Action not permitted
Modal body text goes here.
cve-2009-4536
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:08:37.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35265", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35265" }, { "name": "38276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38276" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2" }, { "name": "1023420", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023420" }, { "name": "oval:org.mitre.oval:def:13226", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226" }, { "name": "SUSE-SA:2010:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" }, { "name": "RHSA-2010:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0111.html" }, { "name": "38779", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38779" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "name": "oval:org.mitre.oval:def:12440", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440" }, { "name": "oval:org.mitre.oval:def:10607", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607" }, { "name": "38296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38296" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/" }, { "name": "SUSE-SA:2010:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "RHSA-2010:0053", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0053.html" }, { "name": "SUSE-SA:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" }, { "name": "RHSA-2010:0882", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "kernel-e1000main-security-bypass(55648)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55648" }, { "name": "DSA-1996", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-1996" }, { "name": "RHSA-2010:0019", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0019.html" }, { "name": "[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/28/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "FEDORA-2010-1787", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html" }, { "name": "37519", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37519" }, { "name": "[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/29/2" }, { "name": "SUSE-SA:2010:013", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html" }, { "name": "RHSA-2010:0095", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html" }, { "name": "SUSE-SA:2010:005", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" }, { "name": "[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/31/1" }, { "name": "RHSA-2010:0020", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0020.html" }, { "name": "38031", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38031" }, { "name": "38610", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38610" }, { "name": "oval:org.mitre.oval:def:7453", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453" }, { "name": "DSA-2005", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "SUSE-SA:2010:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" }, { "name": "RHSA-2010:0041", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0041.html" }, { "name": "38492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38492" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-12-28T00:00:00", "descriptions": [ { "lang": "en", "value": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35265", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35265" }, { "name": "38276", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38276" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2" }, { "name": "1023420", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023420" }, { "name": "oval:org.mitre.oval:def:13226", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226" }, { "name": "SUSE-SA:2010:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" }, { "name": "RHSA-2010:0111", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0111.html" }, { "name": "38779", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38779" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "name": "oval:org.mitre.oval:def:12440", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440" }, { "name": "oval:org.mitre.oval:def:10607", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607" }, { "name": "38296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38296" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/" }, { "name": "SUSE-SA:2010:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "RHSA-2010:0053", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0053.html" }, { "name": "SUSE-SA:2010:014", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" }, { "name": "RHSA-2010:0882", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "kernel-e1000main-security-bypass(55648)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55648" }, { "name": "DSA-1996", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-1996" }, { "name": "RHSA-2010:0019", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0019.html" }, { "name": "[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/28/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "FEDORA-2010-1787", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html" }, { "name": "37519", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37519" }, { "name": "[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/29/2" }, { "name": "SUSE-SA:2010:013", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html" }, { "name": "RHSA-2010:0095", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html" }, { "name": "SUSE-SA:2010:005", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" }, { "name": "[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/31/1" }, { "name": "RHSA-2010:0020", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0020.html" }, { "name": "38031", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38031" }, { "name": "38610", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38610" }, { "name": "oval:org.mitre.oval:def:7453", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453" }, { "name": "DSA-2005", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "SUSE-SA:2010:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" }, { "name": "RHSA-2010:0041", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0041.html" }, { "name": "38492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38492" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35265", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35265" }, { "name": "38276", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38276" }, { "name": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2", "refsource": "CONFIRM", "url": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2" }, { "name": "1023420", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023420" }, { "name": "oval:org.mitre.oval:def:13226", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226" }, { "name": "SUSE-SA:2010:007", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" }, { "name": "RHSA-2010:0111", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0111.html" }, { "name": "38779", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38779" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=552126", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "name": "oval:org.mitre.oval:def:12440", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440" }, { "name": "oval:org.mitre.oval:def:10607", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607" }, { "name": "38296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38296" }, { "name": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/", "refsource": "MISC", "url": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/" }, { "name": "SUSE-SA:2010:012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "RHSA-2010:0053", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0053.html" }, { "name": "SUSE-SA:2010:014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" }, { "name": "RHSA-2010:0882", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "kernel-e1000main-security-bypass(55648)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55648" }, { "name": "DSA-1996", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-1996" }, { "name": "RHSA-2010:0019", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0019.html" }, { "name": "[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/12/28/1" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "FEDORA-2010-1787", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html" }, { "name": "37519", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37519" }, { "name": "[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/12/29/2" }, { "name": "SUSE-SA:2010:013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" }, { "name": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html", "refsource": "MISC", "url": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html" }, { "name": "RHSA-2010:0095", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html" }, { "name": "SUSE-SA:2010:005", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" }, { "name": "[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/12/31/1" }, { "name": "RHSA-2010:0020", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0020.html" }, { "name": "38031", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38031" }, { "name": "38610", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38610" }, { "name": "oval:org.mitre.oval:def:7453", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453" }, { "name": "DSA-2005", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "SUSE-SA:2010:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" }, { "name": "RHSA-2010:0041", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0041.html" }, { "name": "38492", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38492" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4536", "datePublished": "2010-01-12T17:00:00", "dateReserved": "2009-12-31T00:00:00", "dateUpdated": "2024-08-07T07:08:37.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-4536\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-01-12T17:30:00.697\",\"lastModified\":\"2024-11-21T01:09:51.777\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.\"},{\"lang\":\"es\",\"value\":\"drivers/net/e1000/e1000_main.c en el driver e1000 en el kernel de Linux v2.6.32.3 y anteriores gestiona tramas Ethernet que exceden el MTU procesando con retraso datos como si fuesen tramas completas, lo que permite a atacantes remotos evitar los filtros de paquete con un payload manipulado. NOTA: Esta vulnerabilidad existe debido a un arregle incorrecto de CVE-2009-1385.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.32.3\",\"matchCriteriaId\":\"B96A7A6C-B8C0-4BAD-B1C1-779C58012EA0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]}],\"references\":[{\"url\":\"http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?t=126203102000001\u0026r=1\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35265\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38031\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38276\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38296\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38492\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38610\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38779\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023420\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-1996\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2005\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/12/28/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/12/29/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/12/31/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0019.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0041.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0053.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0111.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0882.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/37519\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0009.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=552126\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/55648\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0095.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?t=126203102000001\u0026r=1\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38031\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38276\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38296\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38610\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38779\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-1996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2005\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/12/28/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/12/29/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/12/31/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0053.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0111.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0882.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/37519\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=552126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/55648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2010-0095.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2010_0053
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and two bugs are\nnow available for Red Hat Enterprise Linux 5.3 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux\ndrivers in the Linux kernel: e1000 and e1000e. A remote attacker using\npackets larger than the MTU could bypass the existing fragment check,\nresulting in partial, invalid frames being passed to the network stack.\nThese flaws could also possibly be used to trigger a remote denial of\nservice. (CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nThis update also fixes the following bugs:\n\n* on certain hardware, the igb driver was unable to detect link statuses\ncorrectly for Serializer-Deserializer (SERDES) interface Ethernet ports.\nThis may have caused problems for network interface bonding, such as\nfailover not occurring. (BZ#548023)\n\n* in certain situations, kdump occasionally dumped a vmcore file with no\nregisters on Intel Itanium systems that were under high disk I/O load. In\nthese cases, this prevented the kernel stack backtrace in the vmcore from\nbeing viewed with the crash utility. (BZ#542581)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0053", "url": "https://access.redhat.com/errata/RHSA-2010:0053" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "542581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=542581" }, { "category": "external", "summary": "548023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548023" }, { "category": "external", "summary": "548641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "category": "external", "summary": "550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0053.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T10:48:01+00:00", "generator": { "date": "2024-11-14T10:48:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0053", "initial_release_date": "2010-01-20T00:07:00+00:00", "revision_history": [ { "date": "2010-01-20T00:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-01-19T19:07:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:48:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.3" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.12.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.12.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.12.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-128.12.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.12.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.12.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.12.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.12.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.12.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.12.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.12.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.12.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-128.12.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.12.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.12.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.12.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-128.12.1.el5.src", "product": { "name": "kernel-0:2.6.18-128.12.1.el5.src", "product_id": "kernel-0:2.6.18-128.12.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.12.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-128.12.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-128.12.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-128.12.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.12.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.12.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src" }, "product_reference": "kernel-0:2.6.18-128.12.1.el5.src", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.12.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.12.1.el5.noarch", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.12.1.el5.i386", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.12.1.el5.ppc", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4567", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "548641" } ], "notes": [ { "category": "description", "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6_hop_jumbo remote system crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4567" }, { "category": "external", "summary": "RHBZ#548641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567" } ], "release_date": "2007-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-20T00:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0053" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6_hop_jumbo remote system crash" }, { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-20T00:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0053" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2009-4537", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "550907" } ], "notes": [ { "category": "description", "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4537" }, { "category": "external", "summary": "RHBZ#550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-20T00:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0053" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169 issue reported at 26c3" }, { "cve": "CVE-2009-4538", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "551214" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000e frame fragment issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "RHBZ#551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-20T00:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0053" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.12.1.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.12.1.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.12.1.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.12.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000e frame fragment issue" } ] }
rhsa-2010_0079
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* memory leaks were found on some error paths in the icmp_send()\nfunction in the Linux kernel. This could, potentially, cause the network\nconnectivity to cease. (CVE-2009-0778, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments. (CVE-2009-0834,\nImportant)\n\n* a flaw was found in the Intel PRO/1000 Linux driver (e1000) in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nNote: This update also fixes several bugs. Documentation for these bug\nfixes will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0079", "url": "https://access.redhat.com/errata/RHSA-2010:0079" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "453135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135" }, { "category": "external", "summary": "485163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163" }, { "category": "external", "summary": "487990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990" }, { "category": "external", "summary": "502981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981" }, { "category": "external", "summary": "511171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171" }, { "category": "external", "summary": "524179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524179" }, { "category": "external", "summary": "546226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546226" }, { "category": "external", "summary": "546227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546227" }, { "category": "external", "summary": "546228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546228" }, { "category": "external", "summary": "546229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546229" }, { "category": "external", "summary": "546230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546230" }, { "category": "external", "summary": "546231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546231" }, { "category": "external", "summary": "546232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546232" }, { "category": "external", "summary": "546233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546233" }, { "category": "external", "summary": "546234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546234" }, { "category": "external", "summary": "546236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546236" }, { "category": "external", "summary": "547299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547299" }, { "category": "external", "summary": "548074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548074" }, { "category": "external", "summary": "548641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "category": "external", "summary": "550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "553133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553133" }, { "category": "external", "summary": "555052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555052" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0079.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:02:48+00:00", "generator": { "date": "2024-11-22T03:02:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0079", "initial_release_date": "2010-02-02T21:01:00+00:00", "revision_history": [ { "date": "2010-02-02T21:01:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-02-02T16:01:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:02:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.2" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-PAE-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.35.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386", "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc", "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-92.1.35.el5.src", "product": { "name": "kernel-0:2.6.18-92.1.35.el5.src", "product_id": "kernel-0:2.6.18-92.1.35.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch", "product_id": "kernel-doc-0:2.6.18-92.1.35.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.35.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.35.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src" }, "product_reference": "kernel-0:2.6.18-92.1.35.el5.src", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-92.1.35.el5.noarch", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.i386", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "relates_to_product_reference": "5Server-5.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)", "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64", "relates_to_product_reference": "5Server-5.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4567", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "548641" } ], "notes": [ { "category": "description", "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6_hop_jumbo remote system crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4567" }, { "category": "external", "summary": "RHBZ#548641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567" } ], "release_date": "2007-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6_hop_jumbo remote system crash" }, { "cve": "CVE-2007-5966", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2007-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "453135" } ], "notes": [ { "category": "description", "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: non-root can trigger cpu_idle soft lockup", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5966" }, { "category": "external", "summary": "RHBZ#453135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966" } ], "release_date": "2007-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: non-root can trigger cpu_idle soft lockup" }, { "cve": "CVE-2009-0778", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2009-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "485163" } ], "notes": [ { "category": "description", "text": "The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an \"rt_cache leak.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: rt_cache leak leads to lack of network connectivity", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0778" }, { "category": "external", "summary": "RHBZ#485163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778" } ], "release_date": "2008-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: rt_cache leak leads to lack of network connectivity" }, { "cve": "CVE-2009-0834", "discovery_date": "2009-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "487990" } ], "notes": [ { "category": "description", "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0834" }, { "category": "external", "summary": "RHBZ#487990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834" } ], "release_date": "2009-02-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole" }, { "cve": "CVE-2009-1385", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "502981" } ], "notes": [ { "category": "description", "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000_clean_rx_irq() denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1385" }, { "category": "external", "summary": "RHBZ#502981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385" } ], "release_date": "2007-04-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000_clean_rx_irq() denial of service" }, { "cve": "CVE-2009-1895", "discovery_date": "2009-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511171" } ], "notes": [ { "category": "description", "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: personality: fix PER_CLEAR_ON_SETID", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1895" }, { "category": "external", "summary": "RHBZ#511171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895" } ], "release_date": "2009-06-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: personality: fix PER_CLEAR_ON_SETID" }, { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2009-4537", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "550907" } ], "notes": [ { "category": "description", "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4537" }, { "category": "external", "summary": "RHBZ#550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169 issue reported at 26c3" }, { "cve": "CVE-2009-4538", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "551214" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000e frame fragment issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "RHBZ#551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-02T21:01:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0079" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src", "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64", "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64", "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000e frame fragment issue" } ] }
rhsa-2010_0095
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor package that fixes security issues and several\nbugs is now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor package provides a Red Hat Enterprise Virtualization\n(RHEV) Hypervisor ISO disk image. The RHEV Hypervisor is a dedicated\nKernel-based Virtual Machine (KVM) hypervisor. It includes everything\nnecessary to run and manage virtual machines: A subset of the Red Hat\nEnterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: RHEV Hypervisor is only available for the Intel 64 and AMD64\narchitectures with virtualization extensions.\n\nA flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567)\n\nThe Parallels Virtuozzo Containers team reported two flaws in the routing\nimplementation. If an attacker was able to cause a large enough number of\ncollisions in the routing hash table (via specially-crafted packets) for\nthe emergency route flush to trigger, a deadlock could occur. Secondly, if\nthe kernel routing cache was disabled, an uninitialized pointer would be\nleft behind after a route lookup, leading to a kernel panic.\n(CVE-2009-4272)\n\nA flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538)\n\nA flaw was found in the Realtek r8169 Ethernet driver in the Linux kernel.\nReceiving overly-long frames with a certain revision of the network cards\nsupported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537)\n\nThe x86 emulator implementation was missing a check for the Current\nPrivilege Level (CPL) and I/O Privilege Level (IOPL). A user in a guest\ncould leverage these flaws to cause a denial of service (guest crash) or\npossibly escalate their privileges within that guest. (CVE-2010-0298,\nCVE-2010-0306)\n\nA flaw was found in the Programmable Interval Timer (PIT) emulation. Access\nto the internal data structure pit_state, which represents the data state\nof the emulated PIT, was not properly validated in the pit_ioport_read()\nfunction. A privileged guest user could use this flaw to crash the host.\n(CVE-2010-0309)\n\nThis updated package provides updated components that include fixes for\nsecurity issues; however, these issues have no security impact for RHEV\nHypervisor. These fixes are for kernel issues CVE-2006-6304, CVE-2009-2910,\nCVE-2009-3080, CVE-2009-3556, CVE-2009-3889, CVE-2009-3939, CVE-2009-4020,\nCVE-2009-4021, CVE-2009-4138, and CVE-2009-4141; ntp issue CVE-2009-3563;\ndbus issue CVE-2009-1189; dnsmasq issues CVE-2009-2957 and CVE-2009-2958;\ngnutls issue CVE-2009-2730; krb5 issue CVE-2009-4212; bind issue \nCVE-2010-0097; gzip issue CVE-2010-0001; openssl issues CVE-2009-2409 and \nCVE-2009-4355; and gcc issue CVE-2009-3736.\n\nThis update also fixes the following bugs:\n\n* on systems with a large number of disk devices, USB storage devices may\nget enumerated after \"/dev/sdz\", for example, \"/dev/sdcd\". This was not\nhandled by the udev rules, resulting in a missing \"/dev/live\" symbolic\nlink, causing installations from USB media to fail. With this update, udev\nrules correctly handle USB storage devices on systems with a large number\nof disk devices, which resolves this issue. (BZ#555083)\n\nAs RHEV Hypervisor is based on KVM, the bug fixes from the KVM update\nRHSA-2010:0088 have been included in this update:\n\nhttps://rhn.redhat.com/errata/RHSA-2010-0088.html\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0095", "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHSA-2010-0088.html", "url": "https://rhn.redhat.com/errata/RHSA-2010-0088.html" }, { "category": "external", "summary": "545411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411" }, { "category": "external", "summary": "548641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "category": "external", "summary": "550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "559091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559091" }, { "category": "external", "summary": "560654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560654" }, { "category": "external", "summary": "560887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0095.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor security and bug fix update", "tracking": { "current_release_date": "2024-11-14T10:48:03+00:00", "generator": { "date": "2024-11-14T10:48:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0095", "initial_release_date": "2010-02-09T15:23:00+00:00", "revision_history": [ { "date": "2010-02-09T15:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-02-09T10:23:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:48:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Virtualization Hypervisor 5", "product": { "name": "Red Hat Enterprise Virtualization Hypervisor 5", "product_id": "5Server-RHEV-Hypervisor-2", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "product": { "name": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "product_id": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.8.el5_4rhev2_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "product": { "name": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "product_id": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.8.el5_4rhev2_1?arch=noarch" } } }, { "category": "product_version", "name": "rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch", "product": { "name": "rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch", "product_id": "rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor-pxe@5.4-2.1.8.el5_4rhev2_1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch as a component of Red Hat Enterprise Virtualization Hypervisor 5", "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch" }, "product_reference": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "relates_to_product_reference": "5Server-RHEV-Hypervisor-2" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src as a component of Red Hat Enterprise Virtualization Hypervisor 5", "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src" }, "product_reference": "rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "relates_to_product_reference": "5Server-RHEV-Hypervisor-2" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch as a component of Red Hat Enterprise Virtualization Hypervisor 5", "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" }, "product_reference": "rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch", "relates_to_product_reference": "5Server-RHEV-Hypervisor-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4567", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "548641" } ], "notes": [ { "category": "description", "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6_hop_jumbo remote system crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4567" }, { "category": "external", "summary": "RHBZ#548641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567" } ], "release_date": "2007-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-09T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6_hop_jumbo remote system crash" }, { "cve": "CVE-2009-4272", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-12-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "545411" } ], "notes": [ { "category": "description", "text": "A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing \"emergency\" in which a hash chain is too long. NOTE: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: emergency route cache flushing leads to node deadlock", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commits c6153b5b and 1080d709 that introduced the problem.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4272" }, { "category": "external", "summary": "RHBZ#545411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4272", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4272" } ], "release_date": "2010-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-09T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: emergency route cache flushing leads to node deadlock" }, { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-09T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2009-4537", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "550907" } ], "notes": [ { "category": "description", "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4537" }, { "category": "external", "summary": "RHBZ#550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-09T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169 issue reported at 26c3" }, { "cve": "CVE-2009-4538", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "551214" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000e frame fragment issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "RHBZ#551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-09T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000e frame fragment issue" }, { "cve": "CVE-2010-0298", "discovery_date": "2010-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "559091" } ], "notes": [ { "category": "description", "text": "The x86 emulator in KVM 83 does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) in determining the memory access available to CPL3 code, which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, a related issue to CVE-2010-0306.", "title": "Vulnerability description" }, { "category": "summary", "text": "kvm: emulator privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0298" }, { "category": "external", "summary": "RHBZ#559091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0298", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0298" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0298", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0298" } ], "release_date": "2010-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-09T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kvm: emulator privilege escalation" }, { "cve": "CVE-2010-0306", "discovery_date": "2010-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "560654" } ], "notes": [ { "category": "description", "text": "The x86 emulator in KVM 83, when a guest is configured for Symmetric Multiprocessing (SMP), does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) to restrict instruction execution, which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, and replacing an instruction in between emulator entry and instruction fetch, a related issue to CVE-2010-0298.", "title": "Vulnerability description" }, { "category": "summary", "text": "kvm: emulator privilege escalation IOPL/CPL level check", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0306" }, { "category": "external", "summary": "RHBZ#560654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0306", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0306" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0306", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0306" } ], "release_date": "2010-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-09T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kvm: emulator privilege escalation IOPL/CPL level check" }, { "cve": "CVE-2010-0309", "discovery_date": "2010-02-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "560887" } ], "notes": [ { "category": "description", "text": "The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kvm: cat /dev/port in guest cause the host hang", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0309" }, { "category": "external", "summary": "RHBZ#560887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0309", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0309" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0309", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0309" } ], "release_date": "2010-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-09T15:23:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.noarch", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1.src", "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kvm: cat /dev/port in guest cause the host hang" } ] }
rhsa-2010_0041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix multiple security issues and several\nbugs are now available for Red Hat Enterprise MRG 1.2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* an array index error was found in the gdth driver in the Linux kernel. A\nlocal user could send a specially-crafted IOCTL request that would cause a\ndenial of service or, possibly, privilege escalation. (CVE-2009-3080,\nImportant)\n\n* a flaw was found in the FUSE implementation in the Linux kernel. When a\nsystem is low on memory, fuse_put_request() could dereference an invalid\npointer, possibly leading to a local denial of service or privilege\nescalation. (CVE-2009-4021, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nThis update also fixes the following bugs:\n\n* the \"function tracer\" from ftrace could eventually present problems when\na module was unloaded during a tracing session. Some of the related call\nsite entries for that module were not removed from ftrace\u0027s internal lists\nand could lead to confusing \"oops\" error messages. The call site entries\nare now removed correctly, and the errors no longer occur. (BZ#537472)\n\n* when using the kernel in tickless (or NOHZ) mode, time was not\naccumulated one tick at a time. This created latencies when the accumulated\ninterval grew large. Time is now accumulated logarithmically and latencies\nrelated to tickless mode no longer occur. (BZ#538370)\n\n* running the \"cset set\" command was resulting in unsafe access to a\nstructure that could be concurrently changed. This was eventually causing\nthe kernel to crash. The operations were repositioned so that they no\nlonger add locks, to minimize performance penalties. (BZ#541080)\n\n* the function used to calculate system load called different functions to\ncount the tasks in running and interpretable states. On systems with a\nlarge number of CPUs, this could result in several TLB and cache misses.\nThese functions have now been combined, and the problem has been\nsignificantly reduced. (BZ#552860)\n\n* when legacy PCI bus checks occurred, an off-by-one error would present.\nScanning 255 PCI buses is now allowed as 0xff is a valid bus, and the error\nno longer occurs. (BZ#552874)\n\n* on systems with 8 or more CPUs, an unnecessary anon_vma lock acquisition\nin vma_adjust() was causing a decrease in throughput. Code from the\nupstream kernel was backported, and the throughput decrease no longer\nexists. (BZ#552876)\n\n* the scheduler function double_lock_balance() favors logically lower CPUs.\nThis could cause logically higher CPUs to be starved if run queues were\nunder a lot of pressure, resulting in latencies. The algorithm has been\nadjusted so that it is fairer, and logically higher CPUs no longer risk\nbeing starved. (BZ#552877)\n\nThese updated packages also include other bug fixes. Users are directed to\nthe Red Hat Enterprise MRG 1.2 Release Notes for information on those\nfixes, available shortly from:\n\nhttp://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0041", "url": "https://access.redhat.com/errata/RHSA-2010:0041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/", "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/" }, { "category": "external", "summary": "537472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537472" }, { "category": "external", "summary": "538734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538734" }, { "category": "external", "summary": "539414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414" }, { "category": "external", "summary": "541080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=541080" }, { "category": "external", "summary": "550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0041.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:26:51+00:00", "generator": { "date": "2024-11-22T03:26:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0041", "initial_release_date": "2010-01-21T14:10:00+00:00", "revision_history": [ { "date": "2010-01-21T14:10:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-01-21T09:10:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:26:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-146.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-146.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-146.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-146.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-146.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-146.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-146.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-146.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-146.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-146.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-146.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3080", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539414" } ], "notes": [ { "category": "description", "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gdth: Prevent negative offsets in ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3080" }, { "category": "external", "summary": "RHBZ#539414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080" } ], "release_date": "2009-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-21T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0041" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: gdth: Prevent negative offsets in ioctl" }, { "cve": "CVE-2009-4021", "discovery_date": "2009-11-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "538734" } ], "notes": [ { "category": "description", "text": "The fuse_direct_io function in fs/fuse/file.c in the fuse subsystem in the Linux kernel before 2.6.32-rc7 might allow attackers to cause a denial of service (invalid pointer dereference and OOPS) via vectors possibly related to a memory-consumption attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: prevent fuse_put_request on invalid pointer", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/CVE-2009-4021\n\nThe Linux kernel packages as shipped with Red Hat Enterprise Linux 3 and 4 do not include support for FUSE, and therefore are not affected by this issue.\n\nA future kernel update for Red Hat Enterprise MRG will address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4021" }, { "category": "external", "summary": "RHBZ#538734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=538734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4021", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4021" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4021", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4021" } ], "release_date": "2009-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-21T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0041" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 4.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: fuse: prevent fuse_put_request on invalid pointer" }, { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-21T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0041" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2009-4537", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "550907" } ], "notes": [ { "category": "description", "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4537" }, { "category": "external", "summary": "RHBZ#550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-21T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0041" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169 issue reported at 26c3" }, { "cve": "CVE-2009-4538", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "551214" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000e frame fragment issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "RHBZ#551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-21T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0041" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-146.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-146.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-146.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000e frame fragment issue" } ] }
rhsa-2010_0020
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with network cards supported by this\ndriver could possibly result in a remote denial of service. (CVE-2009-4537,\nImportant)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0020", "url": "https://access.redhat.com/errata/RHSA-2010:0020" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0020.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T10:47:33+00:00", "generator": { "date": "2024-11-14T10:47:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0020", "initial_release_date": "2010-01-08T00:37:00+00:00", "revision_history": [ { "date": "2010-01-08T00:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-01-07T19:43:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:47:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.19.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.19.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.19.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.19.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.19.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.19.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.19.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.19.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.19.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.19.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.0.19.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.19.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.19.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.19.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.19.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.0.19.EL.ia64", "product_id": "kernel-0:2.6.9-89.0.19.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.19.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.19.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.19.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.19.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.19.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.19.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.19.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.19.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.19.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.19.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.19.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.19.EL.src", "product": { "name": "kernel-0:2.6.9-89.0.19.EL.src", "product_id": "kernel-0:2.6.9-89.0.19.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.19.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.0.19.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.0.19.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.0.19.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.19.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.19.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.19.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.19.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.19.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64", "product_id": "kernel-0:2.6.9-89.0.19.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.19.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.19.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.19.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.19.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.19.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.0.19.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.19.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.19.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.0.19.EL.s390x", "product_id": "kernel-0:2.6.9-89.0.19.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.19.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.19.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.0.19.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.19.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.19.EL.s390", "product": { "name": "kernel-0:2.6.9-89.0.19.EL.s390", "product_id": "kernel-0:2.6.9-89.0.19.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.19.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.19.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.19.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.19.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.19.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.19.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.19.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.19.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.19.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.19.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.19.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.19.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.19.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.19.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-08T00:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0020" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2009-4537", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "550907" } ], "notes": [ { "category": "description", "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4537" }, { "category": "external", "summary": "RHBZ#550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-08T00:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0020" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169 issue reported at 26c3" }, { "cve": "CVE-2009-4538", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "551214" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000e frame fragment issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "RHBZ#551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-08T00:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0020" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-0:2.6.9-89.0.19.EL.src", "4AS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.19.EL.src", "4Desktop:kernel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-0:2.6.9-89.0.19.EL.src", "4ES:kernel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-0:2.6.9-89.0.19.EL.src", "4WS:kernel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.19.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.19.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.19.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000e frame fragment issue" } ] }
rhsa-2010_0882
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 3 Extended Life Cycle Support\n(ELS).\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An array index error was found in the gdth driver in the Linux kernel. A\nlocal user could send a specially-crafted IOCTL request that would cause a\ndenial of service or, possibly, privilege escalation. (CVE-2009-3080,\nImportant)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux\nkernel. A remote attacker using packets larger than the MTU could bypass\nthe existing fragment check, resulting in partial, invalid frames being\npassed to the network stack. This flaw could also possibly be used to\ntrigger a remote denial of service. (CVE-2009-4536, Important)\n\n* A use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_PKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\n* When an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring, which could cause an application to execute arbitrary code,\npossibly leading to privilege escalation. It is known that the X Window\nSystem server can be used to trigger this flaw. (CVE-2010-2240, Important)\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel. On 64-bit systems, a\nlocal, unprivileged user could use this flaw to escalate their privileges.\n(CVE-2010-3081, Important)\n\nRed Hat would like to thank the X.Org security team for reporting the\nCVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the\noriginal reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.\n\nThis update also fixes the following bug:\n\n* The RHSA-2009:1550 kernel update introduced a regression that prevented\ncertain custom kernel modules from loading, failing with \"unresolved\nsymbol\" errors. This update corrects this issue, allowing the affected\nmodules to load as expected. (BZ#556909)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0882", "url": "https://access.redhat.com/errata/RHSA-2010:0882" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "http://www.redhat.com/rhel/server/extended_lifecycle_support/", "url": "http://www.redhat.com/rhel/server/extended_lifecycle_support/" }, { "category": "external", "summary": "529597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597" }, { "category": "external", "summary": "539414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "556909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556909" }, { "category": "external", "summary": "577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "606611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0882.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:47:18+00:00", "generator": { "date": "2024-11-22T03:47:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0882", "initial_release_date": "2010-11-12T09:36:00+00:00", "revision_history": [ { "date": "2010-11-12T09:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-12T04:36:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:47:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (v. 3 ELS)", "product": { "name": "Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:3::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES (v. 3 ELS)", "product": { "name": "Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:3::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-66.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-66.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-66.EL.i386", "product_id": "kernel-doc-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-66.EL.i386", "product": { "name": "kernel-source-0:2.4.21-66.EL.i386", "product_id": "kernel-source-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-66.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-66.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.i686", "product": { "name": "kernel-0:2.4.21-66.EL.i686", "product_id": "kernel-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-66.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-66.EL.i686", "product_id": "kernel-smp-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-66.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-0:2.4.21-66.EL.athlon", "product_id": "kernel-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-66.EL.athlon", "product_id": "kernel-smp-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.src", "product": { "name": "kernel-0:2.4.21-66.EL.src", "product_id": "kernel-0:2.4.21-66.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.src" }, "product_reference": "kernel-0:2.4.21-66.EL.src", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.src" }, "product_reference": "kernel-0:2.4.21-66.EL.src", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3080", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539414" } ], "notes": [ { "category": "description", "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gdth: Prevent negative offsets in ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3080" }, { "category": "external", "summary": "RHBZ#539414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080" } ], "release_date": "2009-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: gdth: Prevent negative offsets in ioctl" }, { "cve": "CVE-2009-3620", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "529597" } ], "notes": [ { "category": "description", "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3620" }, { "category": "external", "summary": "RHBZ#529597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620" } ], "release_date": "2009-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised" }, { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2010-1188", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "577711" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: skb is unexpectedly freed", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1188" }, { "category": "external", "summary": "RHBZ#577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: skb is unexpectedly freed" }, { "acknowledgments": [ { "names": [ "X.Org security team" ] }, { "names": [ "Rafal Wojtczuk" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2010-2240", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "606611" } ], "notes": [ { "category": "description", "text": "The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: keep a guard page below a grow-down stack segment", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2240" }, { "category": "external", "summary": "RHBZ#606611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2240", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2240" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240" } ], "release_date": "2010-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: keep a guard page below a grow-down stack segment" }, { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
rhsa-2010_0111
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.7 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0111", "url": "https://access.redhat.com/errata/RHSA-2010:0111" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0111.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T10:48:14+00:00", "generator": { "date": "2024-11-14T10:48:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0111", "initial_release_date": "2010-02-16T16:57:00+00:00", "revision_history": [ { "date": "2010-02-16T16:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-02-16T12:04:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:48:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS EUS (v. 4.7)", "product": { "name": "Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.7::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES EUS (v. 4.7)", "product": { "name": "Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.7::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.29.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-devel-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.29.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.29.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-78.0.29.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.29.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.29.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-smp-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.29.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-78.0.29.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-78.0.29.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-78.0.29.EL.i686", "product_id": "kernel-xenU-0:2.6.9-78.0.29.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.29.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.29.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.29.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ia64", "product_id": "kernel-devel-0:2.6.9-78.0.29.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.29.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.29.EL.ia64", "product": { "name": "kernel-0:2.6.9-78.0.29.EL.ia64", "product_id": "kernel-0:2.6.9-78.0.29.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.29.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.29.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.29.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.29.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.29.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.29.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.29.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.29.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.29.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.29.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.29.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.29.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.29.EL.src", "product": { "name": "kernel-0:2.6.9-78.0.29.EL.src", "product_id": "kernel-0:2.6.9-78.0.29.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.29.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-78.0.29.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-78.0.29.EL.noarch", "product_id": "kernel-doc-0:2.6.9-78.0.29.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-78.0.29.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.29.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.29.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.29.EL.ppc64", "product": { "name": "kernel-0:2.6.9-78.0.29.EL.ppc64", "product_id": "kernel-0:2.6.9-78.0.29.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.29.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.29.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.29.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.29.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.29.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.29.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.29.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.29.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.s390x", "product_id": "kernel-devel-0:2.6.9-78.0.29.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.29.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.29.EL.s390x", "product": { "name": "kernel-0:2.6.9-78.0.29.EL.s390x", "product_id": "kernel-0:2.6.9-78.0.29.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.29.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.29.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.29.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.s390", "product_id": "kernel-devel-0:2.6.9-78.0.29.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.29.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.29.EL.s390", "product": { "name": "kernel-0:2.6.9-78.0.29.EL.s390", "product_id": "kernel-0:2.6.9-78.0.29.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.29.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.src", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-78.0.29.EL.noarch as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-78.0.29.EL.noarch", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.src", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-78.0.29.EL.noarch as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-78.0.29.EL.noarch", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-16T16:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0111" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2009-4537", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "550907" } ], "notes": [ { "category": "description", "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4537" }, { "category": "external", "summary": "RHBZ#550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-16T16:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0111" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169 issue reported at 26c3" }, { "cve": "CVE-2009-4538", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "551214" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000e frame fragment issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "RHBZ#551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-02-16T16:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0111" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.29.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.29.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.29.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000e frame fragment issue" } ] }
rhsa-2010_0019
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with network cards supported by this\ndriver could possibly result in a remote denial of service. (CVE-2009-4537,\nImportant)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0019", "url": "https://access.redhat.com/errata/RHSA-2010:0019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "548641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "category": "external", "summary": "550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0019.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T10:47:29+00:00", "generator": { "date": "2024-11-14T10:47:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0019", "initial_release_date": "2010-01-07T23:26:00+00:00", "revision_history": [ { "date": "2010-01-07T23:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-01-07T18:35:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:47:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.10.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.10.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-164.10.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.10.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.10.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-164.10.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.10.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.10.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.10.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-164.10.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-164.10.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-164.10.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.10.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-164.10.1.el5.src", "product": { "name": "kernel-0:2.6.18-164.10.1.el5.src", "product_id": "kernel-0:2.6.18-164.10.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.10.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.10.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.10.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-164.10.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.10.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.10.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.10.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.10.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-164.10.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.10.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.10.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.10.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-164.10.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.10.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.10.1.el5.src" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-164.10.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-164.10.1.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.10.1.el5.src" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-164.10.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-164.10.1.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4567", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "548641" } ], "notes": [ { "category": "description", "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6_hop_jumbo remote system crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4567" }, { "category": "external", "summary": "RHBZ#548641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567" } ], "release_date": "2007-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-07T23:26:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6_hop_jumbo remote system crash" }, { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-07T23:26:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2009-4537", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "550907" } ], "notes": [ { "category": "description", "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4537" }, { "category": "external", "summary": "RHBZ#550907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-07T23:26:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169 issue reported at 26c3" }, { "cve": "CVE-2009-4538", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "551214" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000e frame fragment issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "RHBZ#551214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-07T23:26:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-0:2.6.18-164.10.1.el5.src", "5Client:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-0:2.6.18-164.10.1.el5.src", "5Server:kernel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-devel-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-doc-0:2.6.18-164.10.1.el5.noarch", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.i386", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-headers-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-164.10.1.el5.s390x", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-164.10.1.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-164.10.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000e frame fragment issue" } ] }
var-200906-0612
Vulnerability from variot
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385. The Linux e1000 driver is prone to a security-bypass vulnerability. An attacker can exploit this issue to cause network traffic to be misinterpreted, which may allow the attacker to bypass intended security restrictions or launch further attacks. NOTE: A related vulnerability is documented as BID 35185 (Linux Kernel 'e1000/e1000_main.c' Remote Denial of Service Vulnerability), but that issue doesn't address all possible scenarios. The Linux kernel is the kernel used by the open source operating system Linux released by the American Linux Foundation. The NFSv4 implementation is one of the distributed file system protocols. Although security support for 'etch' officially ended on Feburary 15th, 2010, this update was already in preparation before that date. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2009-2691
Steve Beattie and Kees Cook reported an information leak in the
maps and smaps files available under /proc. Local users may be
able to read this data for setuid processes while the ELF binary
is being loaded.
