897000", "db": "NVD", "id": "CVE-2010-0291" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "37906" }, { "db": "PACKETSTORM", "id": "85423" }, { "db": "CNNVD", "id": "CNNVD-201002-150" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux kernel Vulnerability gained in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001721" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201002-150" } ], "trust": 0.6 } }
gsd-2010-0291
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2010-0291", "description": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"", "id": "GSD-2010-0291", "references": [ "https://www.suse.com/security/cve/CVE-2010-0291.html", "https://www.debian.org/security/2010/dsa-2005", "https://www.debian.org/security/2010/dsa-1996", "https://access.redhat.com/errata/RHSA-2010:0504", "https://access.redhat.com/errata/RHSA-2010:0161", "https://linux.oracle.com/cve/CVE-2010-0291.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-0291" ], "details": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"", "id": "GSD-2010-0291", "modified": "2023-12-13T01:21:28.264725Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-0291", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.debian.org/security/2010/dsa-2005", "refsource": "MISC", "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "http://secunia.com/advisories/38492", "refsource": "MISC", "url": "http://secunia.com/advisories/38492" }, { "name": "http://secunia.com/advisories/39033", "refsource": "MISC", "url": "http://secunia.com/advisories/39033" }, { "name": "http://secunia.com/advisories/43315", "refsource": "MISC", "url": "http://secunia.com/advisories/43315" }, { "name": "http://www.debian.org/security/2010/dsa-1996", "refsource": "MISC", "url": "http://www.debian.org/security/2010/dsa-1996" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0161.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0161.html" }, { "name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24" }, { "name": "http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090", "refsource": "MISC", "url": "http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090" }, { "name": "http://groups.google.com/group/linux.kernel/msg/895f20870532241e", "refsource": "MISC", "url": "http://groups.google.com/group/linux.kernel/msg/895f20870532241e" }, { "name": "http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2" }, { "name": "http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2" }, { "name": "http://www.securityfocus.com/bid/37906", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/37906" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11824", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11824" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=556703", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.6.32.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-0291" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the \"do_mremap() mess\" or \"mremap/mmap mess.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=126396609004884\u0026w=2" }, { "name": "[linux-kernel] 20100114 [PATCH 01/52] untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "http://groups.google.com/group/linux.kernel/msg/895f20870532241e" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=126396065732697\u0026w=2" }, { "name": "[linux-kernel] 20091205 [RFC][PATCHSET] mremap/mmap mess", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=linux-arch\u0026m=126004438008670\u0026w=2" }, { "name": "[oss-security] 20100121 Re: CVE request - kernel: untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=126406814304720\u0026w=2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=556703", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556703" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=126395874130875\u0026w=2" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=126400443123998\u0026w=2" }, { "name": "[oss-security] 20100119 CVE request - kernel: untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=126388181420690\u0026w=2" }, { "name": "[oss-security] 20100120 Re: CVE request - kernel: untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=126399980216047\u0026w=2" }, { "name": "http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://groups.google.co.jp/group/fa.linux.kernel/browse_thread/thread/8bf22336b1082090" }, { "name": "[oss-security] 20100119 Re: CVE request - kernel: untangle the do_mremap() mess", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=126393370931972\u0026w=2" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.4" }, { "name": "DSA-1996", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-1996" }, { "name": "38492", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38492" }, { "name": "37906", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/37906" }, { "name": "DSA-2005", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "RHSA-2010:0161", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0161.html" }, { "name": "39033", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/39033" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "43315", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43315" }, { "name": "oval:org.mitre.oval:def:11824", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11824" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0ec62d290912bb4b989be7563851bc364ec73b56" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=564b3bffc619dcbdd160de597b0547a7017ea010" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f106af4e90eadd76cfc0b5325f659619e08fb762" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bb52d6694002b9d632bb355f64daa045c6293a4e" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a0ef85f84feb13f07b604fcf5b90ef7c2b5c82f" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2c6a10161d0b5fc047b5bd81b03693b9af99fab5" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=097eed103862f9c6a97f2e415e21d1134017b135" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aa65607373a4daf2010e8c3867b6317619f3c1a3" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=54f5de709984bae0d31d823ff03de755f9dcac54" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2ea1d13f64efdf49319e86c87d9ba38c30902782" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8b7256096a20436f6d0926747e3ac3d64c81d24" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=935874141df839c706cd6cdc438e85eb69d1525e" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4caa778157dbbf04116f0ac2111e389b5cd7a29" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=570dcf2c15463842e384eb597a87c1e39bead99b" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ecc1a8993751de4e82eb18640d631dae1f626bd6" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05d72faa6d13c9d857478a5d35c85db9adada685" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e77414e0aad6a1b063ba5e5750c582c75327ea6a" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c7b49b3ecd48923eb64ff57e07a1cdb74782970" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9206de95b1ea68357996ec02be5db0638a0de2c1" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:21Z", "publishedDate": "2010-02-15T18:30Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.