CVE-2009-2695
Eric Paris provided several fixes to increase the protection
provided by the mmap_min_addr tunable against NULL pointer
dereference vulnerabilities.
CVE-2009-3080
Dave Jones reported an issue in the gdth SCSI driver. A missing
check for negative offsets in an ioctl call could be exploited by
local users to create a denial of service or potentially gain
elevated privileges.
CVE-2009-3726
Trond Myklebust reported an issue where a malicious NFS server
could cause a denial of service condition on its clients by
returning incorrect attributes during an open call.
CVE-2009-3889
Joe Malicki discovered an issue in the megaraid_sas driver.
Insufficient permissions on the sysfs dbg_lvl interface allow
local users to modify the debug logging behavior.
CVE-2009-4005
Roel Kluin discovered an issue in the hfc_usb driver, an ISDN
driver for Colognechip HFC-S USB chip.
CVE-2009-4020
Amerigo Wang discovered an issue in the HFS filesystem that would
allow a denial of service by a local user who has sufficient
privileges to mount a specially crafted filesystem. Avati discovered an issue in the fuse subsystem. If the
system is sufficiently low on memory, a local user can cause the
kernel to dereference an invalid pointer resulting in a denial of
service (oops) and potentially an escalation of privileges.
CVE-2009-4138
Jay Fenlason discovered an issue in the firewire stack that allows
local users to cause a denial of service (oops or crash) by making
a specially crafted ioctl call.
CVE-2009-4308
Ted Ts'o discovered an issue in the ext4 filesystem that allows
local users to cause a denial of service (NULL pointer
dereference). This option is disabled by
default.
CVE-2010-0007
Florian Westphal reported a lack of capability checking in the
ebtables netfilter subsystem. If the ebtables module is loaded,
local users can add and modify ebtables rules.
CVE-2010-0410
Sebastian Krahmer discovered an issue in the netlink connector
subsystem that permits local users to allocate large amounts of
system memory resulting in a denial of service (out of memory).
CVE-2010-0415
Ramon de Carvalho Valle discovered an issue in the sys_move_pages
interface, limited to amd64, ia64 and powerpc64 flavors in Debian.
CVE-2010-0622
Jermome Marchand reported an issue in the futex subsystem that
allows a local user to force an invalid futex state which results
in a denial of service (oops).
For the oldstable distribution (etch), this problem has been fixed in version 2.6.24-6~etchnhalf.9etch3.
We recommend that you upgrade your linux-2.6.24 packages.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.dsc Size/MD5 checksum: 5118 e05bb21e7655cbfa39aed8d4fd6842eb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.diff.gz Size/MD5 checksum: 4099250 127bad8d653046d37fc52115d4e3a332 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af
Architecture independent packages:
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 4263554 6c56ff077d17eba766af47544ce0f414 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 83890 62cfd18ed176359831502e70d80b291a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 46871628 328ad30d3c07f90c56d821f76e186b40 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 1550090 1f114fdc3123f135017dbdcd0e4839c6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 1009878 c7b7abff092940a400703b9168e46daa http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.9etch3_all.deb Size/MD5 checksum: 98248 a2a391008f8855d8358d5f18d9d76044
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 329786 a212d2b3a94f8a04611c0f20d3d324b9 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 27236282 b5bc553c4bf3a49843c45814fab72443 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 83428 f5f27b9de4905239e6315c77393f1f03 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 83454 5d152b5b6aa505982ebc7122a770b29b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 26641900 c799e7d48937975036b46edf032ecd87 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 26620162 eb1c3c27f1ac81959dc0f2ab497aee35 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 3455268 da2d2cc2b7c4253ac408c30fcfddb28f http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 329788 f589f8815f7adf02f8884e2dd3ac613f http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb Size/MD5 checksum: 329336 14bf085655b30adc8ab8f6ed4207d415
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 19482308 c49d2962c1a391fb00fb1b5f0598b24e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 3656476 f2f5de65037664d03208fcea83bf2ee2 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 83422 600c7216143f43f9c61b0c2ccd118ea0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 83434 36f1d8f21ec39a473536dbeda2332e62 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb Size/MD5 checksum: 346940 d3f12fdd61f90749fdd08d857b326327
arm architecture (ARM)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 9357734 3e1165a0795d7db5f7ed8ef84205064b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 298744 50d8bfa3c06134e190409399a36c5aa9 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 83546 1742ab93afadd1827009bf1d714e76eb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 83578 07906e33f9ad267d986991c93eef1048 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 10778670 cc38a718ad5fd1c6e92d23e416610bd6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 308138 34dbc7720b1844833f0b71aa307c37fa http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 310714 6a2c6fbbc1dd000b8a532227e3b8b5ae http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 3939512 91c2ba626e754fe407d6dcf3fa01337a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb Size/MD5 checksum: 10786892 4d44a4ff751969855a01ad754a7c2b22
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 14375048 fe6ed4dea09aa205d801476667ef03cb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 13847788 4adc3106a987d84e12215156a379f460 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 259624 ac09dcabb624984b7321a5f6b6dbef54 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 83578 e152e18748e5c80b6d06715db836cf83 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 260838 44bc8ad5796c124b53d85a8c3a4ed912 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 262420 ff0641f04c409dd606c34373e8e16269 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 14830990 cce09e8022bee915dcde5dd8b9525428 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 13333594 a4dc863b0c84b9006c723db9a581c92e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 83546 990eb24056c7f6a63a4d55ec39563bae http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 3446386 6ebfa4544252648df48cfb085cc3d2cc http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb Size/MD5 checksum: 258962 75184bed1f0b42cd8e002f93ed42198a
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 3656680 c5499cb98cdcdcadc48e3aa5bdf1d379 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 19214268 e3f564cae5a85355f4b5a9248a11af98 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 19148424 dd1d713c896888370a1667a16571c08c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 346982 6a6a08f74f9690705e6d770d1f3f2566 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 359548 b10fe011746b0df5fbd2587292af34ae http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 19482314 5d9cc150e340aea40e253a757cfdc423 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 83452 32a1614212e964a4423b161b34cd758d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 19213598 4f459c2d2cdb87a6f945cbee7d4500d4 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 358212 58ba32b0701643f043ab38a487cae609 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 83424 c1e8493aff96df5b0fe33f5af4686f98 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb Size/MD5 checksum: 358752 4e3e9ef18a14fd191444591df571f80c
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 3569470 9ae824064bfc785f4b3512db78119e46 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 32206374 badd40dd68e2c6634c65f79d9536e34d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 83432 64a48fa9283b1741e22f0a22dbb93b20 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 83456 235a5572d5e109a4b575080a8262dc57 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 319938 d7dc0120458e93119879dcdd1e48017e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 32025762 7595d7dc21d3273f46b35b8c00b0e195 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb Size/MD5 checksum: 320226 34731a37b519d726b133093e04d937c3
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 22243472 532341ea0847ea19414413f7659ff13d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 248638 ce9da5c377d6328e9bb9be1c3945fff8 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 12001172 817c44fd5afbeef1b9f172522ff21bcb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 10553972 20ddd95631b93efd52ae0aa38a5cd6d4 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 83600 a7b66d71779dea207a3d49cb9f692fdb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 27858364 54998117445c20f413331d1197355745 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 17212542 bf6c996fd387eef151e0db60d1bd00f2 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 313302 314b57dc807eb91f617c10b1497e1617 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 314602 2c127076bf189be2836a4c3a4c7736af http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 3804368 fbcb3bdd668db166ad3f08e6dbfbc6e0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 17194888 9bce41a8b9936a16a3aa9cca675b9638 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 83540 8acdb1b4a4bc57f55b9cc5b2b04043a4 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 229412 0b93c7c909eca04fad4fa45e3e73e96c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 248700 13266a2acd5fcbd75d11049dd5e5ad58 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb Size/MD5 checksum: 218314 4174dec1c73ca114469cbb88fba32926
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 16567710 29d2ab68b4259a1822a2ca19e9494f5d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 309868 d69b27ef946f2ac62b115e0200fe8002 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 26988356 f0d885b353b15dc42e4e76da8a8fb129 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 248150 7c585f74e0752a631050b13b9740c0c3 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 13318088 0b0a8b724245ac10817b03c4cf734827 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 83484 a678208f18017a9c87d45548916fd98e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 311392 5b1f0957a2756b04be6c95ae8ca5e2c8 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 21736368 02da1a4e543b8c5082476b156281cb31 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 247968 929ca712a0aa0984f9dc2a6f68f405a5 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 16632240 c9de1dfccb8a5cb5d5d652ca694a7108 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 3805532 be10a8b64da3adf7ece3846b0b0bf930 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 83434 ac0cb9b5939e4ea82c3c83a1a1d473ed http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb Size/MD5 checksum: 248174 50e84058a7d710f013f92e1fe68a705c
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 322474 2d7e39cf0b78d98125a0baba377f1af0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 19195556 bb2bd8e203cee7b3c6739d5c5d11901a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 324008 3b021bb4b3dac72dc68e701f4a209939 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 295928 ca2bf1c3c12f409e469c516877a8e91c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 21170062 4022dbff73ebfde3a846ce38896cf09c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 322502 4b76cce255e1fcc72cb82053cd34a1a2 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 17459240 ad749c6e735e58d775b7190ff3d26e50 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 83466 a041c0fdb383832cf725723ce22e40c0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 83430 392d415932625b1a69dc6494d2f737e0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 3674486 200fdcca2140a97f961a37d70db620d5 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb Size/MD5 checksum: 19487244 b42ad8431643d89a1f8b0e6e0aaeb39e
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 83532 a1c34683fe304f1a86bbc28f6cbc654c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 83556 bf7fed1ef4da92d782409fe8345f861a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 6976486 5b5db16fea4336068bbcd5bff56ad575 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 7228452 75c044fa17d6071de36579a1491c2e1b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 3431908 18825f85900faca81b21e48d43af6ee7 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 197006 0a44248e77ec1ff027edd032ebe5b2c6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 1503494 bd7f7b7bd4e120472bf60ad0b7d9184e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb Size/MD5 checksum: 196810 f03114c2f256a97b15f88d2659f9501b
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 83428 1ea7179752fbb45e10e731991583db68 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 263546 ef894d6917cbe692ec9197048538d5e7 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 3651402 a0194c650712040f81e97d5b3b62bc79 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 264892 0b642e20f00b52c20b6ae9e0ee1f78b8 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 83442 6d109d7f131dab564736e2ac6a85dd29 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 13318532 dbce062bfa560c331b75bed073868e1d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb Size/MD5 checksum: 13019464 b0b153fafa43b650e996a9d84bbb26d7
These changes will probably be included in the oldstable distribution on its next update. =========================================================== Ubuntu Security Notice USN-894-1 February 05, 2010 linux, linux-source-2.6.15 vulnerabilities CVE-2009-4020, CVE-2009-4021, CVE-2009-4031, CVE-2009-4138, CVE-2009-4141, CVE-2009-4308, CVE-2009-4536, CVE-2009-4538, CVE-2010-0003, CVE-2010-0006, CVE-2010-0007, CVE-2010-0291 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 Ubuntu 9.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: linux-image-2.6.15-55-386 2.6.15-55.82 linux-image-2.6.15-55-686 2.6.15-55.82 linux-image-2.6.15-55-amd64-generic 2.6.15-55.82 linux-image-2.6.15-55-amd64-k8 2.6.15-55.82 linux-image-2.6.15-55-amd64-server 2.6.15-55.82 linux-image-2.6.15-55-amd64-xeon 2.6.15-55.82 linux-image-2.6.15-55-hppa32 2.6.15-55.82 linux-image-2.6.15-55-hppa32-smp 2.6.15-55.82 linux-image-2.6.15-55-hppa64 2.6.15-55.82 linux-image-2.6.15-55-hppa64-smp 2.6.15-55.82 linux-image-2.6.15-55-itanium 2.6.15-55.82 linux-image-2.6.15-55-itanium-smp 2.6.15-55.82 linux-image-2.6.15-55-k7 2.6.15-55.82 linux-image-2.6.15-55-mckinley 2.6.15-55.82 linux-image-2.6.15-55-mckinley-smp 2.6.15-55.82 linux-image-2.6.15-55-powerpc 2.6.15-55.82 linux-image-2.6.15-55-powerpc-smp 2.6.15-55.82 linux-image-2.6.15-55-powerpc64-smp 2.6.15-55.82 linux-image-2.6.15-55-server 2.6.15-55.82 linux-image-2.6.15-55-server-bigiron 2.6.15-55.82 linux-image-2.6.15-55-sparc64 2.6.15-55.82 linux-image-2.6.15-55-sparc64-smp 2.6.15-55.82
Ubuntu 8.04 LTS: linux-image-2.6.24-27-386 2.6.24-27.65 linux-image-2.6.24-27-generic 2.6.24-27.65 linux-image-2.6.24-27-hppa32 2.6.24-27.65 linux-image-2.6.24-27-hppa64 2.6.24-27.65 linux-image-2.6.24-27-itanium 2.6.24-27.65 linux-image-2.6.24-27-lpia 2.6.24-27.65 linux-image-2.6.24-27-lpiacompat 2.6.24-27.65 linux-image-2.6.24-27-mckinley 2.6.24-27.65 linux-image-2.6.24-27-openvz 2.6.24-27.65 linux-image-2.6.24-27-powerpc 2.6.24-27.65 linux-image-2.6.24-27-powerpc-smp 2.6.24-27.65 linux-image-2.6.24-27-powerpc64-smp 2.6.24-27.65 linux-image-2.6.24-27-rt 2.6.24-27.65 linux-image-2.6.24-27-server 2.6.24-27.65 linux-image-2.6.24-27-sparc64 2.6.24-27.65 linux-image-2.6.24-27-sparc64-smp 2.6.24-27.65 linux-image-2.6.24-27-virtual 2.6.24-27.65 linux-image-2.6.24-27-xen 2.6.24-27.65
Ubuntu 8.10: linux-image-2.6.27-17-generic 2.6.27-17.45 linux-image-2.6.27-17-server 2.6.27-17.45 linux-image-2.6.27-17-virtual 2.6.27-17.45
Ubuntu 9.04: linux-image-2.6.28-18-generic 2.6.28-18.59 linux-image-2.6.28-18-imx51 2.6.28-18.59 linux-image-2.6.28-18-iop32x 2.6.28-18.59 linux-image-2.6.28-18-ixp4xx 2.6.28-18.59 linux-image-2.6.28-18-lpia 2.6.28-18.59 linux-image-2.6.28-18-server 2.6.28-18.59 linux-image-2.6.28-18-versatile 2.6.28-18.59 linux-image-2.6.28-18-virtual 2.6.28-18.59
Ubuntu 9.10: kernel-image-2.6.31-108-imx51-di 2.6.31-108.21 linux-image-2.6.31-19-386 2.6.31-19.56 linux-image-2.6.31-19-generic 2.6.31-19.56 linux-image-2.6.31-19-generic-pae 2.6.31-19.56 linux-image-2.6.31-19-ia64 2.6.31-19.56 linux-image-2.6.31-19-lpia 2.6.31-19.56 linux-image-2.6.31-19-powerpc 2.6.31-19.56 linux-image-2.6.31-19-powerpc-smp 2.6.31-19.56 linux-image-2.6.31-19-powerpc64-smp 2.6.31-19.56 linux-image-2.6.31-19-server 2.6.31-19.56 linux-image-2.6.31-19-sparc64 2.6.31-19.56 linux-image-2.6.31-19-sparc64-smp 2.6.31-19.56 linux-image-2.6.31-19-virtual 2.6.31-19.56 linux-image-2.6.31-211-dove 2.6.31-211.22 linux-image-2.6.31-211-dove-z0 2.6.31-211.22 linux-image-2.6.31-304-ec2 2.6.31-304.10
After a standard system upgrade you need to reboot your computer to effect the necessary changes.
ATTENTION: Due to an unavoidable ABI change (except for Ubuntu 6.06) the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.
Details follow:
Amerigo Wang and Eric Sesterhenn discovered that the HFS and ext4 filesystems did not correctly check certain disk structures. (CVE-2009-4021)
It was discovered that KVM did not correctly decode certain guest instructions. A local attacker in a guest could exploit this to trigger high scheduling latency in the host, leading to a denial of service. (CVE-2009-4138)
Tavis Ormandy discovered that the kernel did not correctly handle O_ASYNC on locked files. (CVE-2009-4141)
Neil Horman and Eugene Teo discovered that the e1000 and e1000e network drivers did not correctly check the size of Ethernet frames. A local attacker could exploit this, leading to a loss of privacy. (CVE-2010-0003)
Olli Jarva and Tuomo Untinen discovered that IPv6 did not correctly handle jumbo frames. (CVE-2010-0291)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.diff.gz
Size/MD5: 2928444 765d0254f54d27d447de8f0b39548848
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.dsc
Size/MD5: 2921 682576890de917043eccf6fc9398aed2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-55.82_all.deb
Size/MD5: 5170062 ef1a9c95890c4ba600a3e5523d49bb59
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-55.82_all.deb
Size/MD5: 96386 b184441d2f44037554d037d217688393
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82_all.deb
Size/MD5: 44742098 b5215eb163e357a179dbf36169ae1fa2
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 22350 d8934981c2fdd09168a5e576cc1b809a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 44768 74be7582e8f82aeb48af59731ce128be
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 2312 d464c76f98a4142add7a69aca1305739
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 36294 a65060e99feff7e2ecef38be6d92fbc3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 102366 04d59c868ce03dc83b69116b022735b8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 38892 e80a653bb000e86f38da594d4bc1742d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 49160 a512718368004f81e83063ea8972c871
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 176612 81ab4c185b3af1dea1a082283c1ec9b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 36776 fcb0833daefa645545a2451824094b21
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 142346 3e6446140bfad0b19c512c69377d8026
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 51060 a11ceed7ccb1b96c2a8b2e7f840061b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 140710 e1789bb9d7cdd542a862e8ef209de802
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 287606 f3cc835959f215c209dc5a825596849c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 97828 05627ddbba40a6517ae7f8ca75f195c1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 1652102 c9eea2df3fdde2a5e7d2f4dff99e6772
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb
Size/MD5: 872314 6e8f80e117e13665c95fb75593853d49
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb
Size/MD5: 872448 1a70a906bccd7642241535f79feddb57
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb
Size/MD5: 874570 0da9cd27666b58b5328e18dbc01c9b2e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb
Size/MD5: 872194 375aad441654cdcd2338c5809e6319ad
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_amd64.deb
Size/MD5: 6926870 c5868857ae3e12da5ffd91ec60d75501
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb
Size/MD5: 20817720 06e066129d82d4fa8e41a2a058dcb9f0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb
Size/MD5: 20798158 1e5bf064dc2aab9880b30448d06eba9d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb
Size/MD5: 21635636 0bb9fd3f753b4dcedf70fa8f36c48467
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb
Size/MD5: 19905244 a04e5f6463fe334c28598cbf13506043
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 15630 8d1da510f959f7b9a2d0aa73ab80ae39
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 240360 20cd65fa275cfe8a83743ddb5a95f528
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 202666 71d8be83541874d6c675945838b9e223
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 1048610 9125e9e6c294bb450e37643b3ed7397e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 1543634 ff7af4dcfc269a529f0adef3823a7244
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 161692 5623fa9ad6b280d0a5271917e89ca8ab
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 9832 bd5218587371f5b309ef2d1f77f98420
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 80870 20f034d6199d2902130f8bba12f48afe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 49294 e4a805200acaaea274e67995602294e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 35158 0869bee234a54b1afe362123606efe66
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 70890 74ad81f0209c505c41d61c143b90f879
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 6218 ab28cdccb61315cac14d9046821e264d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 9060 6b179cd944eb7f83f03147e09025e6be
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 57924 5465064d051dec863ad3f4f1a91553f6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 123380 18eabdae11c2d77a1694f0cd467107a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 101078 efbe32714c0fed5aec8a70095af299df
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 79272 2fbe8585b11e0fa73fad8e94298082bf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 1595398 3e11b94ed4701d1d84b6aeb303782d97
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 72352 e413c3057779de1b3c8f0c4d8d7fb577
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 12648 41487d8dc828d7f94a5c8ed495f06a99
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 33806 ebf707126fa6326899d648786afa8779
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 138512 ff1e0d4f0e9c5efc7bbae4d92194da5d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 38938 75eb074224a6373013e621cdd5931a51
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb
Size/MD5: 278876 1586e5c6fc3fedf7f63f19c35a4fd9e8
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 18976 940a7c03cfe47e9d0543f49849c8765f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 43482 466c625f614e3624fa548bc5f96efa74
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 105216 d45ce18fb4d9c2cf5da6d14ae69a86c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 2284 de2293fa5c6e5493307a1913b606ad20
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 34572 4e302b4f7144fd504b2475a4103a3bf5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 97044 eeafb6c943244dd33659e7e7db9a9f76
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 37128 d4d67e516f236bf54a00697b71a3219b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 44122 1657e3520cbd2fbc832cf91bd6366a38
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 167738 7431ddaa7c8f0c9b6e583129cdc839f7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 33954 8251d509fb9bacd314f62cc90bda5b96
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 137972 9b8295fffc47ab4cf16ec34f7ef8b7aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 46892 c12096744faa1ca0735b62ea045b0c65
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 133162 5805bb2e2bfab6158d8d217b08079cc2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 273806 be7956f256f494fe4f40e7e7129bdcd7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 102330 d6a81f9c342c0ebe2010b66d4a7c59ae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 1597678 ab989d0c749b837c67a2a839f139fbb2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-386_2.6.15-55.82_i386.deb
Size/MD5: 863294 c444f51c8b2752c6a7bb7e6890917ae2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-686_2.6.15-55.82_i386.deb
Size/MD5: 862506 1508b314277964abb0d05e8a274d2a26
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-k7_2.6.15-55.82_i386.deb
Size/MD5: 863628 69ee54c68825997e29779c3a2ab66625
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb
Size/MD5: 866414 fa045eb17626dde56b96d70431e9515b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server_2.6.15-55.82_i386.deb
Size/MD5: 865826 30916e33e56490d9a2acf31c03690e64
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_i386.deb
Size/MD5: 6918500 a2bb7aa892eb2d21ea3d04f519b72482
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-386_2.6.15-55.82_i386.deb
Size/MD5: 21724666 e1390cea2d5e21dee938aaf3f88786f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-686_2.6.15-55.82_i386.deb
Size/MD5: 22516786 35a5512e74cf490346c35fd56f695fca
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-k7_2.6.15-55.82_i386.deb
Size/MD5: 22265258 07155a925272e66ace552f82d16b1b79
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb
Size/MD5: 23626692 d229112410ce8c9c9947f2f7cd32c883
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server_2.6.15-55.82_i386.deb
Size/MD5: 23179552 9b108d16a1fc1716b78c4417150e311e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 15512 4a2a37534dc2bc6b0ce12df135d07105
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 238510 544c418a7426a5248e33ff549c6f4035
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 197134 9ec57cc477f5bc4e0dba11002d3988e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 1048370 cd87ff58b5cbea9c04eac21cf1b0784c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 1741406 0b97758852f283e148ec2ce290e678ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 160884 ce6d2a16b8a3af5706b694fe6f8ac4f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 9162 d5f4619ccc32c2ed8296823cd3c19e3e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 76468 9f0911cef3a4b7afb14f1bd537ad337e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 53554 afc415fd0a28c363579986fc48464671
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 33048 c710f55e8853bec0935df3338f2370c2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 85618 b6ed96be15afaf31e6670a78ff1f4733
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 6024 b0a622b932e40a7011d5e9ec9bd21eb3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 8762 6234ceb3aa1422433ee60ad4305c03e7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 53636 e1a35b8801fb949295040028cd2cba5e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 130970 25d88aae6168f72c58ca17584b3f83e0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 98468 ddb974591a687460f50c26a2e2682593
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 77212 a9ec9f2fe551ec07e56200b26f1de4f8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 1768830 477e2985e9f1fd2d4f333d651ce07e2f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 69612 2547b29a65a8391d3a085bbf2ce476aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 11764 88566d97534c428d1ef6b01b5adde2ab
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 36102 10638cf7adf98d9afcc1e1475dbaf05c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 132672 fa6f13f8c0c0d017f50dc160bf2961fc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 38578 32976528861368cdb936d5db4fc0c2b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb
Size/MD5: 299158 458051a07217501718f6e2a742bec0a3
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 23726 0fbb9855c5833cb24187a701c10cdfbe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 26006 87108baca7e8450f580be0f6c77d95de
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 49328 c6fe9fa1f1e132f4906b21e555bfb079
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 51536 d2c7a02ac033097208c359312e95d246
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2308 5b98b064d0e5c18d8c32caa86b2e43e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2482 3c964c577c93d80cee55d06e78003951
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 40306 ad5c5c36d7dc08add999f8cf47d53b72
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 43848 0cfb559dfe56e4a50c99537f98392827
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 112606 9994a8d2bb1c9a45cf43416faca7f9fe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 120734 092bb2c1dfcece144429a277f96b56e9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 40906 84f84dc75718a347eb6623204cab6209
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 45996 69f5b1a8a9e82414d868ae459109f32c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 29024 1a12ad8c384bd5195208ce7eb478c011
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 29892 4a807f384985ae3376d509474716f13a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 211398 2e302e02bf08226ad9bf45c3a04840b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 225174 0c4edfa7ccdb502d5aefc7b02a2e81e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 45054 a2373aac90339698b2cba11e43978565
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 40220 06b0e3234fd6b0125df72fc04c4d0562
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1934 0887612df6acbc867949c33251427c00
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2198 d38a4ec22579275ff2f48805be734356
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 80760 0a71c80867de5b11bd73c9c6d2751448
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 86134 0531dff0f43a6073ae4e71e93e1d77ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 111580 ab42bedd2a1e1687015d5b6b4b327484
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 125734 3c526ccc2348c1f6dd65829c96fb1381
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 53412 13f7a9a412c8c38c4a22a0f4db2a2bd9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 58486 0a62b4bc8aa5f594de9efc6b9f1dec6a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 147964 9751a30ed03bc5bde2b48be1e5dce6e3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 161908 70564b18529d383509cb4c1d4898425a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 318412 7944aa213ac28d37d390b48b3d5a9a8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 288032 2b93681e1b268517863ee4bf27ba0899
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 115862 3cd4a494b7d9652bd77eb9dda6d2eeb9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 116548 a40033c7a63dda0aa5911caf2dd7f49a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1925072 2c1fefed78a6ebc795887a2f27c9db4e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2449126 39606af1d24872f0ff053ef5ddf790bd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb
Size/MD5: 872990 d1ced46d4302cb78b2d47c5ea678d6bc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb
Size/MD5: 872596 8602056ab95806f02667587737cb3b59
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb
Size/MD5: 865624 336f5e63d1fc8a9f55e7e36f4177f54a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_powerpc.deb
Size/MD5: 6947694 9ab99966a30e44788549998ae0e26798
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb
Size/MD5: 22783922 2c7ace12a48de978cea2e7e939c3c900
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb
Size/MD5: 23693062 18b76996711d54f91edd68a52b45d666
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb
Size/MD5: 22365356 f8a73866c9b4334ace774f26ddaa0e38
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 17782 6a4cc5fc57579f3f602f582acb1231fb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 17386 1abc2376b554610aec23e87f60998358
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 261350 a2a6eff082f29827c9505b45dee47f7d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 282620 93ef7729a3cc9f4639e9d34c8782d8c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 227808 73c5142c206284bb244b59586a93d8b6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 248952 d0c1d09bb0b125ae113a70baa7a06cc0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1048470 66d28a86b670f1166faeb1c25a1547ad
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1048600 178ea75b2bd02ef3b01c4cf940b6a713
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1738490 8fdc1918d06d76e358e7645e24d763b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1878020 0b6e4cc3971bb034e26a3aee110cbc58
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 250814 c48a5e0837fa30e3b1480c113c02d963
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 233524 676bf7f8905001fea721689f23ae5f6e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 13054 73a21ffbe4470fe4108886ee20990c35
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 13528 1105da0ce6deb9d13a19e8b6398827db
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 84794 ccbc384bd76aacf39ac078437d709d51
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 52204 acd012d94fac6fd62028de4920ff5a67
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 73922 a2d1c6a539934c1a852cf0b2c56ada43
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 85854 59c8914383ae0624690950d8f844c101
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 6624 b926e6807098f087b5eab77015ef1aee
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 7058 43cb29678a86a4ace2a784ef2c2e8843
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 60378 183583ac6a0ab738109499861a861ca2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 70420 da9263ada0b850362f022c36b6769f22
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 128550 5eaff599374f099cbb06bb709f1ce68c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 157944 8ef2e5efb4749e8e1725c58a185871bd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 108166 1a09b1fb98eb414ba847dc8634a28a62
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 126130 e2ae3a3d5d06c8e6a5394c2262381438
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 87294 610a552fd6a9c960f64c8ed4a74c5b39
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 93362 a7434712a48c99eba3cfd1dcdf4db489
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 2014708 a089ebb3c11c6fd25f65c069adc4f1cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 1988690 049558cbf765292686c49fc8e180ca0f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 104130 cfa3ef8f4085a002160c319cdc9899ed
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 115790 ac0661102201e3f682eda1052d987671
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 12738 f683a291e68f38a5c2785aed5452f77c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 14444 24e22f4de6be23c1fe122e8c3dbdfdc0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 39950 b8aa9421b4aaf324bc7349b026e3c30e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 41540 c174de599d57427fbbe0544bdea28cf0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 149344 f742184c85574c83ec84aa70cb9cdfea
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 168082 6f375034031b861fe42ba973c9390ded
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 42310 e24ddfc7d97416cdca5325a9ce197781
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 44918 de0152b64cf3da754a73ba952625e15b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 320326 87594e9f43ab0dff57a8ae731be77dfa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb
Size/MD5: 324872 a53f9d6f2e8118894b3c5ee8a98b7441
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 50476 aea13d5d96a87d5b3a0cb897605f8226
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 2358 b0af3cd8de1581e95acdba1dd91796e9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 40380 c083f0781fb33b64329d10c233affde2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 110556 cea10ae3446945f5dcc6b94a8050b4ad
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 41214 b0728ed58d1e1a5bcc4309849d773e91
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 104224 54844dc4f0225e051453b6a01934edb3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 7438 7cfdeca11c465cea2c2e8d768b39969e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 149304 958f0b630326763cddddce5503f3319d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 1712530 f967805acb454413bbcc2f377f5b3e36
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb
Size/MD5: 773010 979da22c264d122841ea140319b365ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb
Size/MD5: 772604 3106b0711e0e311f93d92624247f1eea
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_sparc.deb
Size/MD5: 6964184 fb615cef69d2a79b16cfda4b67bf4e50
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb
Size/MD5: 15017856 479231852577fdd0e402556287a02059
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb
Size/MD5: 14831912 1bd18f6f1ccc6b70379e267a0173b9bb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 7436 87e52fb1ba93a9e9763a0f3984bc15a5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 248758 bc3db8ee9c85b0aaf1ec03290ae41cf3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 212566 70a9e482f9be5074d90bbd4ae5cf1246
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 1048480 c535170499441feef6ef8b3062de2d30
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 1482394 247faeb24ed7d02526dc54dfb194dec4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 10118 28a82b2b4d4934c028952b17676d515a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 40178 d44c9cb160749b87062ff38c0fc11340
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 9370 c7d50aabcba6ff111825da92f10dd219
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 61398 df892cd2f9e118248246eb7d3c273df4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 163276 481deef18ee50e039791747737619c3e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 64096 9ebc582fc849cdcf71ee887937313a22
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 1235396 479e0c0baad9c8cf96fe44603c2fb9b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 59308 83efde441d0de3f09bb163e53016a300
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 37430 3646c295a3bbadafbe6df1fb22d8391e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb
Size/MD5: 280132 311d2d465db827f3e3f2e95bc265ddb6
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.diff.gz
Size/MD5: 4747158 57102623f2993049cb4d309f75748b5f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.dsc
Size/MD5: 2689 3d66528dd1a11628dd0e2ec5fadfa2b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz
Size/MD5: 59085601 e4aad2f8c445505cbbfa92864f5941ab
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-27.65_all.deb
Size/MD5: 4930936 41797a4c4537dc9e4abb06f5b811a6f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27_2.6.24-27.65_all.deb
Size/MD5: 8146690 ea0f32ddeaa300bc68f90838a6466257
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-27.65_all.deb
Size/MD5: 99216 bec450b038c03760a6f369323af1a0d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-27.65_all.deb
Size/MD5: 46970850 cadaea7041848682d5e46a181aa43fb4
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 28614 de37ceb847d7f811723dee03e7fc9ab9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 224184 6b392a2ef779b2048c78f46c1e833e2f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 52646 2c736bab70f1efeade320f9062b74729
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 40644 a6209cbd666c38e1c4bc75115fda79f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 48646 6affd584126a9ecd4d3560dfa69a201f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 86332 097b613836ca5101cd37cabfe7299adc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 36316 f3915273cbd0e4a218a543ac525d7674
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 648728 9021fcdfc468efb5a2994dab918aad7a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 209928 967a98f6cfa9c56dcecbe0872e98b617
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 39194 5ad172f156b5e2ba43fee3a69a09fb49
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 67996 9ca474a40f4225116d7d9befcde4dbb5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 145458 3e087634d61556643c32e342214a0642
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 287262 202933f0bb0a3d09ae278a991139eaf1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 2130554 f0a40b4f0002803063b074d4b2b22775
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_amd64.deb
Size/MD5: 673974 3ee01bd889b29b761f96eab35f839815
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_amd64.deb
Size/MD5: 1252948 e0734c904a26acf9daadc8dc13a5331c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_amd64.deb
Size/MD5: 1274832 4784ef460e510677dd0c62ba0e5d75a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_amd64.deb
Size/MD5: 674092 b2b2090661ff113ec00e1b08627238c3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_amd64.deb
Size/MD5: 1084370 ef5cd734b586855f7b94d5b93bb51c42
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_amd64.deb
Size/MD5: 17809172 46d4f01f3cb62fc8c006c25d291bdbde
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_amd64.deb
Size/MD5: 17781410 589743282c76d9ae95751cefae7dcd1f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_amd64.deb
Size/MD5: 21055946 71c5ed78b283260aa76abe43a5199869
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_amd64.deb
Size/MD5: 21440010 76e220b0a64e1b1fb76a54aaa5cde808
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_amd64.deb
Size/MD5: 707586 4d51f71c8ac5227c9f02fbc0c6552453
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 263678 73ef23d338fe298802ae13ea52af05a1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 176420 0709db4bda579f5146063e7bedeef8cf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 254102 7b20912de5e61b0206319019c4800ef1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 1641364 98d7399720bae5a9d3e1637cc6f13ce9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 143718 419053c97211aea3dd9b2aa0833bc6bc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 164466 16e2d4ad08a10d9e9d2b33dbee4c08ba
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 115858 74f2c34acf328f485356f38e86eb6aa2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 35056 5307b10f96b76f43c0bf983007f36021
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 64412 7cf4750ba6f0dd63678eae705da55fbf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 69706 dedcbc58256ac2a43ed625eb7cae6e81
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 21598 6d6c27b8756a70466451449e096bd149
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 8622 4414757aa7034cafa1e98d8bacf080f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 57232 8690d6c34e1ec87d85b2c20cb280acb9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 103044 73c875b66060da7f1d39f2a5f8eecf36
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 1212518 6e237c8e863f3cea5cc702afbd925b77
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 45500 1883d8bdf4ed7b2aebc1a407502bd556
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 12780 fa12802bfa4f6847c5409d4882e9aa9a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 498032 d5e81ea5e16357ae1be8c0ac77685256
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb
Size/MD5: 75048 24c6c2fa1972611542270d68ccae59a6
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_amd64.deb
Size/MD5: 19256730 d7f5e8ae9464748ac2a6dbc46ed9f1c1
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_amd64.deb
Size/MD5: 17909990 e4e3916570b7b5f06645d2623111b0ef
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_amd64.deb
Size/MD5: 18911564 fd71e9397f8919af683848aa456c885f
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 23690 ceb5d148f00965516252470b41d00b56
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 26794 50bb7020338de7d00265de0765578291
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 218818 a3b52dd67e9817d4e60d8b048f542717
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 220482 60bf430685f9b39568dbb078edf6041c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 51932 f708bc6cc86f313031745601d3d31aa9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 52068 bd20c8c1eb151b2b8d989d5081f8386b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 38326 aeea101daeed1f87bb30f67c4011d737
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 39080 b8fc6fd4c6fa20a8cf2a92e150a1b969
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 45990 9c06ca831da0f4183ef6e15af4e9b3cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 46170 8d8cb61faaaf267e135ecd2844afd195
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 83246 6941b39723fc655f7dcf2846e5c8a47e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 83662 d3f22aca87d23a99c75b3e6464eb22fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 32396 402518c87d72b3dfc41656de51ebaa64
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 32672 7135f346092b651dafed111b91aee44d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 637694 e32a7d7a367597e18b305f6d97b93630
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 655982 7e8f7f69c261eaa0ce58ddb865205698
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 209878 1ca7ab42cb7cd39e37e711fabaae8b99
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 213640 bfc69b0b0b29485a95605fe7e091dd5c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 46544 90ef4a74882d5770a3f7d888ba288b35
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 47602 e55422dc48484675642c96bdbc673595
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 62270 cc798227f68e2c8c1d8a54b03bf0058a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 63626 a2d3587a68e63d2cf90e1cd3790d1079
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 130538 c07adcef7438ef51821f9a8b750f7973
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 137028 068fdde4394c7850abba6ea81e69c801
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 279080 76c07612b0081c38122b1929c7f19f34
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 277690 c635d04d78592fe9792024e84682ccc7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 2012458 d372c1d872861cd7c84ea9d06c4e8162
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 2089276 69416120cd161789b598b2b93034db07
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-386_2.6.24-27.65_i386.deb
Size/MD5: 655314 4adb56a8d5211bba1acc02d76e9fb65d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_i386.deb
Size/MD5: 658154 7d6f7bccbf83f9a32664588ab5faaabe
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_i386.deb
Size/MD5: 1242098 c22eebab07e9ce3d85526ce2945da263
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_i386.deb
Size/MD5: 1262772 85fe04ee16e27b961017cf148c4f1d21
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_i386.deb
Size/MD5: 659870 a3ebd23356d57307d124b62faf3fc2a2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-virtual_2.6.24-27.65_i386.deb
Size/MD5: 561726 410d756762ce992d36864ce38efc2e1d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_i386.deb
Size/MD5: 1059932 350947cab60fcafb13483ab14ca0ff95
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-386_2.6.24-27.65_i386.deb
Size/MD5: 18380540 1da620cffb3b62617fc8213134b951e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_i386.deb
Size/MD5: 18401264 dd7b7991e7f843ebcae7bc5c8700636d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_i386.deb
Size/MD5: 18513796 c8b5dac38c445a72681bd5dd1c9a1f98
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-virtual_2.6.24-27.65_i386.deb
Size/MD5: 8730742 fc3305910b00833b509a4e34199e4a67
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-386_2.6.24-27.65_i386.deb
Size/MD5: 25540786 ce01c05207f08195efd8b88b83a93549
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_i386.deb
Size/MD5: 26356028 ed8deb0b2243fd649476c43d245a9690
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_i386.deb
Size/MD5: 27372622 d07e093dc192ad5a49be8c45b5c85dd4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-virtual_2.6.24-27.65_i386.deb
Size/MD5: 24872642 c28ebc89c9a427352186dea53d81ffe8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_i386.deb
Size/MD5: 707576 d26794effd4e857da1db4d28e9407611
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 258852 b86f8c37480cbd19131432c908013dd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 264136 631fc78981097e46ee5643ec3cfc5616
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 163268 1c98e7380c4f80c461a6181344914fea
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 163034 9cc84b270528d0fef36320974b415392
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 236710 755a3caeceece8650e46706804c6e072
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 244984 cc330be20f314b308aa0fbcf95c0370c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 1810274 169e24dc79c5fbde1ca1a2a5520286d7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 1827436 cf166d9cdca76a06fd78b1a0669ed67b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 150836 169c287e6bc754d02924a719d34aad29
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 143018 ee925199234ec977618a5c3c3b03954f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 156072 9ff98bc4b62d033785de95858201c353
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 157158 75cdc15de6d5bdc90e05789eb00fe29d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 107222 37ce3c67bd74d5040aa4d22223cbb486
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 108526 7e50df25fcc29d44c2cfdc3e5c046a66
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 32958 b1b4b1a1b95db3b09923a39eb42c28e4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 33388 860c1b56a45914246929757c815f5ec4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 60694 99aca1f49a5cd919f85ef1600ca757ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 61158 bbe05be947e606b614108423a7ca0b83
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 82652 8ffbf8ae116bd81b7632e2e3a58e0a76
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 82954 1532b447c1a1cc43d1cbf46b1e14020f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 48562 d2569ab07923f67de18ed6c63940351c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 48452 dcf73534ccf880da82f6ec8bdad54db7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 8192 2c3bac93f50147f7f67fffdcbb601b66
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 8444 375a2103e5890c501433ae5b3d912fbb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 51104 8d242482ce8adca7ec8f5d0a40c04c20
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 52950 8449d644f2a2455da01bf48922757fd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 92156 232f32e69ea0f4daf4a17ad68542e45f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 92446 6525df043e2a865a6eb646f015140e31
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 1443710 2746c7d1f27f2638dd6f141c5d7e68ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 1427036 d049929f20e6cbec8c7338977af873a7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 43240 53538a90e2ae8dae72a91a8aa79ecb90
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 42806 3b1d48b0e38b9acebe7581278a8e0408
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 11402 83264faacaa7ff9c249144d8dd0061b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 12016 7e17c39f818116eae09203af5f5dd870
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 470484 bede1d05dc08ab51105feaff29b39093
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 472422 d08cc1bf2e88df1908f35afc77fd696a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb
Size/MD5: 70518 751bdd069d86773b5a3cfc67a09b46a4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb
Size/MD5: 71382 3aa45fd7cdb245416c60a2210066a353
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_i386.deb
Size/MD5: 20248150 fad37a976e62eb5c73f906fd44070b5a
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_i386.deb
Size/MD5: 18543176 2f3a767f3505c51ebac878d921d3f3d8
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_i386.deb
Size/MD5: 18782962 8a5a3287d174aa7fd1cceb71be94f347
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpia_2.6.24-27.65_lpia.deb
Size/MD5: 639434 d3cfd21a90ea311f0b1efa2ac28dfac0
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb
Size/MD5: 705462 81a381fb023a0e0074d8cfaa7fca88b8
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_lpia.deb
Size/MD5: 707532 c6bf8f82d8bbc4e2320343f58629a562
http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpia_2.6.24-27.65_lpia.deb
Size/MD5: 14516344 29b153dcb44d72c1e5862191cb266c6b
http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb
Size/MD5: 19816106 947ff90add29d1fc18a69145f39341d1
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 334046 06512921aae848be603af54dc56f72e6
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 318530 4e8164b49e3ad90d33c9275bd1c7b45d
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 62718 e53308b729496be4a0e343535769c74e
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 73002 10bf1560cb8abc507ea079f6a495f91b
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 41442 a9d6733876fcf91a271eb189eaffcb37
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 47826 1d54194b81d12ac7b00b910f625f7a59
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 89506 1d66e8fc56eb6437f783cb677e6c7061
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 105746 034c14e0418581e1b8b56913246e96de
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 44824 5430e2953cc84d26fd0c8e8c4e323a92
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 40932 93dc2a167cf8ab1d80426dd296997295
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 704830 ef370acc49192e464ef553984e361d88
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 770960 ac691fac4ab28cb6d9627fa6b7a5b773
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 243328 b280fefee27294e988529239616e68fe
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 246310 c1d7e140ca2ba026b6a168c6c9748476
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 69160 665a09e07612701e5c6bc7efee856e5c
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 132586 f0e732beade4d5154e887aaa1b1f3625
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 70252 d8f056e2c9d8aabe9acacfbe4e6c9de0
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 77462 d69a84be1856d83b83faf1fa820803f6
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 146272 11a1d0911e3fda9667661975972e08b2
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 165002 c4276844b0ea79946508c0cd3a816541
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 387992 53b23049b6f79a9609349927adec3443
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 350468 694a94354856e10bcc935e2a7ba38a51
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 2431460 3a8171d7d1e7e6b37573c6679812d2ae
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 3473330 1037b52b34e3b26b05f68bfafb48850a
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb
Size/MD5: 652854 26483fb509f744914f646c49eb7b4d6c
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb
Size/MD5: 657530 98dd4c49966d886237bed19fddb84057
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb
Size/MD5: 652742 c9f225771751b175bc9a3d1ccb9b2b91
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb
Size/MD5: 20175388 98b77e06737b717f07a9f436bf292879
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb
Size/MD5: 21378902 be6b07df3db6828d5d795954b3ad3c49
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb
Size/MD5: 19948474 1a42e203300936a0a6bbd91270ac925d
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_powerpc.deb
Size/MD5: 697738 b5f3e2a2bf27249b08f44ca708c75305
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 266748 d71a805e23acc800f21449d312975e04
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 307732 90c6243c8802cdc121bdf92145f7dc17
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 192250 b114447f81aee3dfc51a3c40f2015d66
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 201688 94056840984e621b385099d261ce2420
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 272012 b6790aca1401ed43b8c04befaef9af51
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 306006 50b970f3b69d4eda6d3e59353c9db152
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 1807766 ec7ddb35df35bb103f7fa00168c827cd
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 2119612 ee4db3863509964860b0a24a9a6d5951
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 235186 b6a1a89f7279818e17cac5d5b3a8b86e
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 225404 baf5ea09bdbab57626dee3afb306a39b
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 170438 b6bae0ce9350745a5c5ba8d969ae34ef
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 199752 9d4225f0960410c78279f61aa02471da
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 117942 e88c2b968d47d71ef068dcb5abd4d9fd
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 139272 5f4576b20a9dc27976d521d0942ad0c9
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 45372 918120c1bd011bbbb8b95529c0978f09
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 46836 10f5de3e02406e28d373098a6613860b
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 51132 610f6b349ffcb68ca7f58dc7928a7558
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 60292 9b17fdf2d2aa9cbcfd3dbfb1bfc3af41
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 74186 053cc99e1839e95e6e48198a187c3e48
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 87220 b730de88a2ee8d0b1503d2ee30f13e69
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 76092 0a6aab3a33606ec7e97d474de29a47db
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 30230 76c4d08ce66715d75db459c89405a0fb
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 8486 80580934d5e5f6909c396732bedf2055
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 10030 4e52e0e6b321b919404ffa406ccc2da1
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 57438 24e1b5d61bcbe2b2faf9f31d9b6f7d3b
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 68746 1b541e58e95b8022b84e7d050db97ecc
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 101184 97ff0fdbf93ef2526b1a97b962592e37
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 147834 eb62d695f6da016ae938924414bd15ed
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 1565722 3bf6b2bd7ef98c403f8cedf220978814
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 1514590 307c47dc707e3c96384e6ce043c745be
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 76672 863a1d5aaef2e7d8f5ec43318a2b3f7a
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 85976 b6bedff825f704ceb1269488d698bfbf
http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 12702 cc2c9e83433b8f4092748b933292a46b
http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 14560 60c8e6f2c5425b8bfea2cbee00dd50c2
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 449632 ff75fd65c13af279e6652e0d09505887
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 504134 364077fbb2c074eb8852249a757b89ae
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 83682 bcafd92384fdae95293c310f83443303
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb
Size/MD5: 108840 2254f5416b8a0cd8d1cd52a57d7a064a
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 59570 0a8a1c6f109f6620c74d81880a6836ef
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 71732 e29b3839ae80a5cc8b8ca1756569e0bb
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 42454 35c72663f93201098e40f0fc36232ccc
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 91776 d7f14f387c9d325ba87761a2da581b5c
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 587190 a4606a71370a3dec9dc6a3aba35ec115
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 171076 2f15afec1e2aa78035659ac46b010cb3
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 22356 aa2c6396604a45f318881df2e562f625
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 46058 5633652b0f71f9e2098ce2798e29269f
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 152976 d7cbf92b5ae85f379d0335c693ccc256
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 2135270 f05d76791e5538fa887f7731d170dc58
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb
Size/MD5: 565588 5d632e2a56604e4feff30e310f17f024
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb
Size/MD5: 563928 4b591c5db77c0f5bc41ffff32a14ee31
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb
Size/MD5: 14098262 0170c4f2c460270add65ba17eb7acfd0
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb
Size/MD5: 13830862 e4b6c695ad5b3e4ad0b428947b4fd388
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_sparc.deb
Size/MD5: 752654 6e9b50c2f72a60edf4df6e51d5448cc7
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 270064 879ee6667df636551d565e10ae5162fd
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 190360 388a92b9849a34e99f6a3d2817ca9b05
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 263030 82e8bd5f9f922af935f6f787942f4b2f
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 1386520 98436d21f7255a6c923b50900bd2de4d
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 175444 37239b1899dd449d5b4985163c46d678
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 122106 1b86f75278b7fab22bbffd2c0010eef5
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 40398 81325db98acd64573c100455f0cb5289
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 48060 dd1b8744fcecf5959d2dac4a23b8cd34
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 8698 a2a5a2941546e0137d8c57a38ba9ab2f
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 60516 08d388a60ac9be5c7d80d479f94fd4aa
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 106838 b350cddddb73537859dce8203c49ac1d
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 1002034 0756e59f467bdefbc26dcb06a6201457
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 9518 7bf2df83ac5364fef90bf13ea616e7e3
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 391514 9e98f9f4757387d261d6c7a1e8c7d61d
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb
Size/MD5: 75924 b375f2838ce3f024a9f2b58d02f9d98e
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.diff.gz
Size/MD5: 3279295 99a1653c9f3eb96475ee9776faff3701
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.dsc
Size/MD5: 2761 3b7c2f9d1b970a69db9a1c2c2bd5d95c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz
Size/MD5: 63721466 482b04f680ce6676114ccfaaf8f66a55
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-17.45_all.deb
Size/MD5: 3492310 1dbaf1873425d41dfce3b359fc95728e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17_2.6.27-17.45_all.deb
Size/MD5: 5906568 e4cb3deaf39ad7c3917d33f0f1082a40
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-17.45_all.deb
Size/MD5: 52050112 2852d57c251b525e97d6ba66a94f1be5
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 36530 ae958becd299698d5f30f722eb07cde7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 265218 1de0174009daaf9e0d3fb8f8e737fa40
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 53438 46087922e5b4128b6a5f52dcacfbf840
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 43030 e25c2b8fbd4f46654a1ebc6089ef31bc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 52344 4c16a22c0fe8f2a967f1503953ed5f8c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 89844 4cc23c275cc1fd6621ac977881b91345
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 38180 24f5566a9c89334d394fb48d7c3d4949
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 677070 84220f4d0562b59edd2f0865120d4494
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 158618 edbaf560c5847b8f520ad94cd3f8d2d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 46346 90f299bb91f23a67e0811ae8e0472e70
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 154240 3ccfee605d2ef5a5e87aeb71320b337b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 313106 896f96e4eb01ff9381aaa78b6e1dc72d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 2604320 b50756ed8aeeee4a72873b8c60df10b6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_amd64.deb
Size/MD5: 663304 ef966b97630e8096fcf279d6c43b3960
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_amd64.deb
Size/MD5: 662184 599a4bf3bad78733d35ad1b4a5601a25
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_amd64.deb
Size/MD5: 23073032 96da11b5c1a75a1694b4047c1a71b091
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_amd64.deb
Size/MD5: 23071096 162a682066d9c7d90df92c975698b2cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_amd64.deb
Size/MD5: 10479836 39042ef6e7f9049837b4d137450dc41a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_amd64.deb
Size/MD5: 675844 3d711e518906ef37120bccabeaa1da2d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 434926 cc27207ed63847b17eab47e1978c98fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 186500 940e6b351f4975369720543184596a04
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 275594 b525586af57630fd8b4e098cef404ad9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 1810688 13f3abe5b38ff8a704c985dc8f3275b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 151324 d883249df4fb86d6d9d1146db5fa1020
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 194282 ee6a6162a8b0615e73a89978fcb9d172
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 168150 696ed64f02936c7200cc9a468302de40
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 36428 ff94b9ab68b2108fd9d1d2475c211725
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 83436 3dceac801e8b0405790e1a28c960183f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 71992 2b936af85a4eceb6312ad7ef93a18c88
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 23240 1d34a195f16d39f7895a2bf36281a6c8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 9012 454b1c03d70fbf4a917ff2431b6b4f2b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 68544 cd2e39978716c3448e54d6862877957c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 110302 ecb1005946c139f2340aaee3e80cd152
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 1276186 d93285c15892be57cfb76798c746f88d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 47602 d2039335dc8bb4104fbb473b5ada0d96
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 13480 5299f432e2db456a3e0743fd786c18f1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 393936 83cfaf207498b9a60d4e97cd21309095
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 200806 5dfbdf4ce61cbe469582c94509160a42
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb
Size/MD5: 13614 c860448fa643364e8776a4947cff9714
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 33948 74da15b4b68dc6a03f2da65175b021bd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 244732 aee21df42a017731c52c53100cbf2f20
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 55398 f4d1c18a70aec1e3e39572c36318115c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 41206 42a8188a1ad868fa58aa779b31908d65
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 48698 7e06c0fbdb39f426e1259d35e8f1505e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 86942 49099dad48131ce191b10c154f096d6a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 34064 c8cf2cb88451687abb047df2faae44f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 675492 3e953f324652ef7a01f93aeaa2dc5e55
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 158402 aa593e2736e7b717ea8c561b1e11c27b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 43624 b2ca8774a7cf447123ea811781e80dbf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 145226 0fbb95dc0bc59baf91447250f19e7d45
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 302390 991c8e4ef2dda71d6deda5599129a768
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 2436572 4b845d0a28c2b48ad0c29521bae3a0b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_i386.deb
Size/MD5: 645046 28f8ea5f653057c350d40feb64d68f2d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_i386.deb
Size/MD5: 645340 a4d347f729beffbf9ff1701d21a5f9b2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_i386.deb
Size/MD5: 23499764 59f3275c547e9f13f97eba55955725f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_i386.deb
Size/MD5: 23635906 c096ba5db0db8b87f67309a9e9c6ff5f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_i386.deb
Size/MD5: 10117090 7e1648c7b3a3ab2606263ecb20683ba1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_i386.deb
Size/MD5: 675850 3e91710602fec2d4aebafe62a6cdfe80
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 433078 d1439530f50069f41b4c30b010871b4f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 171298 68b786d8853574467c792efe3fa62ca5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 264104 3a49c641e4a146fdb634b298c51ca6e9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 1994518 105c6b0fb8b650949da502f3fee2018d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 150964 dc4178cced6d9c1823d24b2204c15ae9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 184058 a25940b16b7022a52f7b8c78e164a908
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 157856 c628cef1c909819dab1fe2d812dffeba
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 34500 2ea55d8e77aa3065af30ff4d440c059d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 78286 6d0f7704cdff848dbbfbd5fe60cf0ca7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 86190 c7d8ec25c3d35ea8455e9cf7c1b4ec64
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 51332 79b56b5e7f79a17d45fb7c55f64954b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 8796 e571105caa3bed5fc3576928b03eff31
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 64316 bcb0f12340567e9db7a5dcc3549dcf0e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 102092 a2556a5171c52abe48ba423b008c6f13
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 1450234 339572f5e579468fc438b1dd2cc2dcd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 44520 68267a8c684d01c673d4b41bf5d4af69
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 12642 80e228567fcb814cd67e54aec6abdb41
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 373158 483599df2e1b6c82a688b413b74e5b91
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 189720 156d822da222b7fc8b887a4d1b3b7c31
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb
Size/MD5: 12992 7232aad22eb02ec694fa0d41d367a69c
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.diff.gz
Size/MD5: 7350773 c09bf21927b9609694b39cdd55af21cf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.dsc
Size/MD5: 3198 5ba9f01bd70b951901d1d1667b964b54
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz
Size/MD5: 66766084 062c29b626a55f09a65532538a6184d4
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-18.59_all.deb
Size/MD5: 3636694 05fda32db7067b32c0fe593e1acf0533
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18_2.6.28-18.59_all.deb
Size/MD5: 8701396 65f8df38ba832ad50c6486d22420efca
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-18.59_all.deb
Size/MD5: 56998214 3d33148ef29824c1060e1f66b470c6c4
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 234600 929bceffa24f85104c08edf073ac1f0e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 44110 6d94c9d8ecfe3b4673d25cce1db2b95b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 43316 d895b0ad91a70c9381fd7e17650fab75
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 51116 da4c61dc01f5b5e8fb61cdf14bbbb40a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 90082 dad217572b5b07064b9e12b0062d16b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 38016 5e886058b306b4937f5a4ebe22451db6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 521628 d9f3ffe45b307847935002619ac31ea0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 125818 6fbc3c76a739b91e01da41bd535f3791
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 58060 cc30f23edae38f46b0d56f621969fd62
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 312502 9a11c9f0f37fee6a92c59de9df5fca11
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 3872142 cdc4640244b192a5970dfc3d3efe4d7e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_amd64.deb
Size/MD5: 689228 bf7aedb2bbb365a73ed77a8976a2701e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_amd64.deb
Size/MD5: 689122 80cfc63043a2d7231f86ef3e68f0a131
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_amd64.deb
Size/MD5: 24344078 dca923a8044df0ba9c642d5f2b317867
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_amd64.deb
Size/MD5: 24335914 ad5a4fe70b4555e9399f9a45b58459f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_amd64.deb
Size/MD5: 10551276 b61ed90bb3d3f19f0d2e593c0e9f091a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_amd64.deb
Size/MD5: 766282 f86ee0c95591ea10b578e848b6fdeb5f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 215170 7939440a8813110d952d86b49113e146
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 189496 f7495840a58b11f4ebfaad4d8cf203fe
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 29412 54845dbae313e98befcc172b5e87ac2c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 274480 e029f99b6550bd014f26c45997f76dcc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 1933908 6fa450fb440effd7f4a1d643f5e80ab9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 163464 208a84b0506fcd9cadb25f1b7f9d26b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 194828 596399bbfa9a92e3116c8f8d3a7d1391
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 152994 3cf4fb6614c5798cdcca7c8d7fd04a5b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 36486 b3cf4deb0dc4e11f095eb9bcf81546df
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 5842 085134ad282a8b2580aa12a6ed64fd9e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 72152 5b6bf270db5279c7d79cbd5fca8e14f6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 22714 a01ded50b855c5ed0580072a2277b74a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 8874 f173072403f51e6e6da399debd91068f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 47442 e822623d7e4ae0bec0ea5094fed67dcf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 15656 2b2e6ad08af592fa3106adb4eb16324e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 1273594 d873a895c58da3fcd5b8a0ea91f9a5ee
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 47204 c80f48bd49fddaae0188cf56350445f8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 72706 dcc76877eef3af00d0280f96cafb6e45
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 126958 b184498c9d2a598d57e293bc09049cda
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb
Size/MD5: 13472 1399e0100a81d92448659b83949a62a6
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 215860 fe00a3406a5496e200d5c4e5975469f0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 46662 d7a61d1e363f9766795132d3325f02c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 41352 7d84e783cf7fc4111eaf964395440369
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 47402 2cd024da2955f7e35fe4519c8df5add5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 86924 515a3a07357e06f49b2e4384e2af7b8c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 33578 452adbbc84f5a5218610ddad25eb3ea0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 525752 1a2c59458472f4a18538df9386396703
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 125654 8678d7c3409daf24a373b4d11a0d9263
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 54874 94d4465b06d14b20af5803f2afddf53d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 301338 64a58b9a7ee5d53c2d1a486fe32deb93
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 3746292 099947b9ddfb625da14b96bf1b9f59e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_i386.deb
Size/MD5: 673824 c36739d12d66db8de4b6e270b1c91464
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_i386.deb
Size/MD5: 676398 c7091523d59d0b1cdd4453e12d5983d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_i386.deb
Size/MD5: 24662186 cfa5f52488fb3767debfefaf8940f6b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_i386.deb
Size/MD5: 24777004 b524e2b45df5e9d30ebc81717b5c62d7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_i386.deb
Size/MD5: 10250016 09b9af49da34304c1dd280896ce9c0cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_i386.deb
Size/MD5: 766288 4858bc3941dc0e545195c0b911142a4c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 218106 f4f03360ad8e2ee23a58b534e8a2c045
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 174922 fbc6643612c01e91066a87b6ec9c7125
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 30064 c8e4db00aa9c0c3b75c47c103d87b4c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 262814 794c683379e359de14db8806fe984f78
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 2110070 da3e69dab278584e1abea5ee15d9b47d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 150230 7fc91b8ad535bfb705ba2cb2fc9ff57d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 184326 e505e555ac3bd0c33d00a47f7530f78c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 143584 209207f7e7887594a9d55d17bf1dca76
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 34576 cafc0f5f2db11f69d10e75815d3e9018
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 5504 21cfbb5c1aa4c8d82bf3e1412646263f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 86018 0dc7720bee90887f4ebf5c71cf93d611
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 47636 fbebe71b83526192c08fd6d797ee8cb1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 8714 14ed52e8c0a75151dd45acf3cb1ffc34
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 44692 27502a17d5ca35cc31a9fd79ae7d2f1d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 14780 2c9ea91e8d8da2bff76c38a6cdce748d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 1445966 33fa2ee03c566924552fc5b413e2ccf1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 44098 f740dcb377a692e2ff25a65424431e5b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 69290 a7e3130530005bf8fe4edabe8b003888
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 119528 a12c1a5bf9a112402d80e8f77ee87a1c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb
Size/MD5: 12678 6646096dee2575f3bb33510e70bdd52b
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 215260 9a096eefa7f5e423c60fea41c314b9a5
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 46664 ba3b534d98d6717395ec66b402b3c701
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 40958 5950f34ca1fbd16f82a42020bc934ec6
http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 47312 0d7d48294720bbd387710d560756ce6a
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 86530 9e5c38cd42496250d5fcf951c6b5d4bd
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 33272 a8890faa31cf92122bcce2991374fe7e
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 523810 7b2a58ca4d024926c0f8101ab49242d6
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 125252 f48299cd45e2ef1a74017d1c7653976e
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 63568 135fe854fe31d2d8bd9cd09f40a266e5
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 300756 77668125ff976eaed45f3d2676a46c5f
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 3035296 186cc64995c4fd4404241de5399eb0fb
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-18-lpia_2.6.28-18.59_lpia.deb
Size/MD5: 641460 1a4d29b73378acb8bcf88658f88dd08e
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-18-lpia_2.6.28-18.59_lpia.deb
Size/MD5: 21796372 d7455e818bf972ef7eb0fe54b7bd96dc
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_lpia.deb
Size/MD5: 766260 b67d9c1432185123449ed6826ed9588d
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 303982 80fe6dcf6d68a46047ef6ddc2c098614
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 157406 2cc8f76d83482452bb6073656a80b2ee
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 24442 28180da41edae2700e4c8a0e4f1c656f
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 260414 49a0b6bd418a0ff1d274ce8f602e2733
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 2027576 241ee9a564502f3d8837806d5e6480d0
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 149398 b14f79b842c979418dec65e273836cd0
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 184736 a159624d12831598d35c3b00ba563182
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 143238 2720ae4f8cdad85066fc888e7fc3c796
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 34462 582363a3843fdbded2476793775ace76
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 5496 67c7245d730a7b241eb9947afeef7669
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 85646 6a31ffe0054c27df1506ae34162ab79e
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 47402 ff41a000c4a3abbed18330e905a01b7b
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 8718 15aa2d8fafced6b6e3b5a24c698b4089
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 63106 7a967940a04c1ee6a9626258e608b54c
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 14720 dc899d8630769d6270526c49f99a2af8
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 1447832 400eeba1e83569d777954b21b6df593c
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 43898 16b0a1310e3f70dccfc8d0d5f971b064
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 155186 b22b41e37f88fe49531f5580e0f7f712
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 172666 df244ff125096be469b1c56a30f1e05f
http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb
Size/MD5: 8154 f2d765541e008431b4d3eae00f435b61
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.dsc
Size/MD5: 2450 610bb83247876f8a8b47a0fd0d46fae8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.tar.gz
Size/MD5: 87052080 62b9dcb9ad24e659db1aa085f9e5a456
http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.dsc
Size/MD5: 1906 a39c7ff46fb3ff74480d0e98366a486d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.tar.gz
Size/MD5: 81902928 c9e88b4f386710c3f22979986a7e3a34
http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.dsc
Size/MD5: 1943 25176b20de251c2e58bb95e2dd9c1c7b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.tar.gz
Size/MD5: 82470873 4d5238d3d11105852133d3eb802a95cc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.diff.gz
Size/MD5: 2811600 b2b44f12a786758d470e6a29c09d0388
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.dsc
Size/MD5: 3782 ae6bf5844769d00004b919a6f61d588c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31.orig.tar.gz
Size/MD5: 78278595 16c0355d3612806ef87addf7c9f8c9f9
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-doc_2.6.31-304.10_all.deb
Size/MD5: 3790328 e35ab5c36ee1bac625d2a57bd19e0c5c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-source-2.6.31_2.6.31-304.10_all.deb
Size/MD5: 64258256 70b947cc9e9012c9472f2c317f11ffae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304_2.6.31-304.10_all.deb
Size/MD5: 9662096 ac58cebef695901ea01bc7413b79109f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.31-19.56_all.deb
Size/MD5: 3791668 3836f273873fedf9d2293ee0d11df6ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19_2.6.31-19.56_all.deb
Size/MD5: 9531414 34d882276f33b0e37135c379a6e1c451
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.31_2.6.31-19.56_all.deb
Size/MD5: 62161518 9d3f3f79b9f14db8bd3dc68594eb8c8c
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_amd64.deb
Size/MD5: 603212 951db7e930eefc5fff9017c56badfb6e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_amd64.deb
Size/MD5: 18660056 e39dda7f87b093e927c34a928b842c7a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 221398 682a7dab5b571a7b2fd31f19daf724c1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 15536 55206db30b20aea4d7da38b342fc095d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 52128 1cde23d38ba6908e1123951ef4bc3c69
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 44828 94402e34a45cf232ae86f3cc08bf7f4f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 50072 65e128949b6f525d9028187fe1e7cc37
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 92518 338960088cec6b9b25ef2a96e96f3ebc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 37776 452d9c073d191ec2be1cad3aceb34490
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 537676 6bb8167794701151c613afe28a5c62c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 130666 ff5cf8923b89d0fa4b5c3c4a61ef93f7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 53846 ffdc544c68e862a0a3038c99ac2d73a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 310118 c2092f9a83a4f59145005f2c451d304b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 4353666 3a04bb875ae70561075d05d5bb208977
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_amd64.deb
Size/MD5: 694766 85017cb531a49ea743cb7b30341b5ffa
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-server_2.6.31-19.56_amd64.deb
Size/MD5: 694938 550a64d6d54ee5f34f1fb9eefbd4cc3e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_amd64.deb
Size/MD5: 28924984 3001e6d36f6bf76621997bdbeb864234
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-server_2.6.31-19.56_amd64.deb
Size/MD5: 28885946 ff6296f4c684dd9facb011fc51b0b6f0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_amd64.deb
Size/MD5: 11740736 287948976d92a7cae832a34ce33a99b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_amd64.deb
Size/MD5: 743052 35cb9d5d80b77a2586d08ffb65d3212a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 168272 fc4758b6b91802971538d3a3c519056d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 202768 73cfe4be43d350582d171ff0e178b6b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 27268 ae850a5e0ba4381a290b8f21ff88737f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 311688 3dab8c023e4aad0df74c5193aeaca49b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 2282064 f09b0e8828effab3770bfc1da159a8f2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 158666 6765112bf6fed248c08465e47b4dab00
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 203112 fed91a4bc3d356a5a9bb1c6110337413
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 161072 faec6563ccef41e925482b36619fca7c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 38056 505cbeb1fdbf55eea7664a19dcedc11f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 5762 a3ba57f83594477b27886cb3f4bd1b0d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 73750 53978367ed22b3daba246878064b72c2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 22240 8a1036af3dacffb432813cc8422f6ae8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 9548 f1e71c2129cc33f1ff139401b7b81547
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 39844 48e4aa79753fdb3ce1877ca1817b9fc6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 23484 f1be46cb2947ebe6b6d2e5b571d71a35
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 1389556 2ba51ea53e5454f75c8b39f21481e45d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 47382 89f1dff9282f3c667cf1b8c2bc41353c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 51636 41311bd8c8459ba04789539733e6ff5c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 128972 9697c034ed2bb74b5d18c5ae31fe1af0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb
Size/MD5: 15814 8f46e8ddd6cac16dbdbc7c89cc94bee0
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_i386.deb
Size/MD5: 573528 fa913abed6caeb5c33eb2167f730956f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_i386.deb
Size/MD5: 17943372 803487f6122441604ec3062e7bb98228
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 198832 3282a330510666a582f6b8c0269d2f53
http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 32458 03e2d90ce28677b7956fa2a72726d02e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 49938 c0d1953d9212f1569f04e8c8ba0db7ca
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 42118 db5bcc80727cd1013bc8393df2a88e4c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 45954 2d497ad958e7e7fc1b57ce51ff6b3570
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 87386 8e3ab58cf14ac0e97a334a65ae3e42ba
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 33754 bdbf52c3d681cca0ecdced183d2d37c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 534176 5f166aa72d31a95df7cdb60abe4a0fc2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 128172 821c97524ce74e0685b135140c5261d7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 49748 9423b0562b984b85856d219d7b67fa27
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 295726 0736ef03d01a5e5e4fdf284ad2be5409
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 4185460 831a6068ef18d08ff697df14dead1668
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-386_2.6.31-19.56_i386.deb
Size/MD5: 674832 6c28f2a428900b7c3ecd857dd2363150
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb
Size/MD5: 674164 daade678beff67e96da61f42286bb8d4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_i386.deb
Size/MD5: 674252 0786c96b6d902a71c6f1a2e5aa202345
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-386_2.6.31-19.56_i386.deb
Size/MD5: 28775482 99e9b99d437aa88ec42e838367ca0c3b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb
Size/MD5: 28938194 19d1d147a9e9dfb49fcd30b9d065d289
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_i386.deb
Size/MD5: 28836780 00047de0d649be8b91c813fe7ee482b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_i386.deb
Size/MD5: 11193984 1848c77671f6d9129f990e1a0a9940d0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_i386.deb
Size/MD5: 743050 af6030dae8f05d7ef583ee7d6f31be8b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 172774 c11dd36baffeccf283ce48e122d7c791
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 186104 072e07c277b4f37611b21aad4390ccb0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 28372 82c8b14ef6982a48d3a8459d56ede43c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 292792 6c99c3b65ff7b159af94edf70358cb4a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 2400232 94729dcb0c5adb15ded7b3302c4005eb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 142004 9e43481b4e46409d8e711a628ce5e40a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 189566 83afe6de56cab613b4f890723a82a6b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 148522 b96767af921427e880579659ba7b757a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 35306 a6a1cbe7a75490632f24cad479916315
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 6842 86b286685eabaf8b6d28d3f922249503
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 86058 c014cfa81ab99a01793d25b995c7d75f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 46424 d525bcf1a39f6a21f09d52d24e6a0eb3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 8916 f9efb7f192c3cc22c14df58803a64dfc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 36282 1d843fa9ef5beed8582f2924d0b53bcc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 21660 3ad0b4572c12885957a3b753fc3b9fe3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 1495010 630f37fe420a74a22b4ca2eba4960999
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 44088 fddf56b0285ec3d0e6fc61e0fe8b86e2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 48484 2614a20d6d57892a8789091eeeaa67b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 117810 ff004889bca11286287a59c36fa24c0e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb
Size/MD5: 14526 4c9cb3d5598c843bf5b90ddf0292d3c1
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 198810 76156647956f29c9e519aeac038c63bb
http://ports.ubuntu.com/pool/main/l/linux/char-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 32452 9a5dd5fe15dda0be28f7afd966e89af9
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 49936 31c4008b50016b2a6c3a90703f2becbb
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 42148 931518b24b123d3749719c35b2b23759
http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 45950 297c686f52a35049b3b2c87a96aebf68
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 87366 ec3f16cc0aeeef91b8c887ff347b6b0a
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 33750 a29ddd339c071c5b948c96e30f36f650
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 534366 b15b19f3e6c581d22514700dbd6502d8
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 128202 3d0f559a80187074bb210e3dae3bbfa0
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 49732 41abb7e30f0bdac62c5cd064c4b0ac3e
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 295732 12e912ce1f15d580960e7956de0c4ae0
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 4186814 7c18e86a3f5a5a985488ad67718887f9
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-lpia_2.6.31-19.56_lpia.deb
Size/MD5: 674880 5dd2779cd5be613c330b7dc35410f271
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-lpia_2.6.31-19.56_lpia.deb
Size/MD5: 28831528 8eaab1870eda62e8ee231e429c361455
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_lpia.deb
Size/MD5: 742994 99d2d0609d9032e2810e19c92fc92834
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 172836 8b15eb5579853f45dc49055351df4225
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 186092 0eb0ceb5c23748d829f3e1d7977a35be
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 28366 0301ac544cf27b3dce660787d7575804
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 292736 16e84844c99e73b4e00419c38d78db3d
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 2400366 43dda8f1a10775e382e7a328381265db
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 141998 930123e6b57798468d7085ae9f549150
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 189564 8d6e18aedb4b970a3643207b96589863
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 148506 78efdbf1323c68be564ad06205842cb6
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 35300 054cf95e7af87d6f744b69eb8166f275
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 6828 5dbf32d40e88f471614e5cf286670e8f
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 86054 f24e7eaa3608985960e54a9048a24fb6
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 46410 80945eba79f53965effd546d23a8560b
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 8906 e1c6021a615a4363dde2cf4a893fa53b
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 36270 eb2848e19ec2351b9102bc640e546991
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 21660 cfb271e26dfd127871f5d27547e0a7ba
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 1494736 44113d529e3f4d3828f8719facd86370
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 44068 98817942a8188bd9281def20a1d327bb
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 48474 ebc9e58b5f98182006d6e3bb9c5ce179
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 117786 9b864dfc32d19a8cf2d61a68894835e9
http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb
Size/MD5: 14524 9ad51e3871197eb84b193bd9a3b29ec2
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 321488 509ad8549565d0d87fe246df5b26c7af
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 263628 b7028cc16ec749cc2fdd86e985c7bc6a
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 58850 3e2f18df29a75debc326e5919c9c13da
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 67040 8fdde64943d01e5c6a372424d3d24a03
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 45914 6a21bb6fc6dce2767be6f974ffdab524
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 51296 4c928d4f04bf96f5cdc5ccf7d3a60c81
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 90684 eac2ea55da023924723593afffbb5d2c
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 105146 c407a156a5e56f284fa682d87d2ed50e
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 39492 38f377d5a0bdbbbb642545aa6d7f641c
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 39270 47f890e2a1418595d92858350aa16475
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 580998 825045ff82a442eaf1a21a5448b0cefb
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 626388 b56b5416b642ba57471e6e125b99a32f
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 149292 930001a305b0f78060f3472fe46cde00
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 147332 ef6994c30f19462a7fc0cb7cd8f4dacc
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 79750 75c6da2308e05334f89f62917aee5b3d
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 84136 caf2a7e924b03340e579e9bdc0a7ba50
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 402954 9fc3d4860f5c32aff3ac252379938fef
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 342516 5737df8ea2adfc45ecae9d322931187a
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 3813204 3ac91a51b3525bfbb0f6166fc140d7db
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 5193132 54dce7348221bcc93bbc01512d553a16
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb
Size/MD5: 784762 523b94315bff20137df79c5308abd5b7
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb
Size/MD5: 801042 2a8e55b23ad4dc09ee3cbb2fdc23cc28
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb
Size/MD5: 783708 185ba99656f4fa37874e0241e9f25dbb
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb
Size/MD5: 24820746 adc5365726ba88565ad89953707bd012
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb
Size/MD5: 25829918 fc82da730c6d730c5a4ac87d30594749
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb
Size/MD5: 24656226 7791f88107e97c5419f0e2d2f850c38e
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_powerpc.deb
Size/MD5: 728146 1dabe36864839475aab9293825cfc3e4
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 271924 8fb200d91f158f9b0eb209df5a5ffcd4
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 294610 317f7d34e3cd0ac823fcc5d48bcc9a7f
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 210546 041508a9555e18e2b8b4cab41b26f397
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 216984 845e2e452ef869aa3b39ea47bfa0280b
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 25798 19a7cae7e4f693c269f54dc0f2762f33
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 28984 419926b33e2b573f8d3ccaa5ade657f1
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 314922 83dcb63807ffb50682219b20333c23bc
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 357524 a32753bfca44b1afb9b11f72b25ebb9e
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 2027754 9b45ff8446ec0bad5befec2dc3ecdb72
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 2247744 35d212f7569bb03564a7f0294879557f
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 213544 3fb9afb7247290ffb3508744ab6cbb9f
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 209776 e42b20eb402cb2a55fea2a80f5cef162
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 210242 78939115c860efacb83481c0687f1a7a
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 244856 8fcff5fb05c0921681ec2bb44637c624
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 111834 a6b65e618a3240d51f36f37911d1d7cc
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 131610 dc5625deacbac446e71517f5902376b1
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 49028 ac60e4bf193e7725de6d8999c6231915
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 44082 531b2cbe15ec2f62fe61bd7002b1df02
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 5852 f049a9332d469b247e451868b4f22cce
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 6504 32fb4de3cd714598281c2d4d5d2ee6d6
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 79118 e98cffbfe6f6cbffcfa6dce199dc6c46
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 85190 e648dc2d3e124d68c47d4ec18836097f
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 74318 19b737ad1f43e7be1c6cc7e211085424
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 27228 0b5b4529d140289e616bded832055cbc
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 8538 9010c080bd63660bf529930565d49f62
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 9818 e909c37d26354ddbdceddc72628d71b3
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 58830 ae6573a0664b5486360156dd6711776c
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 70140 83085dfd5f4bb24ab67dd967e6b609cc
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 23714 86a598e1b13e4d6963475732e7a1097a
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 30804 b382bc0bfffd61156d0f8b3dc90bd307
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 1556894 ea2800c85a0115ad2e524a8b4ab4cb91
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 1509110 e42499f8bdbad020301a11617f6b65a8
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 81698 095ff78875bae0b90edd07ac3b51993d
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 88530 1a36ce88a0c6f7b495c869da15bf9d69
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 64400 8ff9a2aef998409440c1139f3db8c7ee
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 76990 392faa17f8c688e3856d91fb657eba09
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 141540 636e6d1827591a3aa46b82d7dc0b8ab6
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb
Size/MD5: 151356 0f39f4d13770ceab049be6fb9c83fc16
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 139430 14f825a3334b18614059312527002767
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 70106 6dde178febff58a546142209374e1616
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 46510 64b0be995ce3d697a84cd3b0665ffe68
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 93974 28048300aba15f2a3937723bc0afc5cd
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 588788 c17e7feb3442296b7ed93c92cb988625
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 148426 6f429deb9df760daf28c04ad93ea6758
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 75862 6f382de52d9e1b52611c70a703895e5d
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 2892370 ec9440bb8ee05a7ac071992c5711139f
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb
Size/MD5: 601506 1b56c59b3df953a640760b876d752465
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb
Size/MD5: 600680 166e5056f971d5fa031230c1af67d028
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb
Size/MD5: 20496992 6ebab55c96d6be71ffb8c3a493d31a74
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb
Size/MD5: 20193918 98b3c6e44f8e302cca36530b434e9525
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_sparc.deb
Size/MD5: 740254 b1a453339b4d68717a445f07b87b53a4
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 266068 1b8caecb838a9dd9b9c765f6603197a3
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 209168 e0e78f6a435e0ca46d5680e08d6e8db0
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 26268 f730be03c2b96e53e779a5d3df4cde93
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 314080 b673ee07d0c907d6ba00a561b915868d
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 1675490 8642bd711b6643bd26ddc80674cef9e4
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 222882 136f6b9e24a16823f7309438fd0bd60a
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 121954 75090ea655204cc898db4634fc8aa021
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 38798 a11bcf765626194255c1d5a7d0106c2a
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 100798 af5903bc65fd381528f733fb1ba4100f
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 8932 ebcb23a73a538276e41fcff9b7bb1d15
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 62926 7eba529ee44c2e107b693605dcbf1247
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 120960 8f63ad112de0797974650631dee53d13
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 1217912 87a2a4f21ee86e0f36bc5298a226513b
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 101576 057a15ca3fa891e47216adcf5ae071f7
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 200148 f90834ae24c0f516ef83fa5aa66bafbb
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb
Size/MD5: 184674 d704744a26941df63b9195288306fa7b
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2010-0009 Synopsis: ESXi ntp and ESX Service Console third party updates Issue date: 2010-05-27 Updated on: 2010-05-27 (initial release of advisory) CVE numbers: CVE-2009-2695 CVE-2009-2908 CVE-2009-3228 CVE-2009-3286 CVE-2009-3547 CVE-2009-3613 CVE-2009-3612 CVE-2009-3620 CVE-2009-3621 CVE-2009-3726 CVE-2007-4567 CVE-2009-4536 CVE-2009-4537 CVE-2009-4538 CVE-2006-6304 CVE-2009-2910 CVE-2009-3080 CVE-2009-3556 CVE-2009-3889 CVE-2009-3939 CVE-2009-4020 CVE-2009-4021 CVE-2009-4138 CVE-2009-4141 CVE-2009-4272 CVE-2009-3563 CVE-2009-4355 CVE-2009-2409 CVE-2009-0590 CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 CVE-2009-1386 CVE-2009-1387 CVE-2009-4212 CVE-2009-1384 CVE-2010-0097 CVE-2010-0290 CVE-2009-3736 CVE-2010-0001 CVE-2010-0426 CVE-2010-0427 CVE-2010-0382
- Summary
ESXi update for ntp and ESX Console OS (COS) updates for COS kernel, openssl, krb5, gcc, bind, gzip, sudo.
- Relevant releases
VMware ESX 4.0.0 without patches ESX400-201005401-SG, ESX400-201005406-SG, ESX400-201005408-SG, ESX400-201005407-SG, ESX400-201005405-SG, ESX400-201005409-SG
- Problem Description
a. Service Console update for COS kernel
Updated COS package "kernel" addresses the security issues that are
fixed through versions 2.6.18-164.11.1.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-2695, CVE-2009-2908, CVE-2009-3228,
CVE-2009-3286, CVE-2009-3547, CVE-2009-3613 to the security issues
fixed in kernel 2.6.18-164.6.1
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-3612, CVE-2009-3620, CVE-2009-3621,
CVE-2009-3726 to the security issues fixed in kernel 2.6.18-164.9.1.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2007-4567, CVE-2009-4536, CVE-2009-4537,
CVE-2009-4538 to the security issues fixed in kernel 2.6.18-164.10.1
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2006-6304, CVE-2009-2910, CVE-2009-3080,
CVE-2009-3556, CVE-2009-3889, CVE-2009-3939, CVE-2009-4020,
CVE-2009-4021, CVE-2009-4138, CVE-2009-4141, and CVE-2009-4272 to
the security issues fixed in kernel 2.6.18-164.11.1.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-201005401-SG
ESX 3.5 ESX not applicable
ESX 3.0.3 ESX not applicable
ESX 2.5.5 ESX not applicable
vMA 4.0 RHEL5 affected, patch pending
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
b. ESXi userworld update for ntp
The Network Time Protocol (NTP) is used to synchronize the time of
a computer client or server to another server or reference time
source.
A vulnerability in ntpd could allow a remote attacker to cause a
denial of service (CPU and bandwidth consumption) by using
MODE_PRIVATE to send a spoofed (1) request or (2) response packet
that triggers a continuous exchange of MODE_PRIVATE error responses
between two NTP daemons.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-3563 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 4.0 ESXi ESXi400-201005401-SG
ESXi 3.5 ESXi affected, patch pending
ESX any ESX not applicable
vMA any RHEL5 not applicable
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
c. Service Console package openssl updated to 0.9.8e-12.el5_4.1
OpenSSL is a toolkit implementing SSL v2/v3 and TLS protocols with
full-strength cryptography world-wide.
A memory leak in the zlib could allow a remote attacker to cause a
denial of service (memory consumption) via vectors that trigger
incorrect calls to the CRYPTO_cleanup_all_ex_data function.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-4355 to this issue.
A vulnerability was discovered which may allow remote attackers to
spoof certificates by using MD2 design flaws to generate a hash
collision in less than brute-force time. NOTE: the scope of this
issue is currently limited because the amount of computation
required is still large.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-2409 to this issue.
This update also includes security fixes that were first addressed
in version openssl-0.9.8e-12.el5.i386.rpm.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the names CVE-2009-0590, CVE-2009-1377, CVE-2009-1378,
CVE-2009-1379, CVE-2009-1386 and CVE-2009-1387 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-201005401-SG
ESX 3.5 ESX not applicable
ESX 3.0.3 ESX not applicable
ESX 2.5.5 ESX not applicable
vMA 4.0 RHEL5 affected, patch pending**
- hosted products are VMware Workstation, Player, ACE, Server, Fusion. ** see VMSA-2010-0004
d. Service Console update for krb5 to 1.6.1-36.el5_4.1 and pam_krb5 to 2.2.14-15.
Kerberos is a network authentication protocol. It is designed to
provide strong authentication for client/server applications by
using secret-key cryptography.
Multiple integer underflows in the AES and RC4 functionality in the
crypto library could allow remote attackers to cause a denial of
service (daemon crash) or possibly execute arbitrary code by
providing ciphertext with a length that is too short to be valid.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-4212 to this issue.
The service console package for pam_krb5 is updated to version
pam_krb5-2.2.14-15. This update fixes a flaw found in pam_krb5. In
some non-default configurations (specifically, where pam_krb5 would
be the first module to prompt for a password), a remote attacker
could use this flaw to recognize valid usernames, which would aid a
dictionary-based password guess attack.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-1384 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-201005406-SG
ESX 3.5 ESX affected, patch pending
ESX 3.0.3 ESX affected, patch pending
ESX 2.5.5 ESX affected, patch pending
vMA 4.0 RHEL5 affected, patch pending
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
e. Service Console package bind updated to 9.3.6-4.P1.el5_4.2
BIND (Berkeley Internet Name Daemon) is by far the most widely used
Domain Name System (DNS) software on the Internet.
A vulnerability was discovered which could allow remote attacker to
add the Authenticated Data (AD) flag to a forged NXDOMAIN response
for an existing domain.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0097 to this issue.
A vulnerability was discovered which could allow remote attackers
to conduct DNS cache poisoning attacks by receiving a recursive
client query and sending a response that contains CNAME or DNAME
records, which do not have the intended validation before caching.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0290 to this issue.
A vulnerability was found in the way that bind handles out-of-
bailiwick data accompanying a secure response without re-fetching
from the original source, which could allow remote attackers to
have an unspecified impact via a crafted response.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0382 to this issue.
NOTE: ESX does not use the BIND name service daemon by default.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-201005408-SG
ESX 3.5 ESX not applicable
ESX 3.0.3 ESX not applicable
ESX 2.5.5 ESX not applicable
vMA 4.0 RHEL5 affected, patch pending
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
f. Service Console package gcc updated to 3.2.3-60
The GNU Compiler Collection includes front ends for C, C++,
Objective-C, Fortran, Java, and Ada, as well as libraries for these
languages
GNU Libtool's ltdl.c attempts to open .la library files in the
current working directory. This could allow a local user to gain
privileges via a Trojan horse file. The GNU C Compiler collection
(gcc) provided in ESX contains a statically linked version of the
vulnerable code, and is being replaced.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2009-3736 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not applicable
ESX 4.0 ESX ESX400-201005407-SG
ESX 3.5 ESX affected, patch pending
ESX 3.0.3 ESX affected, patch pending
ESX 2.5.5 ESX affected, patch pending
vMA 4.0 RHEL5 affected, patch pending
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
g. Service Console package gzip update to 1.3.3-15.rhel3
gzip is a software application used for file compression
An integer underflow in gzip's unlzw function on 64-bit platforms
may allow a remote attacker to trigger an array index error
leading to a denial of service (application crash) or possibly
execute arbitrary code via a crafted LZW compressed file.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0001 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-201005405-SG
ESX 3.5 ESX affected, patch pending
ESX 3.0.3 ESX affected, patch pending
ESX 2.5.5 ESX affected, patch pending
vMA 4.0 RHEL5 affected, patch pending
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
h. Service Console package sudo updated to 1.6.9p17-6.el5_4
Sudo (su "do") allows a system administrator to delegate authority
to give certain users (or groups of users) the ability to run some
(or all) commands as root or another user while providing an audit
trail of the commands and their arguments.
When a pseudo-command is enabled, sudo permits a match between the
name of the pseudo-command and the name of an executable file in an
arbitrary directory, which allows local users to gain privileges
via a crafted executable file.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0426 to this issue.
When the runas_default option is used, sudo does not properly set
group memberships, which allows local users to gain privileges via
a sudo command.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2010-0427 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-201005409-SG
ESX 3.5 ESX not applicable
ESX 3.0.3 ESX not applicable
ESX 2.5.5 ESX not applicable
vMA 4.0 RHEL5 affected, patch pending
-
hosted products are VMware Workstation, Player, ACE, Server, Fusion.
-
Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
ESX 4.0
http://bit.ly/aqTCqn md5sum: ace37cd8d7c6388edcea2798ba8be939 sha1sum: 8fe7312fe74a435e824d879d4f1ff33df25cee78 http://kb.vmware.com/kb/1013127
Note ESX400-201005001 contains the following security bulletins ESX400-201005404-SG (ntp), ESX400-201005405-SG (gzip), ESX400-201005408-SG (bind), ESX400-201005401-SG (kernel, openssl), ESX400-201005406-SG (krb5, pam_krb5), ESX400-201005402-SG (JRE), ESX400-201005403-SG (expat), ESX400-201005409-SG (sudo), ESX400-201005407-SG (gcc).
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2695 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2908 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3613 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3612 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3620 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3621 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4537 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6304 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2910 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3080 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3556 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3889 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4020 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4021 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4141 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4272 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4355 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0382
- Change log
2010-05-27 VMSA-2010-0009 Initial security advisory after release of patch 06 bulletins for ESX 4.0 on 2010-05-27
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2010 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32)
iEYEARECAAYFAkv/V8IACgkQS2KysvBH1xnqNgCcCwwelsQK6DQjcTc2wnIPp0EW E70An2gfkiCQ5FNqvf3y+kNredxyVZwI =JW3s -----END PGP SIGNATURE----- . Summary
VMware hosted product updates, ESX patches and VI Client update
resolve multiple security issues.
VMware Player 3.1.3 and earlier.
VMware Fusion 3.1.2 and earlier.
ESXi 4.1 without patch ESXi410-201104402-BG.
ESXi 4.0 without patch ESXi400-201104402-BG.
ESXi 3.5 without patches ESXe350-201105401-I-SG and
ESXe350-201105402-T-SG.
ESX 4.1 without patch ESX410-201104401-SG
ESX 4.0 without patch ESX400-201104401-SG
ESX 3.5 without patches ESX350-201105401-SG,
ESX350-201105404-SG and
ESX350-201105406-SG.
2) SCSI Driver Denial of Service / Possible Privilege Escalation
A local attacker can achieve a denial of service and
possibly a privilege escalation via a vulnerability in the
Linux SCSI drivers.
3) Kernel Memory Management Arbitrary Code Execution
A context-dependent attacker can execute arbitrary code via
a vulnerability in a kernel memory handling function. Multiple vulnerabilities in mount.vmhgfs
This patch provides a fix for the following three security
issues in the VMware Host Guest File System (HGFS). None of
these issues affect Windows based Guest Operating Systems.
1) Mount.vmhgfs Information Disclosure
Information disclosure via a vulnerability that allows an
attacker with access to the Guest to determine if a path
exists in the Host filesystem and whether it is a file or
directory regardless of permissions.
2) Mount.vmhgfs Race Condition
Privilege escalation via a race condition that allows an
attacker with access to the guest to mount on arbitrary
directories in the Guest filesystem and achieve privilege
escalation if they can control the contents of the mounted
directory.
3) Mount.vmhgfs Privilege Escalation
Privilege escalation via a procedural error that allows an
attacker with access to the guest operating system to gain
write access to an arbitrary file in the Guest filesystem.
This issue only affects Solaris and FreeBSD Guest Operating
Systems.
VMware would like to thank Dan Rosenberg for reporting these
issues. VI Client ActiveX vulnerabilities
VI Client COM objects can be instantiated in Internet Explorer
which may cause memory corruption. An attacker who succeeded in
making the VI Client user visit a malicious Web site could
execute code on the user's system within the security context of
that user.
VMware would like to thank Elazar Broad and iDefense for
reporting this issue to us.
Affected versions.
The vSphere Client which comes with vSphere 4.0 and vSphere 4.1
is not affected. This is any build of vSphere Client Version
4.0.0 and vSphere Client Version 4.1.0.
VI Clients bundled with VMware Infrastructure 3 that are not
affected are:
- VI Client 2.0.2 Build 230598 and higher
- VI Client 2.5 Build 204931 and higher
The issue can be remediated by replacing an affected VI Client
with the VI Client bundled with VirtualCenter 2.5 Update 6 or
VirtualCenter 2.5 Update 6a.
VMware Workstation 7.1.4
----------------------------
http://downloads.vmware.com/d/info/desktop_downloads/vmware_workstation/7_0 Release notes: http://downloads.vmware.com/support/ws71/doc/releasenotes_ws714.html
VMware Workstation for Windows 32-bit and 64-bit with VMware Tools
md5sum: b52d064dff3e9fb009e0637d59b79c44
sha1sum: bf4fe9e901b45e59b33852c4612e90fb77223d64
VMware Workstation for Linux 32-bit with VMware Tools
md5sum: 5f5f25b1cfd8990e46db07788fe0adab
sha1sum: d5b4bfe0d22079988a7777dcc0f87a16b494b5f9
VMware Workstation for Linux 64-bit with VMware Tools
md5sum: 68b424f836f63c12b071a791f80b1593
sha1sum: a7d1f461830db022af8f9d872c980fc59a83c5d6
VMware Fusion 3.1.3
---------------------------
http://downloads.vmware.com/d/info/desktop_downloads/vmware_fusion_for_the_mac/3_0 Release notes:
http://downloads.vmware.com/support/fusion3/doc/releasenotes_fusion_313.html
VMware Fusion for Intel-based Macs
md5sum: f35ac5c15354723468257d2a48dc4f76
sha1sum: 3c849a62c45551fddb16eebf298cef7279d622a9
VMware Player 3.1.4
---------------------------
http://downloads.vmware.com/d/info/desktop_downloads/vmware_player/3_0
Release notes:
https://www.vmware.com/support/player31/doc/releasenotes_player314.html
VMware Player 3.1.4 for 32-bit and 64-bit Windows
md5sum: 29dd5fefe40af929dba40185eb6d4804
sha1sum: ac00488dd9e412beea2366c167ceb87ed262054f
VMware Player 3.1.4 for 32-bit Linux
md5sum: 75a41b63836d19db34f5551846c8b11d
sha1sum: 7350051c0fc781604d1d46bc24003434cbcd3b26
VMware Player 3.1.4 for 64-bit Linux
md5sum: a7fdadfb2af8d9f76571cd06f2439041
sha1sum: 90031375a9c10d9a0a5e32be154c856693ad7526
VMware ESXi 4.1
---------------------------
ESXi410-201104001
Download link:
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-276-20110420-682352/ESXi410-201104001.zip md5sum: 23bd026d6cbca718fe50ed1dd73cfe9d sha1sum: 82fa6da02a1f37430a15a659254426b3d3a62662 http://kb.vmware.com/kb/1035111
ESXi410-201104001 contains ESXi410-201104402-BG.
VMware ESX 4.1
-------
ESX410-201104001
Download link:
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-275-20110420-062017/ESX410-201104001.zip md5sum: 757c3370ae63c75ef5b2178bd35a4ac3 sha1sum: 95cfdc08e0988b4a0c0c3ea1a1acc1c661979888 http://kb.vmware.com/kb/1035110
Note ESX410-201104001 contains ESX410-201104401-SG.
VMware ESXi 4.0
---------------------------
ESXi400-201104001
Download link:
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-278-20110424-080274/ESXi400-201104001.zip md5sum: 08216b7ba18988f608326e245ac27e98 sha1sum: 508a04532f0af007ce7c9d7693371470ed8257f0 http://kb.vmware.com/kb/1037261
Note ESXi400-201104001 contains ESXi400-201104402-BG.
VMware ESX 4.0
---------------------------
ESX400-201104001
Download link:
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-277-20110424-816604/ESX400-201104001.zip
md5sum: 1a305fbf6c751403e56ef4e33cabde06
sha1sum: bc7577cb80e69fbe81e3e9272a182deb42987b3d
http://kb.vmware.com/kb/1037260
Note ESX400-201104001 contains ESX400-201104401-SG.
VMware ESXi 3.5
---------------------------
ESXe350-201105401-O-SG
Download link:
http://download3.vmware.com/software/vi/ESXe350-201105401-O-SG.zip
md5sum: 9bc9296cae1fbecf417f60941590fcb4
sha1sum: d6902377f57e3b05b08c07a810d6b58fa30aa8d5
http://kb.vmware.com/kb/1036403
Note ESXe350-201105401-O-SG contains the following security fixes:
ESXe350-201105402-T-SG and ESXe350-201105401-I-SG
VMware ESX 3.5
---------------------------
ESX350-201105401-SG
Download link:
http://download3.vmware.com/software/vi/ESX350-201105401-SG.zip
md5sum: 2853ca6e75ef5e856ec582151908ad93
sha1sum: c538971d47af4b813348d87bf2f4fa6acd9292f7
http://kb.vmware.com/kb/1036399
ESX350-201105404-SG
Download link:
http://download3.vmware.com/software/vi/ESX350-201105404-SG.zip
md5sum: 7403d4a06e2bdb9cdfb5590432f51bf8
sha1sum: 1700d6175524680b982ca4430cff77b5f7cb15c4
http://kb.vmware.com/kb/1036402
ESX350-201105406-SG
Download link:
http://download3.vmware.com/software/vi/ESX350-201105406-SG.zip
md5sum: 6c695f7d021f751959aec08fed94df11
sha1sum: 83a862c469e7f3334e2a78f6b81d98c02108b708
http://kb.vmware.com/kb/1036754
- Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . Rather, they will be released in a staggered or "leap-frog" fashion
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200906-0612", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "lte", "trust": 1.8, "vendor": "linux", "version": "2.6.32.3" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "4.0" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "3.5" }, { "model": "esxi", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "3.5" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "4.0" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "4.1" }, { "model": "esxi", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "4.1" }, { "model": "esxi", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.4.36" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.22" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.21.6" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.23" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "3.0.3" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.7 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.7 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "enterprise linux els", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.2.z (server)" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.3.z (server)" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.4.z (server)" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.22_rc7" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.25.16" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.4.36.2" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.25.17" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.4.36.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel -test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.1" }, { "model": "kernel .0-test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.35.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.34.5" }, { "model": "linux enterprise server unsupported extras", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.1" }, { "model": "hat enterprise virtualization hypervisor", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "2.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.15" }, { "model": "river systems linux", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "3.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.32" }, { "model": "kernel 2.6.18-8.1.8.el5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.1" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel 2.6.21-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "linux enterprise sp2 debuginfo", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.8" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel -test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "river systems linux", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "3.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.5" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.6" }, { "model": "kernel 2.6.31-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel .0-test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.4" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.2" }, { "model": "kernel .0-test12", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel .0-test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.36.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.2" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.6" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.7" }, { "model": "kernel -rc6-git6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.4" }, { "model": "kernel .0-test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.36.7" }, { "model": "linux enterprise sp3 debuginfo", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.267" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.7" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0.0.52" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.6" }, { "model": "kernel -test9-cvs", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.214" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "kernel 2.6.32-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "kernel 2.6.22-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.37.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.4" }, { "model": "kernel 2.6.31-rc9", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.34" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.36.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18x86" }, { "model": "linux enterprise sdk sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.3" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.9" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel 2.6.24-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel pre-3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.09" }, { "model": "kernel -test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel 2.6.29-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.3" }, { "model": "kernel -git7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.25" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.2" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.32" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.5" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.30" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel 2.6.31-git11", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.23" }, { "model": "kernel pre-5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.11" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.32" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.12" }, { "model": "kernel 2.6.29-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.34.3" }, { "model": "esxi server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "kernel 2.6.31-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.31-rc5-git3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.12" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.1" }, { "model": "kernel -pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.30" }, { "model": "enterprise linux es 4.7.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.11" }, { "model": "intuity audix lx sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "kernel -git1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.18" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.11" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel -ow2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.5" }, { "model": "kernel 2.6.32-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.1" }, { "model": "kernel -git14", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.273" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.36.8" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.5" }, { "model": "kernel -test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.371" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.8" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.2" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel 2.6.22-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.3" }, { "model": "kernel pre-4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.7" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20-2" }, { "model": "kernel -rc8-git5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.37" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.12" }, { "model": "esx server esx400-200909401", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.37" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.1" }, { "model": "esx server esx400-200912403", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.6" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.10" }, { "model": "kernel pre-6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.1" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.29" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.4" }, { "model": "kernel .0-test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel -test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "esx server esx400-201003405", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.29" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8.1" }, { "model": "kernel -pre5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.14" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.4" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.5" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.9" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -pre5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.3" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.3" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "enterprise mrg for red hat enterprise linux version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "v15" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.14" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2712" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18-53" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.5" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.4" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.28" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel pre-2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.2" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "kernel .0-test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.5" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel 2.6.25-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.8" }, { "model": "kernel .0-test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.4" }, { "model": "kernel 2.6.32-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.14" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.9" }, { "model": "kernel -rc8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel 2.6.32-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15-27.48" }, { "model": "kernel pre-8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.10" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.5" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "esx server esx400-201005401", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.3" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.17" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.37.6" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "kernel 2.6.20-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel 2.6.32-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.15" }, { "model": "linux enterprise server debuginfo", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "kernel -pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.12" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "kernel -pre3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel -git8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.13" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -git5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "kernel 2.6.24-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "enterprise linux 5.2.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.14" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.1" }, { "model": "kernel -test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel 2.6.32-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.22" }, { "model": "kernel -pre3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "hat enterprise linux as 4.7.z", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.20" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.36.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.3" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.3" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.1" }, { "model": "kernel 2.6.21-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.3" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel -git13", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel -test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "enterprise linux 5.3.z server", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "kernel -git8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel 2.6.21-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.26-rc5-git1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.8" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel .0-test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.6" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.10" }, { "model": "kernel 2.6.21-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.37.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.22" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.11" }, { "model": "kernel -test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.332" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.36.6" }, { "model": "kernel .0-test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.12" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2519" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.5" }, { "model": "river systems linux", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "desktop video device", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "intuity audix lx sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "linux enterprise server sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.2" }, { "model": "kernel .0-test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.4.37.9" }, { "model": "kernel -test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "linux enterprise desktop sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "vma rhel5", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.4" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.3" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.26" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1613" }, { "model": "esxi server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.37.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.6" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel pre-1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.17" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.11" }, { "model": "kernel 2.6.29-rc2-git1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.34.6" }, { "model": "kernel 2.6.32-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.1" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel -ow1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.19" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.4" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.4" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.7" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.33.3" }, { "model": "kernel -pre6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.36.9" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "esxi server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.21" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.16" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.276" }, { "model": "kernel 2.6.31-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20" }, { "model": "intuity audix lx", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.17" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel pre7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.315" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.5" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1627" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.4" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.12" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "kernel pre-7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel -test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux enterprise high availability extension", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" } ], "sources": [ { "db": "BID", "id": "37519" }, { "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "db": "CNNVD", "id": "CNNVD-201001-076" }, { "db": "NVD", "id": "CVE-2009-4536" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:linux:linux_kernel", "vulnerable": true }, { "cpe22Uri": "cpe:/a:vmware:esx", "vulnerable": true }, { "cpe22Uri": "cpe:/a:vmware:esxi", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_els", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_eus", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001004" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fabian Yamaguchi", "sources": [ { "db": "BID", "id": "37519" }, { "db": "CNNVD", "id": "CNNVD-201001-076" } ], "trust": 0.9 }, "cve": "CVE-2009-4536", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2009-4536", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-41982", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2009-4536", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2009-4536", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201001-076", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-41982", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2009-4536", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-41982" }, { "db": "VULMON", "id": "CVE-2009-4536" }, { "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "db": "CNNVD", "id": "CNNVD-201001-076" }, { "db": "NVD", "id": "CVE-2009-4536" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385. The Linux e1000 driver is prone to a security-bypass vulnerability. \nAn attacker can exploit this issue to cause network traffic to be misinterpreted, which may allow the attacker to bypass intended security restrictions or launch further attacks. \nNOTE: A related vulnerability is documented as BID 35185 (Linux Kernel \u0027e1000/e1000_main.c\u0027 Remote Denial of Service Vulnerability), but that issue doesn\u0027t address all possible scenarios. The Linux kernel is the kernel used by the open source operating system Linux released by the American Linux Foundation. The NFSv4 implementation is one of the distributed file system protocols. Although\nsecurity support for \u0027etch\u0027 officially ended on Feburary 15th, 2010,\nthis update was already in preparation before that date. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2009-2691\n\n Steve Beattie and Kees Cook reported an information leak in the\n maps and smaps files available under /proc. Local users may be\n able to read this data for setuid processes while the ELF binary\n is being loaded. \n\nCVE-2009-2695\n\n Eric Paris provided several fixes to increase the protection\n provided by the mmap_min_addr tunable against NULL pointer\n dereference vulnerabilities. \n\nCVE-2009-3080\n\n Dave Jones reported an issue in the gdth SCSI driver. A missing\n check for negative offsets in an ioctl call could be exploited by\n local users to create a denial of service or potentially gain\n elevated privileges. \n\nCVE-2009-3726\n\n Trond Myklebust reported an issue where a malicious NFS server\n could cause a denial of service condition on its clients by\n returning incorrect attributes during an open call. \n\nCVE-2009-3889\n\n Joe Malicki discovered an issue in the megaraid_sas driver. \n Insufficient permissions on the sysfs dbg_lvl interface allow\n local users to modify the debug logging behavior. \n\nCVE-2009-4005\n\n Roel Kluin discovered an issue in the hfc_usb driver, an ISDN\n driver for Colognechip HFC-S USB chip. \n\nCVE-2009-4020\n\n Amerigo Wang discovered an issue in the HFS filesystem that would\n allow a denial of service by a local user who has sufficient\n privileges to mount a specially crafted filesystem. Avati discovered an issue in the fuse subsystem. If the\n system is sufficiently low on memory, a local user can cause the\n kernel to dereference an invalid pointer resulting in a denial of\n service (oops) and potentially an escalation of privileges. \n\nCVE-2009-4138\n\n Jay Fenlason discovered an issue in the firewire stack that allows\n local users to cause a denial of service (oops or crash) by making\n a specially crafted ioctl call. \n\nCVE-2009-4308\n\n Ted Ts\u0027o discovered an issue in the ext4 filesystem that allows\n local users to cause a denial of service (NULL pointer\n dereference). This option is disabled by\n default. \n\nCVE-2010-0007\n\n Florian Westphal reported a lack of capability checking in the\n ebtables netfilter subsystem. If the ebtables module is loaded,\n local users can add and modify ebtables rules. \n\nCVE-2010-0410\n\n Sebastian Krahmer discovered an issue in the netlink connector\n subsystem that permits local users to allocate large amounts of\n system memory resulting in a denial of service (out of memory). \n\nCVE-2010-0415\n\n Ramon de Carvalho Valle discovered an issue in the sys_move_pages\n interface, limited to amd64, ia64 and powerpc64 flavors in Debian. \n\nCVE-2010-0622\n\n Jermome Marchand reported an issue in the futex subsystem that\n allows a local user to force an invalid futex state which results\n in a denial of service (oops). \n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 2.6.24-6~etchnhalf.9etch3. \n\nWe recommend that you upgrade your linux-2.6.24 packages. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386,\nia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.dsc\n Size/MD5 checksum: 5118 e05bb21e7655cbfa39aed8d4fd6842eb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.diff.gz\n Size/MD5 checksum: 4099250 127bad8d653046d37fc52115d4e3a332\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz\n Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 4263554 6c56ff077d17eba766af47544ce0f414\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 83890 62cfd18ed176359831502e70d80b291a\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 46871628 328ad30d3c07f90c56d821f76e186b40\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 1550090 1f114fdc3123f135017dbdcd0e4839c6\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 1009878 c7b7abff092940a400703b9168e46daa\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.9etch3_all.deb\n Size/MD5 checksum: 98248 a2a391008f8855d8358d5f18d9d76044\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 329786 a212d2b3a94f8a04611c0f20d3d324b9\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 27236282 b5bc553c4bf3a49843c45814fab72443\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 83428 f5f27b9de4905239e6315c77393f1f03\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 83454 5d152b5b6aa505982ebc7122a770b29b\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 26641900 c799e7d48937975036b46edf032ecd87\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 26620162 eb1c3c27f1ac81959dc0f2ab497aee35\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 3455268 da2d2cc2b7c4253ac408c30fcfddb28f\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 329788 f589f8815f7adf02f8884e2dd3ac613f\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb\n Size/MD5 checksum: 329336 14bf085655b30adc8ab8f6ed4207d415\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 19482308 c49d2962c1a391fb00fb1b5f0598b24e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 3656476 f2f5de65037664d03208fcea83bf2ee2\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 83422 600c7216143f43f9c61b0c2ccd118ea0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 83434 36f1d8f21ec39a473536dbeda2332e62\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb\n Size/MD5 checksum: 346940 d3f12fdd61f90749fdd08d857b326327\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 9357734 3e1165a0795d7db5f7ed8ef84205064b\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 298744 50d8bfa3c06134e190409399a36c5aa9\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 83546 1742ab93afadd1827009bf1d714e76eb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 83578 07906e33f9ad267d986991c93eef1048\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 10778670 cc38a718ad5fd1c6e92d23e416610bd6\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 308138 34dbc7720b1844833f0b71aa307c37fa\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 310714 6a2c6fbbc1dd000b8a532227e3b8b5ae\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 3939512 91c2ba626e754fe407d6dcf3fa01337a\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb\n Size/MD5 checksum: 10786892 4d44a4ff751969855a01ad754a7c2b22\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 14375048 fe6ed4dea09aa205d801476667ef03cb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 13847788 4adc3106a987d84e12215156a379f460\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 259624 ac09dcabb624984b7321a5f6b6dbef54\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 83578 e152e18748e5c80b6d06715db836cf83\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 260838 44bc8ad5796c124b53d85a8c3a4ed912\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 262420 ff0641f04c409dd606c34373e8e16269\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 14830990 cce09e8022bee915dcde5dd8b9525428\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 13333594 a4dc863b0c84b9006c723db9a581c92e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 83546 990eb24056c7f6a63a4d55ec39563bae\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 3446386 6ebfa4544252648df48cfb085cc3d2cc\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb\n Size/MD5 checksum: 258962 75184bed1f0b42cd8e002f93ed42198a\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 3656680 c5499cb98cdcdcadc48e3aa5bdf1d379\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 19214268 e3f564cae5a85355f4b5a9248a11af98\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 19148424 dd1d713c896888370a1667a16571c08c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 346982 6a6a08f74f9690705e6d770d1f3f2566\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 359548 b10fe011746b0df5fbd2587292af34ae\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 19482314 5d9cc150e340aea40e253a757cfdc423\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 83452 32a1614212e964a4423b161b34cd758d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 19213598 4f459c2d2cdb87a6f945cbee7d4500d4\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 358212 58ba32b0701643f043ab38a487cae609\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 83424 c1e8493aff96df5b0fe33f5af4686f98\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb\n Size/MD5 checksum: 358752 4e3e9ef18a14fd191444591df571f80c\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 3569470 9ae824064bfc785f4b3512db78119e46\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 32206374 badd40dd68e2c6634c65f79d9536e34d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 83432 64a48fa9283b1741e22f0a22dbb93b20\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 83456 235a5572d5e109a4b575080a8262dc57\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 319938 d7dc0120458e93119879dcdd1e48017e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 32025762 7595d7dc21d3273f46b35b8c00b0e195\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb\n Size/MD5 checksum: 320226 34731a37b519d726b133093e04d937c3\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 22243472 532341ea0847ea19414413f7659ff13d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 248638 ce9da5c377d6328e9bb9be1c3945fff8\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 12001172 817c44fd5afbeef1b9f172522ff21bcb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 10553972 20ddd95631b93efd52ae0aa38a5cd6d4\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 83600 a7b66d71779dea207a3d49cb9f692fdb\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 27858364 54998117445c20f413331d1197355745\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 17212542 bf6c996fd387eef151e0db60d1bd00f2\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 313302 314b57dc807eb91f617c10b1497e1617\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 314602 2c127076bf189be2836a4c3a4c7736af\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 3804368 fbcb3bdd668db166ad3f08e6dbfbc6e0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 17194888 9bce41a8b9936a16a3aa9cca675b9638\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 83540 8acdb1b4a4bc57f55b9cc5b2b04043a4\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 229412 0b93c7c909eca04fad4fa45e3e73e96c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 248700 13266a2acd5fcbd75d11049dd5e5ad58\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb\n Size/MD5 checksum: 218314 4174dec1c73ca114469cbb88fba32926\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 16567710 29d2ab68b4259a1822a2ca19e9494f5d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 309868 d69b27ef946f2ac62b115e0200fe8002\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 26988356 f0d885b353b15dc42e4e76da8a8fb129\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 248150 7c585f74e0752a631050b13b9740c0c3\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 13318088 0b0a8b724245ac10817b03c4cf734827\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 83484 a678208f18017a9c87d45548916fd98e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 311392 5b1f0957a2756b04be6c95ae8ca5e2c8\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 21736368 02da1a4e543b8c5082476b156281cb31\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 247968 929ca712a0aa0984f9dc2a6f68f405a5\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 16632240 c9de1dfccb8a5cb5d5d652ca694a7108\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 3805532 be10a8b64da3adf7ece3846b0b0bf930\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 83434 ac0cb9b5939e4ea82c3c83a1a1d473ed\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb\n Size/MD5 checksum: 248174 50e84058a7d710f013f92e1fe68a705c\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 322474 2d7e39cf0b78d98125a0baba377f1af0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 19195556 bb2bd8e203cee7b3c6739d5c5d11901a\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 324008 3b021bb4b3dac72dc68e701f4a209939\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 295928 ca2bf1c3c12f409e469c516877a8e91c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 21170062 4022dbff73ebfde3a846ce38896cf09c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 322502 4b76cce255e1fcc72cb82053cd34a1a2\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 17459240 ad749c6e735e58d775b7190ff3d26e50\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 83466 a041c0fdb383832cf725723ce22e40c0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 83430 392d415932625b1a69dc6494d2f737e0\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 3674486 200fdcca2140a97f961a37d70db620d5\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb\n Size/MD5 checksum: 19487244 b42ad8431643d89a1f8b0e6e0aaeb39e\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 83532 a1c34683fe304f1a86bbc28f6cbc654c\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 83556 bf7fed1ef4da92d782409fe8345f861a\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 6976486 5b5db16fea4336068bbcd5bff56ad575\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 7228452 75c044fa17d6071de36579a1491c2e1b\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 3431908 18825f85900faca81b21e48d43af6ee7\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 197006 0a44248e77ec1ff027edd032ebe5b2c6\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 1503494 bd7f7b7bd4e120472bf60ad0b7d9184e\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb\n Size/MD5 checksum: 196810 f03114c2f256a97b15f88d2659f9501b\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 83428 1ea7179752fbb45e10e731991583db68\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 263546 ef894d6917cbe692ec9197048538d5e7\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 3651402 a0194c650712040f81e97d5b3b62bc79\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 264892 0b642e20f00b52c20b6ae9e0ee1f78b8\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 83442 6d109d7f131dab564736e2ac6a85dd29\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 13318532 dbce062bfa560c331b75bed073868e1d\n http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb\n Size/MD5 checksum: 13019464 b0b153fafa43b650e996a9d84bbb26d7\n\n These changes will probably be included in the oldstable distribution on\n its next update. ===========================================================\nUbuntu Security Notice USN-894-1 February 05, 2010\nlinux, linux-source-2.6.15 vulnerabilities\nCVE-2009-4020, CVE-2009-4021, CVE-2009-4031, CVE-2009-4138,\nCVE-2009-4141, CVE-2009-4308, CVE-2009-4536, CVE-2009-4538,\nCVE-2010-0003, CVE-2010-0006, CVE-2010-0007, CVE-2010-0291\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\nUbuntu 9.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n linux-image-2.6.15-55-386 2.6.15-55.82\n linux-image-2.6.15-55-686 2.6.15-55.82\n linux-image-2.6.15-55-amd64-generic 2.6.15-55.82\n linux-image-2.6.15-55-amd64-k8 2.6.15-55.82\n linux-image-2.6.15-55-amd64-server 2.6.15-55.82\n linux-image-2.6.15-55-amd64-xeon 2.6.15-55.82\n linux-image-2.6.15-55-hppa32 2.6.15-55.82\n linux-image-2.6.15-55-hppa32-smp 2.6.15-55.82\n linux-image-2.6.15-55-hppa64 2.6.15-55.82\n linux-image-2.6.15-55-hppa64-smp 2.6.15-55.82\n linux-image-2.6.15-55-itanium 2.6.15-55.82\n linux-image-2.6.15-55-itanium-smp 2.6.15-55.82\n linux-image-2.6.15-55-k7 2.6.15-55.82\n linux-image-2.6.15-55-mckinley 2.6.15-55.82\n linux-image-2.6.15-55-mckinley-smp 2.6.15-55.82\n linux-image-2.6.15-55-powerpc 2.6.15-55.82\n linux-image-2.6.15-55-powerpc-smp 2.6.15-55.82\n linux-image-2.6.15-55-powerpc64-smp 2.6.15-55.82\n linux-image-2.6.15-55-server 2.6.15-55.82\n linux-image-2.6.15-55-server-bigiron 2.6.15-55.82\n linux-image-2.6.15-55-sparc64 2.6.15-55.82\n linux-image-2.6.15-55-sparc64-smp 2.6.15-55.82\n\nUbuntu 8.04 LTS:\n linux-image-2.6.24-27-386 2.6.24-27.65\n linux-image-2.6.24-27-generic 2.6.24-27.65\n linux-image-2.6.24-27-hppa32 2.6.24-27.65\n linux-image-2.6.24-27-hppa64 2.6.24-27.65\n linux-image-2.6.24-27-itanium 2.6.24-27.65\n linux-image-2.6.24-27-lpia 2.6.24-27.65\n linux-image-2.6.24-27-lpiacompat 2.6.24-27.65\n linux-image-2.6.24-27-mckinley 2.6.24-27.65\n linux-image-2.6.24-27-openvz 2.6.24-27.65\n linux-image-2.6.24-27-powerpc 2.6.24-27.65\n linux-image-2.6.24-27-powerpc-smp 2.6.24-27.65\n linux-image-2.6.24-27-powerpc64-smp 2.6.24-27.65\n linux-image-2.6.24-27-rt 2.6.24-27.65\n linux-image-2.6.24-27-server 2.6.24-27.65\n linux-image-2.6.24-27-sparc64 2.6.24-27.65\n linux-image-2.6.24-27-sparc64-smp 2.6.24-27.65\n linux-image-2.6.24-27-virtual 2.6.24-27.65\n linux-image-2.6.24-27-xen 2.6.24-27.65\n\nUbuntu 8.10:\n linux-image-2.6.27-17-generic 2.6.27-17.45\n linux-image-2.6.27-17-server 2.6.27-17.45\n linux-image-2.6.27-17-virtual 2.6.27-17.45\n\nUbuntu 9.04:\n linux-image-2.6.28-18-generic 2.6.28-18.59\n linux-image-2.6.28-18-imx51 2.6.28-18.59\n linux-image-2.6.28-18-iop32x 2.6.28-18.59\n linux-image-2.6.28-18-ixp4xx 2.6.28-18.59\n linux-image-2.6.28-18-lpia 2.6.28-18.59\n linux-image-2.6.28-18-server 2.6.28-18.59\n linux-image-2.6.28-18-versatile 2.6.28-18.59\n linux-image-2.6.28-18-virtual 2.6.28-18.59\n\nUbuntu 9.10:\n kernel-image-2.6.31-108-imx51-di 2.6.31-108.21\n linux-image-2.6.31-19-386 2.6.31-19.56\n linux-image-2.6.31-19-generic 2.6.31-19.56\n linux-image-2.6.31-19-generic-pae 2.6.31-19.56\n linux-image-2.6.31-19-ia64 2.6.31-19.56\n linux-image-2.6.31-19-lpia 2.6.31-19.56\n linux-image-2.6.31-19-powerpc 2.6.31-19.56\n linux-image-2.6.31-19-powerpc-smp 2.6.31-19.56\n linux-image-2.6.31-19-powerpc64-smp 2.6.31-19.56\n linux-image-2.6.31-19-server 2.6.31-19.56\n linux-image-2.6.31-19-sparc64 2.6.31-19.56\n linux-image-2.6.31-19-sparc64-smp 2.6.31-19.56\n linux-image-2.6.31-19-virtual 2.6.31-19.56\n linux-image-2.6.31-211-dove 2.6.31-211.22\n linux-image-2.6.31-211-dove-z0 2.6.31-211.22\n linux-image-2.6.31-304-ec2 2.6.31-304.10\n\nAfter a standard system upgrade you need to reboot your computer to\neffect the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change (except for Ubuntu 6.06)\nthe kernel updates have been given a new version number, which requires\nyou to recompile and reinstall all third party kernel modules you\nmight have installed. Unless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-server, linux-powerpc), a standard system\nupgrade will automatically perform this as well. \n\nDetails follow:\n\nAmerigo Wang and Eric Sesterhenn discovered that the HFS and ext4\nfilesystems did not correctly check certain disk structures. (CVE-2009-4021)\n\nIt was discovered that KVM did not correctly decode certain guest\ninstructions. A local attacker in a guest could exploit this to\ntrigger high scheduling latency in the host, leading to a denial of\nservice. (CVE-2009-4138)\n\nTavis Ormandy discovered that the kernel did not correctly handle\nO_ASYNC on locked files. (CVE-2009-4141)\n\nNeil Horman and Eugene Teo discovered that the e1000 and e1000e\nnetwork drivers did not correctly check the size of Ethernet frames. A local attacker could exploit\nthis, leading to a loss of privacy. (CVE-2010-0003)\n\nOlli Jarva and Tuomo Untinen discovered that IPv6 did not correctly\nhandle jumbo frames. (CVE-2010-0291)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.diff.gz\n Size/MD5: 2928444 765d0254f54d27d447de8f0b39548848\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.dsc\n Size/MD5: 2921 682576890de917043eccf6fc9398aed2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz\n Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-55.82_all.deb\n Size/MD5: 5170062 ef1a9c95890c4ba600a3e5523d49bb59\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-55.82_all.deb\n Size/MD5: 96386 b184441d2f44037554d037d217688393\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82_all.deb\n Size/MD5: 44742098 b5215eb163e357a179dbf36169ae1fa2\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 22350 d8934981c2fdd09168a5e576cc1b809a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 44768 74be7582e8f82aeb48af59731ce128be\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 2312 d464c76f98a4142add7a69aca1305739\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 36294 a65060e99feff7e2ecef38be6d92fbc3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 102366 04d59c868ce03dc83b69116b022735b8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 38892 e80a653bb000e86f38da594d4bc1742d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 49160 a512718368004f81e83063ea8972c871\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 176612 81ab4c185b3af1dea1a082283c1ec9b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 36776 fcb0833daefa645545a2451824094b21\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 142346 3e6446140bfad0b19c512c69377d8026\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 51060 a11ceed7ccb1b96c2a8b2e7f840061b9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 140710 e1789bb9d7cdd542a862e8ef209de802\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 287606 f3cc835959f215c209dc5a825596849c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 97828 05627ddbba40a6517ae7f8ca75f195c1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 1652102 c9eea2df3fdde2a5e7d2f4dff99e6772\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb\n Size/MD5: 872314 6e8f80e117e13665c95fb75593853d49\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb\n Size/MD5: 872448 1a70a906bccd7642241535f79feddb57\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb\n Size/MD5: 874570 0da9cd27666b58b5328e18dbc01c9b2e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb\n Size/MD5: 872194 375aad441654cdcd2338c5809e6319ad\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_amd64.deb\n Size/MD5: 6926870 c5868857ae3e12da5ffd91ec60d75501\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb\n Size/MD5: 20817720 06e066129d82d4fa8e41a2a058dcb9f0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb\n Size/MD5: 20798158 1e5bf064dc2aab9880b30448d06eba9d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb\n Size/MD5: 21635636 0bb9fd3f753b4dcedf70fa8f36c48467\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb\n Size/MD5: 19905244 a04e5f6463fe334c28598cbf13506043\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 15630 8d1da510f959f7b9a2d0aa73ab80ae39\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 240360 20cd65fa275cfe8a83743ddb5a95f528\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 202666 71d8be83541874d6c675945838b9e223\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 1048610 9125e9e6c294bb450e37643b3ed7397e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 1543634 ff7af4dcfc269a529f0adef3823a7244\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 161692 5623fa9ad6b280d0a5271917e89ca8ab\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 9832 bd5218587371f5b309ef2d1f77f98420\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 80870 20f034d6199d2902130f8bba12f48afe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 49294 e4a805200acaaea274e67995602294e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 35158 0869bee234a54b1afe362123606efe66\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 70890 74ad81f0209c505c41d61c143b90f879\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 6218 ab28cdccb61315cac14d9046821e264d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 9060 6b179cd944eb7f83f03147e09025e6be\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 57924 5465064d051dec863ad3f4f1a91553f6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 123380 18eabdae11c2d77a1694f0cd467107a3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 101078 efbe32714c0fed5aec8a70095af299df\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 79272 2fbe8585b11e0fa73fad8e94298082bf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 1595398 3e11b94ed4701d1d84b6aeb303782d97\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 72352 e413c3057779de1b3c8f0c4d8d7fb577\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 12648 41487d8dc828d7f94a5c8ed495f06a99\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 33806 ebf707126fa6326899d648786afa8779\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 138512 ff1e0d4f0e9c5efc7bbae4d92194da5d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 38938 75eb074224a6373013e621cdd5931a51\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb\n Size/MD5: 278876 1586e5c6fc3fedf7f63f19c35a4fd9e8\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 18976 940a7c03cfe47e9d0543f49849c8765f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 43482 466c625f614e3624fa548bc5f96efa74\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 105216 d45ce18fb4d9c2cf5da6d14ae69a86c4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 2284 de2293fa5c6e5493307a1913b606ad20\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 34572 4e302b4f7144fd504b2475a4103a3bf5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 97044 eeafb6c943244dd33659e7e7db9a9f76\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 37128 d4d67e516f236bf54a00697b71a3219b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 44122 1657e3520cbd2fbc832cf91bd6366a38\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 167738 7431ddaa7c8f0c9b6e583129cdc839f7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 33954 8251d509fb9bacd314f62cc90bda5b96\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 137972 9b8295fffc47ab4cf16ec34f7ef8b7aa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 46892 c12096744faa1ca0735b62ea045b0c65\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 133162 5805bb2e2bfab6158d8d217b08079cc2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 273806 be7956f256f494fe4f40e7e7129bdcd7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 102330 d6a81f9c342c0ebe2010b66d4a7c59ae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 1597678 ab989d0c749b837c67a2a839f139fbb2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-386_2.6.15-55.82_i386.deb\n Size/MD5: 863294 c444f51c8b2752c6a7bb7e6890917ae2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-686_2.6.15-55.82_i386.deb\n Size/MD5: 862506 1508b314277964abb0d05e8a274d2a26\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-k7_2.6.15-55.82_i386.deb\n Size/MD5: 863628 69ee54c68825997e29779c3a2ab66625\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb\n Size/MD5: 866414 fa045eb17626dde56b96d70431e9515b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server_2.6.15-55.82_i386.deb\n Size/MD5: 865826 30916e33e56490d9a2acf31c03690e64\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_i386.deb\n Size/MD5: 6918500 a2bb7aa892eb2d21ea3d04f519b72482\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-386_2.6.15-55.82_i386.deb\n Size/MD5: 21724666 e1390cea2d5e21dee938aaf3f88786f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-686_2.6.15-55.82_i386.deb\n Size/MD5: 22516786 35a5512e74cf490346c35fd56f695fca\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-k7_2.6.15-55.82_i386.deb\n Size/MD5: 22265258 07155a925272e66ace552f82d16b1b79\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb\n Size/MD5: 23626692 d229112410ce8c9c9947f2f7cd32c883\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server_2.6.15-55.82_i386.deb\n Size/MD5: 23179552 9b108d16a1fc1716b78c4417150e311e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 15512 4a2a37534dc2bc6b0ce12df135d07105\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 238510 544c418a7426a5248e33ff549c6f4035\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 197134 9ec57cc477f5bc4e0dba11002d3988e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 1048370 cd87ff58b5cbea9c04eac21cf1b0784c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 1741406 0b97758852f283e148ec2ce290e678ef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 160884 ce6d2a16b8a3af5706b694fe6f8ac4f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 9162 d5f4619ccc32c2ed8296823cd3c19e3e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 76468 9f0911cef3a4b7afb14f1bd537ad337e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 53554 afc415fd0a28c363579986fc48464671\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 33048 c710f55e8853bec0935df3338f2370c2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 85618 b6ed96be15afaf31e6670a78ff1f4733\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 6024 b0a622b932e40a7011d5e9ec9bd21eb3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 8762 6234ceb3aa1422433ee60ad4305c03e7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 53636 e1a35b8801fb949295040028cd2cba5e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 130970 25d88aae6168f72c58ca17584b3f83e0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 98468 ddb974591a687460f50c26a2e2682593\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 77212 a9ec9f2fe551ec07e56200b26f1de4f8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 1768830 477e2985e9f1fd2d4f333d651ce07e2f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 69612 2547b29a65a8391d3a085bbf2ce476aa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 11764 88566d97534c428d1ef6b01b5adde2ab\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 36102 10638cf7adf98d9afcc1e1475dbaf05c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 132672 fa6f13f8c0c0d017f50dc160bf2961fc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 38578 32976528861368cdb936d5db4fc0c2b5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb\n Size/MD5: 299158 458051a07217501718f6e2a742bec0a3\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 23726 0fbb9855c5833cb24187a701c10cdfbe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 26006 87108baca7e8450f580be0f6c77d95de\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 49328 c6fe9fa1f1e132f4906b21e555bfb079\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 51536 d2c7a02ac033097208c359312e95d246\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2308 5b98b064d0e5c18d8c32caa86b2e43e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2482 3c964c577c93d80cee55d06e78003951\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 40306 ad5c5c36d7dc08add999f8cf47d53b72\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 43848 0cfb559dfe56e4a50c99537f98392827\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 112606 9994a8d2bb1c9a45cf43416faca7f9fe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 120734 092bb2c1dfcece144429a277f96b56e9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 40906 84f84dc75718a347eb6623204cab6209\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 45996 69f5b1a8a9e82414d868ae459109f32c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 29024 1a12ad8c384bd5195208ce7eb478c011\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 29892 4a807f384985ae3376d509474716f13a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 211398 2e302e02bf08226ad9bf45c3a04840b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 225174 0c4edfa7ccdb502d5aefc7b02a2e81e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 45054 a2373aac90339698b2cba11e43978565\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 40220 06b0e3234fd6b0125df72fc04c4d0562\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1934 0887612df6acbc867949c33251427c00\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2198 d38a4ec22579275ff2f48805be734356\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 80760 0a71c80867de5b11bd73c9c6d2751448\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 86134 0531dff0f43a6073ae4e71e93e1d77ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 111580 ab42bedd2a1e1687015d5b6b4b327484\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 125734 3c526ccc2348c1f6dd65829c96fb1381\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 53412 13f7a9a412c8c38c4a22a0f4db2a2bd9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 58486 0a62b4bc8aa5f594de9efc6b9f1dec6a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 147964 9751a30ed03bc5bde2b48be1e5dce6e3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 161908 70564b18529d383509cb4c1d4898425a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 318412 7944aa213ac28d37d390b48b3d5a9a8d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 288032 2b93681e1b268517863ee4bf27ba0899\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 115862 3cd4a494b7d9652bd77eb9dda6d2eeb9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 116548 a40033c7a63dda0aa5911caf2dd7f49a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1925072 2c1fefed78a6ebc795887a2f27c9db4e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2449126 39606af1d24872f0ff053ef5ddf790bd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb\n Size/MD5: 872990 d1ced46d4302cb78b2d47c5ea678d6bc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb\n Size/MD5: 872596 8602056ab95806f02667587737cb3b59\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb\n Size/MD5: 865624 336f5e63d1fc8a9f55e7e36f4177f54a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_powerpc.deb\n Size/MD5: 6947694 9ab99966a30e44788549998ae0e26798\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb\n Size/MD5: 22783922 2c7ace12a48de978cea2e7e939c3c900\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb\n Size/MD5: 23693062 18b76996711d54f91edd68a52b45d666\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb\n Size/MD5: 22365356 f8a73866c9b4334ace774f26ddaa0e38\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 17782 6a4cc5fc57579f3f602f582acb1231fb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 17386 1abc2376b554610aec23e87f60998358\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 261350 a2a6eff082f29827c9505b45dee47f7d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 282620 93ef7729a3cc9f4639e9d34c8782d8c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 227808 73c5142c206284bb244b59586a93d8b6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 248952 d0c1d09bb0b125ae113a70baa7a06cc0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1048470 66d28a86b670f1166faeb1c25a1547ad\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1048600 178ea75b2bd02ef3b01c4cf940b6a713\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1738490 8fdc1918d06d76e358e7645e24d763b5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1878020 0b6e4cc3971bb034e26a3aee110cbc58\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 250814 c48a5e0837fa30e3b1480c113c02d963\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 233524 676bf7f8905001fea721689f23ae5f6e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 13054 73a21ffbe4470fe4108886ee20990c35\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 13528 1105da0ce6deb9d13a19e8b6398827db\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 84794 ccbc384bd76aacf39ac078437d709d51\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 52204 acd012d94fac6fd62028de4920ff5a67\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 73922 a2d1c6a539934c1a852cf0b2c56ada43\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 85854 59c8914383ae0624690950d8f844c101\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 6624 b926e6807098f087b5eab77015ef1aee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 7058 43cb29678a86a4ace2a784ef2c2e8843\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 60378 183583ac6a0ab738109499861a861ca2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 70420 da9263ada0b850362f022c36b6769f22\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 128550 5eaff599374f099cbb06bb709f1ce68c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 157944 8ef2e5efb4749e8e1725c58a185871bd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 108166 1a09b1fb98eb414ba847dc8634a28a62\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 126130 e2ae3a3d5d06c8e6a5394c2262381438\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 87294 610a552fd6a9c960f64c8ed4a74c5b39\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 93362 a7434712a48c99eba3cfd1dcdf4db489\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 2014708 a089ebb3c11c6fd25f65c069adc4f1cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 1988690 049558cbf765292686c49fc8e180ca0f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 104130 cfa3ef8f4085a002160c319cdc9899ed\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 115790 ac0661102201e3f682eda1052d987671\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 12738 f683a291e68f38a5c2785aed5452f77c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 14444 24e22f4de6be23c1fe122e8c3dbdfdc0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 39950 b8aa9421b4aaf324bc7349b026e3c30e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 41540 c174de599d57427fbbe0544bdea28cf0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 149344 f742184c85574c83ec84aa70cb9cdfea\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 168082 6f375034031b861fe42ba973c9390ded\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 42310 e24ddfc7d97416cdca5325a9ce197781\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 44918 de0152b64cf3da754a73ba952625e15b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 320326 87594e9f43ab0dff57a8ae731be77dfa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb\n Size/MD5: 324872 a53f9d6f2e8118894b3c5ee8a98b7441\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 50476 aea13d5d96a87d5b3a0cb897605f8226\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 2358 b0af3cd8de1581e95acdba1dd91796e9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 40380 c083f0781fb33b64329d10c233affde2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 110556 cea10ae3446945f5dcc6b94a8050b4ad\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 41214 b0728ed58d1e1a5bcc4309849d773e91\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 104224 54844dc4f0225e051453b6a01934edb3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 7438 7cfdeca11c465cea2c2e8d768b39969e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 149304 958f0b630326763cddddce5503f3319d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 1712530 f967805acb454413bbcc2f377f5b3e36\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb\n Size/MD5: 773010 979da22c264d122841ea140319b365ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb\n Size/MD5: 772604 3106b0711e0e311f93d92624247f1eea\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_sparc.deb\n Size/MD5: 6964184 fb615cef69d2a79b16cfda4b67bf4e50\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb\n Size/MD5: 15017856 479231852577fdd0e402556287a02059\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb\n Size/MD5: 14831912 1bd18f6f1ccc6b70379e267a0173b9bb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 7436 87e52fb1ba93a9e9763a0f3984bc15a5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 248758 bc3db8ee9c85b0aaf1ec03290ae41cf3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 212566 70a9e482f9be5074d90bbd4ae5cf1246\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 1048480 c535170499441feef6ef8b3062de2d30\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 1482394 247faeb24ed7d02526dc54dfb194dec4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 10118 28a82b2b4d4934c028952b17676d515a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 40178 d44c9cb160749b87062ff38c0fc11340\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 9370 c7d50aabcba6ff111825da92f10dd219\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 61398 df892cd2f9e118248246eb7d3c273df4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 163276 481deef18ee50e039791747737619c3e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 64096 9ebc582fc849cdcf71ee887937313a22\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 1235396 479e0c0baad9c8cf96fe44603c2fb9b9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 59308 83efde441d0de3f09bb163e53016a300\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 37430 3646c295a3bbadafbe6df1fb22d8391e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb\n Size/MD5: 280132 311d2d465db827f3e3f2e95bc265ddb6\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.diff.gz\n Size/MD5: 4747158 57102623f2993049cb4d309f75748b5f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.dsc\n Size/MD5: 2689 3d66528dd1a11628dd0e2ec5fadfa2b0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz\n Size/MD5: 59085601 e4aad2f8c445505cbbfa92864f5941ab\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-27.65_all.deb\n Size/MD5: 4930936 41797a4c4537dc9e4abb06f5b811a6f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27_2.6.24-27.65_all.deb\n Size/MD5: 8146690 ea0f32ddeaa300bc68f90838a6466257\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-27.65_all.deb\n Size/MD5: 99216 bec450b038c03760a6f369323af1a0d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-27.65_all.deb\n Size/MD5: 46970850 cadaea7041848682d5e46a181aa43fb4\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 28614 de37ceb847d7f811723dee03e7fc9ab9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 224184 6b392a2ef779b2048c78f46c1e833e2f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 52646 2c736bab70f1efeade320f9062b74729\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 40644 a6209cbd666c38e1c4bc75115fda79f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 48646 6affd584126a9ecd4d3560dfa69a201f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 86332 097b613836ca5101cd37cabfe7299adc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 36316 f3915273cbd0e4a218a543ac525d7674\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 648728 9021fcdfc468efb5a2994dab918aad7a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 209928 967a98f6cfa9c56dcecbe0872e98b617\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 39194 5ad172f156b5e2ba43fee3a69a09fb49\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 67996 9ca474a40f4225116d7d9befcde4dbb5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 145458 3e087634d61556643c32e342214a0642\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 287262 202933f0bb0a3d09ae278a991139eaf1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 2130554 f0a40b4f0002803063b074d4b2b22775\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_amd64.deb\n Size/MD5: 673974 3ee01bd889b29b761f96eab35f839815\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_amd64.deb\n Size/MD5: 1252948 e0734c904a26acf9daadc8dc13a5331c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_amd64.deb\n Size/MD5: 1274832 4784ef460e510677dd0c62ba0e5d75a3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_amd64.deb\n Size/MD5: 674092 b2b2090661ff113ec00e1b08627238c3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_amd64.deb\n Size/MD5: 1084370 ef5cd734b586855f7b94d5b93bb51c42\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_amd64.deb\n Size/MD5: 17809172 46d4f01f3cb62fc8c006c25d291bdbde\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_amd64.deb\n Size/MD5: 17781410 589743282c76d9ae95751cefae7dcd1f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_amd64.deb\n Size/MD5: 21055946 71c5ed78b283260aa76abe43a5199869\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_amd64.deb\n Size/MD5: 21440010 76e220b0a64e1b1fb76a54aaa5cde808\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_amd64.deb\n Size/MD5: 707586 4d51f71c8ac5227c9f02fbc0c6552453\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 263678 73ef23d338fe298802ae13ea52af05a1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 176420 0709db4bda579f5146063e7bedeef8cf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 254102 7b20912de5e61b0206319019c4800ef1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 1641364 98d7399720bae5a9d3e1637cc6f13ce9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 143718 419053c97211aea3dd9b2aa0833bc6bc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 164466 16e2d4ad08a10d9e9d2b33dbee4c08ba\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 115858 74f2c34acf328f485356f38e86eb6aa2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 35056 5307b10f96b76f43c0bf983007f36021\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 64412 7cf4750ba6f0dd63678eae705da55fbf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 69706 dedcbc58256ac2a43ed625eb7cae6e81\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 21598 6d6c27b8756a70466451449e096bd149\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 8622 4414757aa7034cafa1e98d8bacf080f9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 57232 8690d6c34e1ec87d85b2c20cb280acb9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 103044 73c875b66060da7f1d39f2a5f8eecf36\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 1212518 6e237c8e863f3cea5cc702afbd925b77\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 45500 1883d8bdf4ed7b2aebc1a407502bd556\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 12780 fa12802bfa4f6847c5409d4882e9aa9a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 498032 d5e81ea5e16357ae1be8c0ac77685256\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb\n Size/MD5: 75048 24c6c2fa1972611542270d68ccae59a6\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_amd64.deb\n Size/MD5: 19256730 d7f5e8ae9464748ac2a6dbc46ed9f1c1\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_amd64.deb\n Size/MD5: 17909990 e4e3916570b7b5f06645d2623111b0ef\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_amd64.deb\n Size/MD5: 18911564 fd71e9397f8919af683848aa456c885f\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 23690 ceb5d148f00965516252470b41d00b56\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 26794 50bb7020338de7d00265de0765578291\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 218818 a3b52dd67e9817d4e60d8b048f542717\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 220482 60bf430685f9b39568dbb078edf6041c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 51932 f708bc6cc86f313031745601d3d31aa9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 52068 bd20c8c1eb151b2b8d989d5081f8386b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 38326 aeea101daeed1f87bb30f67c4011d737\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 39080 b8fc6fd4c6fa20a8cf2a92e150a1b969\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 45990 9c06ca831da0f4183ef6e15af4e9b3cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 46170 8d8cb61faaaf267e135ecd2844afd195\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 83246 6941b39723fc655f7dcf2846e5c8a47e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 83662 d3f22aca87d23a99c75b3e6464eb22fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 32396 402518c87d72b3dfc41656de51ebaa64\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 32672 7135f346092b651dafed111b91aee44d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 637694 e32a7d7a367597e18b305f6d97b93630\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 655982 7e8f7f69c261eaa0ce58ddb865205698\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 209878 1ca7ab42cb7cd39e37e711fabaae8b99\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 213640 bfc69b0b0b29485a95605fe7e091dd5c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 46544 90ef4a74882d5770a3f7d888ba288b35\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 47602 e55422dc48484675642c96bdbc673595\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 62270 cc798227f68e2c8c1d8a54b03bf0058a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 63626 a2d3587a68e63d2cf90e1cd3790d1079\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 130538 c07adcef7438ef51821f9a8b750f7973\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 137028 068fdde4394c7850abba6ea81e69c801\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 279080 76c07612b0081c38122b1929c7f19f34\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 277690 c635d04d78592fe9792024e84682ccc7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 2012458 d372c1d872861cd7c84ea9d06c4e8162\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 2089276 69416120cd161789b598b2b93034db07\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-386_2.6.24-27.65_i386.deb\n Size/MD5: 655314 4adb56a8d5211bba1acc02d76e9fb65d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_i386.deb\n Size/MD5: 658154 7d6f7bccbf83f9a32664588ab5faaabe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_i386.deb\n Size/MD5: 1242098 c22eebab07e9ce3d85526ce2945da263\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_i386.deb\n Size/MD5: 1262772 85fe04ee16e27b961017cf148c4f1d21\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_i386.deb\n Size/MD5: 659870 a3ebd23356d57307d124b62faf3fc2a2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-virtual_2.6.24-27.65_i386.deb\n Size/MD5: 561726 410d756762ce992d36864ce38efc2e1d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_i386.deb\n Size/MD5: 1059932 350947cab60fcafb13483ab14ca0ff95\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-386_2.6.24-27.65_i386.deb\n Size/MD5: 18380540 1da620cffb3b62617fc8213134b951e5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_i386.deb\n Size/MD5: 18401264 dd7b7991e7f843ebcae7bc5c8700636d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_i386.deb\n Size/MD5: 18513796 c8b5dac38c445a72681bd5dd1c9a1f98\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-virtual_2.6.24-27.65_i386.deb\n Size/MD5: 8730742 fc3305910b00833b509a4e34199e4a67\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-386_2.6.24-27.65_i386.deb\n Size/MD5: 25540786 ce01c05207f08195efd8b88b83a93549\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_i386.deb\n Size/MD5: 26356028 ed8deb0b2243fd649476c43d245a9690\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_i386.deb\n Size/MD5: 27372622 d07e093dc192ad5a49be8c45b5c85dd4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-virtual_2.6.24-27.65_i386.deb\n Size/MD5: 24872642 c28ebc89c9a427352186dea53d81ffe8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_i386.deb\n Size/MD5: 707576 d26794effd4e857da1db4d28e9407611\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 258852 b86f8c37480cbd19131432c908013dd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 264136 631fc78981097e46ee5643ec3cfc5616\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 163268 1c98e7380c4f80c461a6181344914fea\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 163034 9cc84b270528d0fef36320974b415392\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 236710 755a3caeceece8650e46706804c6e072\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 244984 cc330be20f314b308aa0fbcf95c0370c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 1810274 169e24dc79c5fbde1ca1a2a5520286d7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 1827436 cf166d9cdca76a06fd78b1a0669ed67b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 150836 169c287e6bc754d02924a719d34aad29\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 143018 ee925199234ec977618a5c3c3b03954f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 156072 9ff98bc4b62d033785de95858201c353\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 157158 75cdc15de6d5bdc90e05789eb00fe29d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 107222 37ce3c67bd74d5040aa4d22223cbb486\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 108526 7e50df25fcc29d44c2cfdc3e5c046a66\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 32958 b1b4b1a1b95db3b09923a39eb42c28e4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 33388 860c1b56a45914246929757c815f5ec4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 60694 99aca1f49a5cd919f85ef1600ca757ef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 61158 bbe05be947e606b614108423a7ca0b83\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 82652 8ffbf8ae116bd81b7632e2e3a58e0a76\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 82954 1532b447c1a1cc43d1cbf46b1e14020f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 48562 d2569ab07923f67de18ed6c63940351c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 48452 dcf73534ccf880da82f6ec8bdad54db7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 8192 2c3bac93f50147f7f67fffdcbb601b66\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 8444 375a2103e5890c501433ae5b3d912fbb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 51104 8d242482ce8adca7ec8f5d0a40c04c20\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 52950 8449d644f2a2455da01bf48922757fd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 92156 232f32e69ea0f4daf4a17ad68542e45f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 92446 6525df043e2a865a6eb646f015140e31\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 1443710 2746c7d1f27f2638dd6f141c5d7e68ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 1427036 d049929f20e6cbec8c7338977af873a7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 43240 53538a90e2ae8dae72a91a8aa79ecb90\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 42806 3b1d48b0e38b9acebe7581278a8e0408\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 11402 83264faacaa7ff9c249144d8dd0061b0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 12016 7e17c39f818116eae09203af5f5dd870\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 470484 bede1d05dc08ab51105feaff29b39093\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 472422 d08cc1bf2e88df1908f35afc77fd696a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb\n Size/MD5: 70518 751bdd069d86773b5a3cfc67a09b46a4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb\n Size/MD5: 71382 3aa45fd7cdb245416c60a2210066a353\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_i386.deb\n Size/MD5: 20248150 fad37a976e62eb5c73f906fd44070b5a\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_i386.deb\n Size/MD5: 18543176 2f3a767f3505c51ebac878d921d3f3d8\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_i386.deb\n Size/MD5: 18782962 8a5a3287d174aa7fd1cceb71be94f347\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpia_2.6.24-27.65_lpia.deb\n Size/MD5: 639434 d3cfd21a90ea311f0b1efa2ac28dfac0\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb\n Size/MD5: 705462 81a381fb023a0e0074d8cfaa7fca88b8\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_lpia.deb\n Size/MD5: 707532 c6bf8f82d8bbc4e2320343f58629a562\n http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpia_2.6.24-27.65_lpia.deb\n Size/MD5: 14516344 29b153dcb44d72c1e5862191cb266c6b\n http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb\n Size/MD5: 19816106 947ff90add29d1fc18a69145f39341d1\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 334046 06512921aae848be603af54dc56f72e6\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 318530 4e8164b49e3ad90d33c9275bd1c7b45d\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 62718 e53308b729496be4a0e343535769c74e\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 73002 10bf1560cb8abc507ea079f6a495f91b\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 41442 a9d6733876fcf91a271eb189eaffcb37\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 47826 1d54194b81d12ac7b00b910f625f7a59\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 89506 1d66e8fc56eb6437f783cb677e6c7061\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 105746 034c14e0418581e1b8b56913246e96de\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 44824 5430e2953cc84d26fd0c8e8c4e323a92\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 40932 93dc2a167cf8ab1d80426dd296997295\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 704830 ef370acc49192e464ef553984e361d88\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 770960 ac691fac4ab28cb6d9627fa6b7a5b773\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 243328 b280fefee27294e988529239616e68fe\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 246310 c1d7e140ca2ba026b6a168c6c9748476\n http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 69160 665a09e07612701e5c6bc7efee856e5c\n http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 132586 f0e732beade4d5154e887aaa1b1f3625\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 70252 d8f056e2c9d8aabe9acacfbe4e6c9de0\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 77462 d69a84be1856d83b83faf1fa820803f6\n http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 146272 11a1d0911e3fda9667661975972e08b2\n http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 165002 c4276844b0ea79946508c0cd3a816541\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 387992 53b23049b6f79a9609349927adec3443\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 350468 694a94354856e10bcc935e2a7ba38a51\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 2431460 3a8171d7d1e7e6b37573c6679812d2ae\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 3473330 1037b52b34e3b26b05f68bfafb48850a\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb\n Size/MD5: 652854 26483fb509f744914f646c49eb7b4d6c\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb\n Size/MD5: 657530 98dd4c49966d886237bed19fddb84057\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb\n Size/MD5: 652742 c9f225771751b175bc9a3d1ccb9b2b91\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb\n Size/MD5: 20175388 98b77e06737b717f07a9f436bf292879\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb\n Size/MD5: 21378902 be6b07df3db6828d5d795954b3ad3c49\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb\n Size/MD5: 19948474 1a42e203300936a0a6bbd91270ac925d\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_powerpc.deb\n Size/MD5: 697738 b5f3e2a2bf27249b08f44ca708c75305\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 266748 d71a805e23acc800f21449d312975e04\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 307732 90c6243c8802cdc121bdf92145f7dc17\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 192250 b114447f81aee3dfc51a3c40f2015d66\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 201688 94056840984e621b385099d261ce2420\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 272012 b6790aca1401ed43b8c04befaef9af51\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 306006 50b970f3b69d4eda6d3e59353c9db152\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 1807766 ec7ddb35df35bb103f7fa00168c827cd\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 2119612 ee4db3863509964860b0a24a9a6d5951\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 235186 b6a1a89f7279818e17cac5d5b3a8b86e\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 225404 baf5ea09bdbab57626dee3afb306a39b\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 170438 b6bae0ce9350745a5c5ba8d969ae34ef\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 199752 9d4225f0960410c78279f61aa02471da\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 117942 e88c2b968d47d71ef068dcb5abd4d9fd\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 139272 5f4576b20a9dc27976d521d0942ad0c9\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 45372 918120c1bd011bbbb8b95529c0978f09\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 46836 10f5de3e02406e28d373098a6613860b\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 51132 610f6b349ffcb68ca7f58dc7928a7558\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 60292 9b17fdf2d2aa9cbcfd3dbfb1bfc3af41\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 74186 053cc99e1839e95e6e48198a187c3e48\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 87220 b730de88a2ee8d0b1503d2ee30f13e69\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 76092 0a6aab3a33606ec7e97d474de29a47db\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 30230 76c4d08ce66715d75db459c89405a0fb\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 8486 80580934d5e5f6909c396732bedf2055\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 10030 4e52e0e6b321b919404ffa406ccc2da1\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 57438 24e1b5d61bcbe2b2faf9f31d9b6f7d3b\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 68746 1b541e58e95b8022b84e7d050db97ecc\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 101184 97ff0fdbf93ef2526b1a97b962592e37\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 147834 eb62d695f6da016ae938924414bd15ed\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 1565722 3bf6b2bd7ef98c403f8cedf220978814\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 1514590 307c47dc707e3c96384e6ce043c745be\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 76672 863a1d5aaef2e7d8f5ec43318a2b3f7a\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 85976 b6bedff825f704ceb1269488d698bfbf\n http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 12702 cc2c9e83433b8f4092748b933292a46b\n http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 14560 60c8e6f2c5425b8bfea2cbee00dd50c2\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 449632 ff75fd65c13af279e6652e0d09505887\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 504134 364077fbb2c074eb8852249a757b89ae\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 83682 bcafd92384fdae95293c310f83443303\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb\n Size/MD5: 108840 2254f5416b8a0cd8d1cd52a57d7a064a\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 59570 0a8a1c6f109f6620c74d81880a6836ef\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 71732 e29b3839ae80a5cc8b8ca1756569e0bb\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 42454 35c72663f93201098e40f0fc36232ccc\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 91776 d7f14f387c9d325ba87761a2da581b5c\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 587190 a4606a71370a3dec9dc6a3aba35ec115\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 171076 2f15afec1e2aa78035659ac46b010cb3\n http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 22356 aa2c6396604a45f318881df2e562f625\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 46058 5633652b0f71f9e2098ce2798e29269f\n http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 152976 d7cbf92b5ae85f379d0335c693ccc256\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 2135270 f05d76791e5538fa887f7731d170dc58\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb\n Size/MD5: 565588 5d632e2a56604e4feff30e310f17f024\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb\n Size/MD5: 563928 4b591c5db77c0f5bc41ffff32a14ee31\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb\n Size/MD5: 14098262 0170c4f2c460270add65ba17eb7acfd0\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb\n Size/MD5: 13830862 e4b6c695ad5b3e4ad0b428947b4fd388\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_sparc.deb\n Size/MD5: 752654 6e9b50c2f72a60edf4df6e51d5448cc7\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 270064 879ee6667df636551d565e10ae5162fd\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 190360 388a92b9849a34e99f6a3d2817ca9b05\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 263030 82e8bd5f9f922af935f6f787942f4b2f\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 1386520 98436d21f7255a6c923b50900bd2de4d\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 175444 37239b1899dd449d5b4985163c46d678\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 122106 1b86f75278b7fab22bbffd2c0010eef5\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 40398 81325db98acd64573c100455f0cb5289\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 48060 dd1b8744fcecf5959d2dac4a23b8cd34\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 8698 a2a5a2941546e0137d8c57a38ba9ab2f\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 60516 08d388a60ac9be5c7d80d479f94fd4aa\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 106838 b350cddddb73537859dce8203c49ac1d\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 1002034 0756e59f467bdefbc26dcb06a6201457\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 9518 7bf2df83ac5364fef90bf13ea616e7e3\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 391514 9e98f9f4757387d261d6c7a1e8c7d61d\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb\n Size/MD5: 75924 b375f2838ce3f024a9f2b58d02f9d98e\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.diff.gz\n Size/MD5: 3279295 99a1653c9f3eb96475ee9776faff3701\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.dsc\n Size/MD5: 2761 3b7c2f9d1b970a69db9a1c2c2bd5d95c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz\n Size/MD5: 63721466 482b04f680ce6676114ccfaaf8f66a55\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-17.45_all.deb\n Size/MD5: 3492310 1dbaf1873425d41dfce3b359fc95728e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17_2.6.27-17.45_all.deb\n Size/MD5: 5906568 e4cb3deaf39ad7c3917d33f0f1082a40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-17.45_all.deb\n Size/MD5: 52050112 2852d57c251b525e97d6ba66a94f1be5\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 36530 ae958becd299698d5f30f722eb07cde7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 265218 1de0174009daaf9e0d3fb8f8e737fa40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 53438 46087922e5b4128b6a5f52dcacfbf840\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 43030 e25c2b8fbd4f46654a1ebc6089ef31bc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 52344 4c16a22c0fe8f2a967f1503953ed5f8c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 89844 4cc23c275cc1fd6621ac977881b91345\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 38180 24f5566a9c89334d394fb48d7c3d4949\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 677070 84220f4d0562b59edd2f0865120d4494\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 158618 edbaf560c5847b8f520ad94cd3f8d2d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 46346 90f299bb91f23a67e0811ae8e0472e70\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 154240 3ccfee605d2ef5a5e87aeb71320b337b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 313106 896f96e4eb01ff9381aaa78b6e1dc72d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 2604320 b50756ed8aeeee4a72873b8c60df10b6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_amd64.deb\n Size/MD5: 663304 ef966b97630e8096fcf279d6c43b3960\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_amd64.deb\n Size/MD5: 662184 599a4bf3bad78733d35ad1b4a5601a25\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_amd64.deb\n Size/MD5: 23073032 96da11b5c1a75a1694b4047c1a71b091\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_amd64.deb\n Size/MD5: 23071096 162a682066d9c7d90df92c975698b2cd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_amd64.deb\n Size/MD5: 10479836 39042ef6e7f9049837b4d137450dc41a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_amd64.deb\n Size/MD5: 675844 3d711e518906ef37120bccabeaa1da2d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 434926 cc27207ed63847b17eab47e1978c98fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 186500 940e6b351f4975369720543184596a04\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 275594 b525586af57630fd8b4e098cef404ad9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 1810688 13f3abe5b38ff8a704c985dc8f3275b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 151324 d883249df4fb86d6d9d1146db5fa1020\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 194282 ee6a6162a8b0615e73a89978fcb9d172\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 168150 696ed64f02936c7200cc9a468302de40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 36428 ff94b9ab68b2108fd9d1d2475c211725\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 83436 3dceac801e8b0405790e1a28c960183f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 71992 2b936af85a4eceb6312ad7ef93a18c88\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 23240 1d34a195f16d39f7895a2bf36281a6c8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 9012 454b1c03d70fbf4a917ff2431b6b4f2b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 68544 cd2e39978716c3448e54d6862877957c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 110302 ecb1005946c139f2340aaee3e80cd152\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 1276186 d93285c15892be57cfb76798c746f88d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 47602 d2039335dc8bb4104fbb473b5ada0d96\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 13480 5299f432e2db456a3e0743fd786c18f1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 393936 83cfaf207498b9a60d4e97cd21309095\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 200806 5dfbdf4ce61cbe469582c94509160a42\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb\n Size/MD5: 13614 c860448fa643364e8776a4947cff9714\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 33948 74da15b4b68dc6a03f2da65175b021bd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 244732 aee21df42a017731c52c53100cbf2f20\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 55398 f4d1c18a70aec1e3e39572c36318115c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 41206 42a8188a1ad868fa58aa779b31908d65\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 48698 7e06c0fbdb39f426e1259d35e8f1505e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 86942 49099dad48131ce191b10c154f096d6a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 34064 c8cf2cb88451687abb047df2faae44f9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 675492 3e953f324652ef7a01f93aeaa2dc5e55\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 158402 aa593e2736e7b717ea8c561b1e11c27b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 43624 b2ca8774a7cf447123ea811781e80dbf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 145226 0fbb95dc0bc59baf91447250f19e7d45\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 302390 991c8e4ef2dda71d6deda5599129a768\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 2436572 4b845d0a28c2b48ad0c29521bae3a0b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_i386.deb\n Size/MD5: 645046 28f8ea5f653057c350d40feb64d68f2d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_i386.deb\n Size/MD5: 645340 a4d347f729beffbf9ff1701d21a5f9b2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_i386.deb\n Size/MD5: 23499764 59f3275c547e9f13f97eba55955725f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_i386.deb\n Size/MD5: 23635906 c096ba5db0db8b87f67309a9e9c6ff5f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_i386.deb\n Size/MD5: 10117090 7e1648c7b3a3ab2606263ecb20683ba1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_i386.deb\n Size/MD5: 675850 3e91710602fec2d4aebafe62a6cdfe80\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 433078 d1439530f50069f41b4c30b010871b4f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 171298 68b786d8853574467c792efe3fa62ca5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 264104 3a49c641e4a146fdb634b298c51ca6e9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 1994518 105c6b0fb8b650949da502f3fee2018d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 150964 dc4178cced6d9c1823d24b2204c15ae9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 184058 a25940b16b7022a52f7b8c78e164a908\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 157856 c628cef1c909819dab1fe2d812dffeba\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 34500 2ea55d8e77aa3065af30ff4d440c059d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 78286 6d0f7704cdff848dbbfbd5fe60cf0ca7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 86190 c7d8ec25c3d35ea8455e9cf7c1b4ec64\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 51332 79b56b5e7f79a17d45fb7c55f64954b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 8796 e571105caa3bed5fc3576928b03eff31\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 64316 bcb0f12340567e9db7a5dcc3549dcf0e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 102092 a2556a5171c52abe48ba423b008c6f13\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 1450234 339572f5e579468fc438b1dd2cc2dcd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 44520 68267a8c684d01c673d4b41bf5d4af69\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 12642 80e228567fcb814cd67e54aec6abdb41\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 373158 483599df2e1b6c82a688b413b74e5b91\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 189720 156d822da222b7fc8b887a4d1b3b7c31\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb\n Size/MD5: 12992 7232aad22eb02ec694fa0d41d367a69c\n\nUpdated packages for Ubuntu 9.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.diff.gz\n Size/MD5: 7350773 c09bf21927b9609694b39cdd55af21cf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.dsc\n Size/MD5: 3198 5ba9f01bd70b951901d1d1667b964b54\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz\n Size/MD5: 66766084 062c29b626a55f09a65532538a6184d4\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-18.59_all.deb\n Size/MD5: 3636694 05fda32db7067b32c0fe593e1acf0533\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18_2.6.28-18.59_all.deb\n Size/MD5: 8701396 65f8df38ba832ad50c6486d22420efca\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-18.59_all.deb\n Size/MD5: 56998214 3d33148ef29824c1060e1f66b470c6c4\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 234600 929bceffa24f85104c08edf073ac1f0e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 44110 6d94c9d8ecfe3b4673d25cce1db2b95b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 43316 d895b0ad91a70c9381fd7e17650fab75\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 51116 da4c61dc01f5b5e8fb61cdf14bbbb40a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 90082 dad217572b5b07064b9e12b0062d16b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 38016 5e886058b306b4937f5a4ebe22451db6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 521628 d9f3ffe45b307847935002619ac31ea0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 125818 6fbc3c76a739b91e01da41bd535f3791\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 58060 cc30f23edae38f46b0d56f621969fd62\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 312502 9a11c9f0f37fee6a92c59de9df5fca11\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 3872142 cdc4640244b192a5970dfc3d3efe4d7e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_amd64.deb\n Size/MD5: 689228 bf7aedb2bbb365a73ed77a8976a2701e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_amd64.deb\n Size/MD5: 689122 80cfc63043a2d7231f86ef3e68f0a131\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_amd64.deb\n Size/MD5: 24344078 dca923a8044df0ba9c642d5f2b317867\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_amd64.deb\n Size/MD5: 24335914 ad5a4fe70b4555e9399f9a45b58459f9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_amd64.deb\n Size/MD5: 10551276 b61ed90bb3d3f19f0d2e593c0e9f091a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_amd64.deb\n Size/MD5: 766282 f86ee0c95591ea10b578e848b6fdeb5f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 215170 7939440a8813110d952d86b49113e146\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 189496 f7495840a58b11f4ebfaad4d8cf203fe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 29412 54845dbae313e98befcc172b5e87ac2c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 274480 e029f99b6550bd014f26c45997f76dcc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 1933908 6fa450fb440effd7f4a1d643f5e80ab9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 163464 208a84b0506fcd9cadb25f1b7f9d26b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 194828 596399bbfa9a92e3116c8f8d3a7d1391\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 152994 3cf4fb6614c5798cdcca7c8d7fd04a5b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 36486 b3cf4deb0dc4e11f095eb9bcf81546df\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 5842 085134ad282a8b2580aa12a6ed64fd9e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 72152 5b6bf270db5279c7d79cbd5fca8e14f6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 22714 a01ded50b855c5ed0580072a2277b74a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 8874 f173072403f51e6e6da399debd91068f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 47442 e822623d7e4ae0bec0ea5094fed67dcf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 15656 2b2e6ad08af592fa3106adb4eb16324e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 1273594 d873a895c58da3fcd5b8a0ea91f9a5ee\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 47204 c80f48bd49fddaae0188cf56350445f8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 72706 dcc76877eef3af00d0280f96cafb6e45\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 126958 b184498c9d2a598d57e293bc09049cda\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb\n Size/MD5: 13472 1399e0100a81d92448659b83949a62a6\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 215860 fe00a3406a5496e200d5c4e5975469f0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 46662 d7a61d1e363f9766795132d3325f02c4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 41352 7d84e783cf7fc4111eaf964395440369\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 47402 2cd024da2955f7e35fe4519c8df5add5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 86924 515a3a07357e06f49b2e4384e2af7b8c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 33578 452adbbc84f5a5218610ddad25eb3ea0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 525752 1a2c59458472f4a18538df9386396703\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 125654 8678d7c3409daf24a373b4d11a0d9263\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 54874 94d4465b06d14b20af5803f2afddf53d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 301338 64a58b9a7ee5d53c2d1a486fe32deb93\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 3746292 099947b9ddfb625da14b96bf1b9f59e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_i386.deb\n Size/MD5: 673824 c36739d12d66db8de4b6e270b1c91464\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_i386.deb\n Size/MD5: 676398 c7091523d59d0b1cdd4453e12d5983d5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_i386.deb\n Size/MD5: 24662186 cfa5f52488fb3767debfefaf8940f6b5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_i386.deb\n Size/MD5: 24777004 b524e2b45df5e9d30ebc81717b5c62d7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_i386.deb\n Size/MD5: 10250016 09b9af49da34304c1dd280896ce9c0cd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_i386.deb\n Size/MD5: 766288 4858bc3941dc0e545195c0b911142a4c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 218106 f4f03360ad8e2ee23a58b534e8a2c045\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 174922 fbc6643612c01e91066a87b6ec9c7125\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 30064 c8e4db00aa9c0c3b75c47c103d87b4c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 262814 794c683379e359de14db8806fe984f78\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 2110070 da3e69dab278584e1abea5ee15d9b47d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 150230 7fc91b8ad535bfb705ba2cb2fc9ff57d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 184326 e505e555ac3bd0c33d00a47f7530f78c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 143584 209207f7e7887594a9d55d17bf1dca76\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 34576 cafc0f5f2db11f69d10e75815d3e9018\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 5504 21cfbb5c1aa4c8d82bf3e1412646263f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 86018 0dc7720bee90887f4ebf5c71cf93d611\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 47636 fbebe71b83526192c08fd6d797ee8cb1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 8714 14ed52e8c0a75151dd45acf3cb1ffc34\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 44692 27502a17d5ca35cc31a9fd79ae7d2f1d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 14780 2c9ea91e8d8da2bff76c38a6cdce748d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 1445966 33fa2ee03c566924552fc5b413e2ccf1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 44098 f740dcb377a692e2ff25a65424431e5b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 69290 a7e3130530005bf8fe4edabe8b003888\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 119528 a12c1a5bf9a112402d80e8f77ee87a1c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb\n Size/MD5: 12678 6646096dee2575f3bb33510e70bdd52b\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 215260 9a096eefa7f5e423c60fea41c314b9a5\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 46664 ba3b534d98d6717395ec66b402b3c701\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 40958 5950f34ca1fbd16f82a42020bc934ec6\n http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 47312 0d7d48294720bbd387710d560756ce6a\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 86530 9e5c38cd42496250d5fcf951c6b5d4bd\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 33272 a8890faa31cf92122bcce2991374fe7e\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 523810 7b2a58ca4d024926c0f8101ab49242d6\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 125252 f48299cd45e2ef1a74017d1c7653976e\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 63568 135fe854fe31d2d8bd9cd09f40a266e5\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 300756 77668125ff976eaed45f3d2676a46c5f\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 3035296 186cc64995c4fd4404241de5399eb0fb\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-18-lpia_2.6.28-18.59_lpia.deb\n Size/MD5: 641460 1a4d29b73378acb8bcf88658f88dd08e\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-18-lpia_2.6.28-18.59_lpia.deb\n Size/MD5: 21796372 d7455e818bf972ef7eb0fe54b7bd96dc\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_lpia.deb\n Size/MD5: 766260 b67d9c1432185123449ed6826ed9588d\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 303982 80fe6dcf6d68a46047ef6ddc2c098614\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 157406 2cc8f76d83482452bb6073656a80b2ee\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 24442 28180da41edae2700e4c8a0e4f1c656f\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 260414 49a0b6bd418a0ff1d274ce8f602e2733\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 2027576 241ee9a564502f3d8837806d5e6480d0\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 149398 b14f79b842c979418dec65e273836cd0\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 184736 a159624d12831598d35c3b00ba563182\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 143238 2720ae4f8cdad85066fc888e7fc3c796\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 34462 582363a3843fdbded2476793775ace76\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 5496 67c7245d730a7b241eb9947afeef7669\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 85646 6a31ffe0054c27df1506ae34162ab79e\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 47402 ff41a000c4a3abbed18330e905a01b7b\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 8718 15aa2d8fafced6b6e3b5a24c698b4089\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 63106 7a967940a04c1ee6a9626258e608b54c\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 14720 dc899d8630769d6270526c49f99a2af8\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 1447832 400eeba1e83569d777954b21b6df593c\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 43898 16b0a1310e3f70dccfc8d0d5f971b064\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 155186 b22b41e37f88fe49531f5580e0f7f712\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 172666 df244ff125096be469b1c56a30f1e05f\n http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb\n Size/MD5: 8154 f2d765541e008431b4d3eae00f435b61\n\nUpdated packages for Ubuntu 9.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.dsc\n Size/MD5: 2450 610bb83247876f8a8b47a0fd0d46fae8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.tar.gz\n Size/MD5: 87052080 62b9dcb9ad24e659db1aa085f9e5a456\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.dsc\n Size/MD5: 1906 a39c7ff46fb3ff74480d0e98366a486d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.tar.gz\n Size/MD5: 81902928 c9e88b4f386710c3f22979986a7e3a34\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.dsc\n Size/MD5: 1943 25176b20de251c2e58bb95e2dd9c1c7b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.tar.gz\n Size/MD5: 82470873 4d5238d3d11105852133d3eb802a95cc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.diff.gz\n Size/MD5: 2811600 b2b44f12a786758d470e6a29c09d0388\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.dsc\n Size/MD5: 3782 ae6bf5844769d00004b919a6f61d588c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31.orig.tar.gz\n Size/MD5: 78278595 16c0355d3612806ef87addf7c9f8c9f9\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-doc_2.6.31-304.10_all.deb\n Size/MD5: 3790328 e35ab5c36ee1bac625d2a57bd19e0c5c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-source-2.6.31_2.6.31-304.10_all.deb\n Size/MD5: 64258256 70b947cc9e9012c9472f2c317f11ffae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304_2.6.31-304.10_all.deb\n Size/MD5: 9662096 ac58cebef695901ea01bc7413b79109f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.31-19.56_all.deb\n Size/MD5: 3791668 3836f273873fedf9d2293ee0d11df6ce\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19_2.6.31-19.56_all.deb\n Size/MD5: 9531414 34d882276f33b0e37135c379a6e1c451\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.31_2.6.31-19.56_all.deb\n Size/MD5: 62161518 9d3f3f79b9f14db8bd3dc68594eb8c8c\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_amd64.deb\n Size/MD5: 603212 951db7e930eefc5fff9017c56badfb6e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_amd64.deb\n Size/MD5: 18660056 e39dda7f87b093e927c34a928b842c7a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 221398 682a7dab5b571a7b2fd31f19daf724c1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 15536 55206db30b20aea4d7da38b342fc095d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 52128 1cde23d38ba6908e1123951ef4bc3c69\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 44828 94402e34a45cf232ae86f3cc08bf7f4f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 50072 65e128949b6f525d9028187fe1e7cc37\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 92518 338960088cec6b9b25ef2a96e96f3ebc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 37776 452d9c073d191ec2be1cad3aceb34490\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 537676 6bb8167794701151c613afe28a5c62c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 130666 ff5cf8923b89d0fa4b5c3c4a61ef93f7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 53846 ffdc544c68e862a0a3038c99ac2d73a3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 310118 c2092f9a83a4f59145005f2c451d304b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 4353666 3a04bb875ae70561075d05d5bb208977\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_amd64.deb\n Size/MD5: 694766 85017cb531a49ea743cb7b30341b5ffa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-server_2.6.31-19.56_amd64.deb\n Size/MD5: 694938 550a64d6d54ee5f34f1fb9eefbd4cc3e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_amd64.deb\n Size/MD5: 28924984 3001e6d36f6bf76621997bdbeb864234\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-server_2.6.31-19.56_amd64.deb\n Size/MD5: 28885946 ff6296f4c684dd9facb011fc51b0b6f0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_amd64.deb\n Size/MD5: 11740736 287948976d92a7cae832a34ce33a99b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_amd64.deb\n Size/MD5: 743052 35cb9d5d80b77a2586d08ffb65d3212a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 168272 fc4758b6b91802971538d3a3c519056d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 202768 73cfe4be43d350582d171ff0e178b6b5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 27268 ae850a5e0ba4381a290b8f21ff88737f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 311688 3dab8c023e4aad0df74c5193aeaca49b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 2282064 f09b0e8828effab3770bfc1da159a8f2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 158666 6765112bf6fed248c08465e47b4dab00\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 203112 fed91a4bc3d356a5a9bb1c6110337413\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 161072 faec6563ccef41e925482b36619fca7c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 38056 505cbeb1fdbf55eea7664a19dcedc11f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 5762 a3ba57f83594477b27886cb3f4bd1b0d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 73750 53978367ed22b3daba246878064b72c2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 22240 8a1036af3dacffb432813cc8422f6ae8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 9548 f1e71c2129cc33f1ff139401b7b81547\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 39844 48e4aa79753fdb3ce1877ca1817b9fc6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 23484 f1be46cb2947ebe6b6d2e5b571d71a35\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 1389556 2ba51ea53e5454f75c8b39f21481e45d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 47382 89f1dff9282f3c667cf1b8c2bc41353c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 51636 41311bd8c8459ba04789539733e6ff5c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 128972 9697c034ed2bb74b5d18c5ae31fe1af0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb\n Size/MD5: 15814 8f46e8ddd6cac16dbdbc7c89cc94bee0\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_i386.deb\n Size/MD5: 573528 fa913abed6caeb5c33eb2167f730956f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_i386.deb\n Size/MD5: 17943372 803487f6122441604ec3062e7bb98228\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 198832 3282a330510666a582f6b8c0269d2f53\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 32458 03e2d90ce28677b7956fa2a72726d02e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 49938 c0d1953d9212f1569f04e8c8ba0db7ca\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 42118 db5bcc80727cd1013bc8393df2a88e4c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 45954 2d497ad958e7e7fc1b57ce51ff6b3570\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 87386 8e3ab58cf14ac0e97a334a65ae3e42ba\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 33754 bdbf52c3d681cca0ecdced183d2d37c4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 534176 5f166aa72d31a95df7cdb60abe4a0fc2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 128172 821c97524ce74e0685b135140c5261d7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 49748 9423b0562b984b85856d219d7b67fa27\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 295726 0736ef03d01a5e5e4fdf284ad2be5409\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 4185460 831a6068ef18d08ff697df14dead1668\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-386_2.6.31-19.56_i386.deb\n Size/MD5: 674832 6c28f2a428900b7c3ecd857dd2363150\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb\n Size/MD5: 674164 daade678beff67e96da61f42286bb8d4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_i386.deb\n Size/MD5: 674252 0786c96b6d902a71c6f1a2e5aa202345\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-386_2.6.31-19.56_i386.deb\n Size/MD5: 28775482 99e9b99d437aa88ec42e838367ca0c3b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb\n Size/MD5: 28938194 19d1d147a9e9dfb49fcd30b9d065d289\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_i386.deb\n Size/MD5: 28836780 00047de0d649be8b91c813fe7ee482b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_i386.deb\n Size/MD5: 11193984 1848c77671f6d9129f990e1a0a9940d0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_i386.deb\n Size/MD5: 743050 af6030dae8f05d7ef583ee7d6f31be8b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 172774 c11dd36baffeccf283ce48e122d7c791\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 186104 072e07c277b4f37611b21aad4390ccb0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 28372 82c8b14ef6982a48d3a8459d56ede43c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 292792 6c99c3b65ff7b159af94edf70358cb4a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 2400232 94729dcb0c5adb15ded7b3302c4005eb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 142004 9e43481b4e46409d8e711a628ce5e40a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 189566 83afe6de56cab613b4f890723a82a6b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 148522 b96767af921427e880579659ba7b757a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 35306 a6a1cbe7a75490632f24cad479916315\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 6842 86b286685eabaf8b6d28d3f922249503\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 86058 c014cfa81ab99a01793d25b995c7d75f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 46424 d525bcf1a39f6a21f09d52d24e6a0eb3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 8916 f9efb7f192c3cc22c14df58803a64dfc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 36282 1d843fa9ef5beed8582f2924d0b53bcc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 21660 3ad0b4572c12885957a3b753fc3b9fe3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 1495010 630f37fe420a74a22b4ca2eba4960999\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 44088 fddf56b0285ec3d0e6fc61e0fe8b86e2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 48484 2614a20d6d57892a8789091eeeaa67b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 117810 ff004889bca11286287a59c36fa24c0e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb\n Size/MD5: 14526 4c9cb3d5598c843bf5b90ddf0292d3c1\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 198810 76156647956f29c9e519aeac038c63bb\n http://ports.ubuntu.com/pool/main/l/linux/char-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 32452 9a5dd5fe15dda0be28f7afd966e89af9\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 49936 31c4008b50016b2a6c3a90703f2becbb\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 42148 931518b24b123d3749719c35b2b23759\n http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 45950 297c686f52a35049b3b2c87a96aebf68\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 87366 ec3f16cc0aeeef91b8c887ff347b6b0a\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 33750 a29ddd339c071c5b948c96e30f36f650\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 534366 b15b19f3e6c581d22514700dbd6502d8\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 128202 3d0f559a80187074bb210e3dae3bbfa0\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 49732 41abb7e30f0bdac62c5cd064c4b0ac3e\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 295732 12e912ce1f15d580960e7956de0c4ae0\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 4186814 7c18e86a3f5a5a985488ad67718887f9\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-lpia_2.6.31-19.56_lpia.deb\n Size/MD5: 674880 5dd2779cd5be613c330b7dc35410f271\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-lpia_2.6.31-19.56_lpia.deb\n Size/MD5: 28831528 8eaab1870eda62e8ee231e429c361455\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_lpia.deb\n Size/MD5: 742994 99d2d0609d9032e2810e19c92fc92834\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 172836 8b15eb5579853f45dc49055351df4225\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 186092 0eb0ceb5c23748d829f3e1d7977a35be\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 28366 0301ac544cf27b3dce660787d7575804\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 292736 16e84844c99e73b4e00419c38d78db3d\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 2400366 43dda8f1a10775e382e7a328381265db\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 141998 930123e6b57798468d7085ae9f549150\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 189564 8d6e18aedb4b970a3643207b96589863\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 148506 78efdbf1323c68be564ad06205842cb6\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 35300 054cf95e7af87d6f744b69eb8166f275\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 6828 5dbf32d40e88f471614e5cf286670e8f\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 86054 f24e7eaa3608985960e54a9048a24fb6\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 46410 80945eba79f53965effd546d23a8560b\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 8906 e1c6021a615a4363dde2cf4a893fa53b\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 36270 eb2848e19ec2351b9102bc640e546991\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 21660 cfb271e26dfd127871f5d27547e0a7ba\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 1494736 44113d529e3f4d3828f8719facd86370\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 44068 98817942a8188bd9281def20a1d327bb\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 48474 ebc9e58b5f98182006d6e3bb9c5ce179\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 117786 9b864dfc32d19a8cf2d61a68894835e9\n http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb\n Size/MD5: 14524 9ad51e3871197eb84b193bd9a3b29ec2\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 321488 509ad8549565d0d87fe246df5b26c7af\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 263628 b7028cc16ec749cc2fdd86e985c7bc6a\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 58850 3e2f18df29a75debc326e5919c9c13da\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 67040 8fdde64943d01e5c6a372424d3d24a03\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 45914 6a21bb6fc6dce2767be6f974ffdab524\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 51296 4c928d4f04bf96f5cdc5ccf7d3a60c81\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 90684 eac2ea55da023924723593afffbb5d2c\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 105146 c407a156a5e56f284fa682d87d2ed50e\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 39492 38f377d5a0bdbbbb642545aa6d7f641c\n http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 39270 47f890e2a1418595d92858350aa16475\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 580998 825045ff82a442eaf1a21a5448b0cefb\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 626388 b56b5416b642ba57471e6e125b99a32f\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 149292 930001a305b0f78060f3472fe46cde00\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 147332 ef6994c30f19462a7fc0cb7cd8f4dacc\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 79750 75c6da2308e05334f89f62917aee5b3d\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 84136 caf2a7e924b03340e579e9bdc0a7ba50\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 402954 9fc3d4860f5c32aff3ac252379938fef\n http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 342516 5737df8ea2adfc45ecae9d322931187a\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 3813204 3ac91a51b3525bfbb0f6166fc140d7db\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 5193132 54dce7348221bcc93bbc01512d553a16\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb\n Size/MD5: 784762 523b94315bff20137df79c5308abd5b7\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb\n Size/MD5: 801042 2a8e55b23ad4dc09ee3cbb2fdc23cc28\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb\n Size/MD5: 783708 185ba99656f4fa37874e0241e9f25dbb\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb\n Size/MD5: 24820746 adc5365726ba88565ad89953707bd012\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb\n Size/MD5: 25829918 fc82da730c6d730c5a4ac87d30594749\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb\n Size/MD5: 24656226 7791f88107e97c5419f0e2d2f850c38e\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_powerpc.deb\n Size/MD5: 728146 1dabe36864839475aab9293825cfc3e4\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 271924 8fb200d91f158f9b0eb209df5a5ffcd4\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 294610 317f7d34e3cd0ac823fcc5d48bcc9a7f\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 210546 041508a9555e18e2b8b4cab41b26f397\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 216984 845e2e452ef869aa3b39ea47bfa0280b\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 25798 19a7cae7e4f693c269f54dc0f2762f33\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 28984 419926b33e2b573f8d3ccaa5ade657f1\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 314922 83dcb63807ffb50682219b20333c23bc\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 357524 a32753bfca44b1afb9b11f72b25ebb9e\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 2027754 9b45ff8446ec0bad5befec2dc3ecdb72\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 2247744 35d212f7569bb03564a7f0294879557f\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 213544 3fb9afb7247290ffb3508744ab6cbb9f\n http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 209776 e42b20eb402cb2a55fea2a80f5cef162\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 210242 78939115c860efacb83481c0687f1a7a\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 244856 8fcff5fb05c0921681ec2bb44637c624\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 111834 a6b65e618a3240d51f36f37911d1d7cc\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 131610 dc5625deacbac446e71517f5902376b1\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 49028 ac60e4bf193e7725de6d8999c6231915\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 44082 531b2cbe15ec2f62fe61bd7002b1df02\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 5852 f049a9332d469b247e451868b4f22cce\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 6504 32fb4de3cd714598281c2d4d5d2ee6d6\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 79118 e98cffbfe6f6cbffcfa6dce199dc6c46\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 85190 e648dc2d3e124d68c47d4ec18836097f\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 74318 19b737ad1f43e7be1c6cc7e211085424\n http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 27228 0b5b4529d140289e616bded832055cbc\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 8538 9010c080bd63660bf529930565d49f62\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 9818 e909c37d26354ddbdceddc72628d71b3\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 58830 ae6573a0664b5486360156dd6711776c\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 70140 83085dfd5f4bb24ab67dd967e6b609cc\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 23714 86a598e1b13e4d6963475732e7a1097a\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 30804 b382bc0bfffd61156d0f8b3dc90bd307\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 1556894 ea2800c85a0115ad2e524a8b4ab4cb91\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 1509110 e42499f8bdbad020301a11617f6b65a8\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 81698 095ff78875bae0b90edd07ac3b51993d\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 88530 1a36ce88a0c6f7b495c869da15bf9d69\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 64400 8ff9a2aef998409440c1139f3db8c7ee\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 76990 392faa17f8c688e3856d91fb657eba09\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 141540 636e6d1827591a3aa46b82d7dc0b8ab6\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb\n Size/MD5: 151356 0f39f4d13770ceab049be6fb9c83fc16\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 139430 14f825a3334b18614059312527002767\n http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 70106 6dde178febff58a546142209374e1616\n http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 46510 64b0be995ce3d697a84cd3b0665ffe68\n http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 93974 28048300aba15f2a3937723bc0afc5cd\n http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 588788 c17e7feb3442296b7ed93c92cb988625\n http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 148426 6f429deb9df760daf28c04ad93ea6758\n http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 75862 6f382de52d9e1b52611c70a703895e5d\n http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 2892370 ec9440bb8ee05a7ac071992c5711139f\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb\n Size/MD5: 601506 1b56c59b3df953a640760b876d752465\n http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb\n Size/MD5: 600680 166e5056f971d5fa031230c1af67d028\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb\n Size/MD5: 20496992 6ebab55c96d6be71ffb8c3a493d31a74\n http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb\n Size/MD5: 20193918 98b3c6e44f8e302cca36530b434e9525\n http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_sparc.deb\n Size/MD5: 740254 b1a453339b4d68717a445f07b87b53a4\n http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 266068 1b8caecb838a9dd9b9c765f6603197a3\n http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 209168 e0e78f6a435e0ca46d5680e08d6e8db0\n http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 26268 f730be03c2b96e53e779a5d3df4cde93\n http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 314080 b673ee07d0c907d6ba00a561b915868d\n http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 1675490 8642bd711b6643bd26ddc80674cef9e4\n http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 222882 136f6b9e24a16823f7309438fd0bd60a\n http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 121954 75090ea655204cc898db4634fc8aa021\n http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 38798 a11bcf765626194255c1d5a7d0106c2a\n http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 100798 af5903bc65fd381528f733fb1ba4100f\n http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 8932 ebcb23a73a538276e41fcff9b7bb1d15\n http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 62926 7eba529ee44c2e107b693605dcbf1247\n http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 120960 8f63ad112de0797974650631dee53d13\n http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 1217912 87a2a4f21ee86e0f36bc5298a226513b\n http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 101576 057a15ca3fa891e47216adcf5ae071f7\n http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 200148 f90834ae24c0f516ef83fa5aa66bafbb\n http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb\n Size/MD5: 184674 d704744a26941df63b9195288306fa7b\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2010-0009\nSynopsis: ESXi ntp and ESX Service Console third party updates\nIssue date: 2010-05-27\nUpdated on: 2010-05-27 (initial release of advisory)\nCVE numbers: CVE-2009-2695 CVE-2009-2908 CVE-2009-3228\n CVE-2009-3286 CVE-2009-3547 CVE-2009-3613\n CVE-2009-3612 CVE-2009-3620 CVE-2009-3621\n CVE-2009-3726 CVE-2007-4567 CVE-2009-4536\n CVE-2009-4537 CVE-2009-4538 CVE-2006-6304\n CVE-2009-2910 CVE-2009-3080 CVE-2009-3556\n CVE-2009-3889 CVE-2009-3939 CVE-2009-4020\n CVE-2009-4021 CVE-2009-4138 CVE-2009-4141\n CVE-2009-4272 CVE-2009-3563 CVE-2009-4355\n CVE-2009-2409 CVE-2009-0590 CVE-2009-1377\n CVE-2009-1378 CVE-2009-1379 CVE-2009-1386\n CVE-2009-1387 CVE-2009-4212 CVE-2009-1384\n CVE-2010-0097 CVE-2010-0290 CVE-2009-3736\n CVE-2010-0001 CVE-2010-0426 CVE-2010-0427\n CVE-2010-0382\n- ------------------------------------------------------------------------\n\n1. Summary\n\n ESXi update for ntp and ESX Console OS (COS) updates for COS\n kernel, openssl, krb5, gcc, bind, gzip, sudo. \n\n2. Relevant releases\n\n VMware ESX 4.0.0 without patches ESX400-201005401-SG,\n ESX400-201005406-SG, ESX400-201005408-SG, ESX400-201005407-SG,\n ESX400-201005405-SG, ESX400-201005409-SG\n\n3. Problem Description\n\n a. Service Console update for COS kernel\n\n Updated COS package \"kernel\" addresses the security issues that are\n fixed through versions 2.6.18-164.11.1. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2009-2695, CVE-2009-2908, CVE-2009-3228,\n CVE-2009-3286, CVE-2009-3547, CVE-2009-3613 to the security issues\n fixed in kernel 2.6.18-164.6.1\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2009-3612, CVE-2009-3620, CVE-2009-3621,\n CVE-2009-3726 to the security issues fixed in kernel 2.6.18-164.9.1. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2007-4567, CVE-2009-4536, CVE-2009-4537,\n CVE-2009-4538 to the security issues fixed in kernel 2.6.18-164.10.1\n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2006-6304, CVE-2009-2910, CVE-2009-3080,\n CVE-2009-3556, CVE-2009-3889, CVE-2009-3939, CVE-2009-4020,\n CVE-2009-4021, CVE-2009-4138, CVE-2009-4141, and CVE-2009-4272 to\n the security issues fixed in kernel 2.6.18-164.11.1. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-201005401-SG\n ESX 3.5 ESX not applicable\n ESX 3.0.3 ESX not applicable\n ESX 2.5.5 ESX not applicable\n\n vMA 4.0 RHEL5 affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n b. ESXi userworld update for ntp\n\n The Network Time Protocol (NTP) is used to synchronize the time of\n a computer client or server to another server or reference time\n source. \n\n A vulnerability in ntpd could allow a remote attacker to cause a\n denial of service (CPU and bandwidth consumption) by using\n MODE_PRIVATE to send a spoofed (1) request or (2) response packet\n that triggers a continuous exchange of MODE_PRIVATE error responses\n between two NTP daemons. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2009-3563 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 4.0 ESXi ESXi400-201005401-SG\n ESXi 3.5 ESXi affected, patch pending\n\n ESX any ESX not applicable\n\n vMA any RHEL5 not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n c. Service Console package openssl updated to 0.9.8e-12.el5_4.1\n\n OpenSSL is a toolkit implementing SSL v2/v3 and TLS protocols with\n full-strength cryptography world-wide. \n\n A memory leak in the zlib could allow a remote attacker to cause a\n denial of service (memory consumption) via vectors that trigger\n incorrect calls to the CRYPTO_cleanup_all_ex_data function. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2009-4355 to this issue. \n\n A vulnerability was discovered which may allow remote attackers to\n spoof certificates by using MD2 design flaws to generate a hash\n collision in less than brute-force time. NOTE: the scope of this\n issue is currently limited because the amount of computation\n required is still large. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2009-2409 to this issue. \n\n This update also includes security fixes that were first addressed\n in version openssl-0.9.8e-12.el5.i386.rpm. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the names CVE-2009-0590, CVE-2009-1377, CVE-2009-1378,\n CVE-2009-1379, CVE-2009-1386 and CVE-2009-1387 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-201005401-SG\n ESX 3.5 ESX not applicable\n ESX 3.0.3 ESX not applicable\n ESX 2.5.5 ESX not applicable\n\n vMA 4.0 RHEL5 affected, patch pending**\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n ** see VMSA-2010-0004\n\n d. Service Console update for krb5 to 1.6.1-36.el5_4.1 and pam_krb5 to\n 2.2.14-15. \n\n Kerberos is a network authentication protocol. It is designed to\n provide strong authentication for client/server applications by\n using secret-key cryptography. \n\n Multiple integer underflows in the AES and RC4 functionality in the\n crypto library could allow remote attackers to cause a denial of\n service (daemon crash) or possibly execute arbitrary code by\n providing ciphertext with a length that is too short to be valid. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2009-4212 to this issue. \n\n The service console package for pam_krb5 is updated to version\n pam_krb5-2.2.14-15. This update fixes a flaw found in pam_krb5. In\n some non-default configurations (specifically, where pam_krb5 would\n be the first module to prompt for a password), a remote attacker\n could use this flaw to recognize valid usernames, which would aid a\n dictionary-based password guess attack. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2009-1384 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-201005406-SG\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX affected, patch pending\n ESX 2.5.5 ESX affected, patch pending\n\n vMA 4.0 RHEL5 affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n e. Service Console package bind updated to 9.3.6-4.P1.el5_4.2\n\n BIND (Berkeley Internet Name Daemon) is by far the most widely used\n Domain Name System (DNS) software on the Internet. \n\n A vulnerability was discovered which could allow remote attacker to\n add the Authenticated Data (AD) flag to a forged NXDOMAIN response\n for an existing domain. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2010-0097 to this issue. \n\n A vulnerability was discovered which could allow remote attackers\n to conduct DNS cache poisoning attacks by receiving a recursive\n client query and sending a response that contains CNAME or DNAME\n records, which do not have the intended validation before caching. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2010-0290 to this issue. \n\n A vulnerability was found in the way that bind handles out-of-\n bailiwick data accompanying a secure response without re-fetching\n from the original source, which could allow remote attackers to\n have an unspecified impact via a crafted response. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2010-0382 to this issue. \n\n NOTE: ESX does not use the BIND name service daemon by default. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-201005408-SG\n ESX 3.5 ESX not applicable\n ESX 3.0.3 ESX not applicable\n ESX 2.5.5 ESX not applicable\n\n vMA 4.0 RHEL5 affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n f. Service Console package gcc updated to 3.2.3-60\n\n The GNU Compiler Collection includes front ends for C, C++,\n Objective-C, Fortran, Java, and Ada, as well as libraries for these\n languages\n\n GNU Libtool\u0027s ltdl.c attempts to open .la library files in the\n current working directory. This could allow a local user to gain\n privileges via a Trojan horse file. The GNU C Compiler collection\n (gcc) provided in ESX contains a statically linked version of the\n vulnerable code, and is being replaced. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2009-3736 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not applicable\n\n ESX 4.0 ESX ESX400-201005407-SG\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX affected, patch pending\n ESX 2.5.5 ESX affected, patch pending\n\n vMA 4.0 RHEL5 affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n g. Service Console package gzip update to 1.3.3-15.rhel3\n\n gzip is a software application used for file compression\n\n An integer underflow in gzip\u0027s unlzw function on 64-bit platforms\n may allow a remote attacker to trigger an array index error\n leading to a denial of service (application crash) or possibly\n execute arbitrary code via a crafted LZW compressed file. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2010-0001 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-201005405-SG\n ESX 3.5 ESX affected, patch pending\n ESX 3.0.3 ESX affected, patch pending\n ESX 2.5.5 ESX affected, patch pending\n\n vMA 4.0 RHEL5 affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n h. Service Console package sudo updated to 1.6.9p17-6.el5_4\n\n Sudo (su \"do\") allows a system administrator to delegate authority\n to give certain users (or groups of users) the ability to run some\n (or all) commands as root or another user while providing an audit\n trail of the commands and their arguments. \n\n When a pseudo-command is enabled, sudo permits a match between the\n name of the pseudo-command and the name of an executable file in an\n arbitrary directory, which allows local users to gain privileges\n via a crafted executable file. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2010-0426 to this issue. \n\n When the runas_default option is used, sudo does not properly set\n group memberships, which allows local users to gain privileges via\n a sudo command. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2010-0427 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.0 ESX ESX400-201005409-SG\n ESX 3.5 ESX not applicable\n ESX 3.0.3 ESX not applicable\n ESX 2.5.5 ESX not applicable\n\n vMA 4.0 RHEL5 affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n ESX 4.0\n -------\n http://bit.ly/aqTCqn\n md5sum: ace37cd8d7c6388edcea2798ba8be939\n sha1sum: 8fe7312fe74a435e824d879d4f1ff33df25cee78\n http://kb.vmware.com/kb/1013127\n\n Note ESX400-201005001 contains the following security bulletins\n ESX400-201005404-SG (ntp), ESX400-201005405-SG (gzip),\n ESX400-201005408-SG (bind), ESX400-201005401-SG (kernel, openssl),\n ESX400-201005406-SG (krb5, pam_krb5), ESX400-201005402-SG (JRE),\n ESX400-201005403-SG (expat), ESX400-201005409-SG (sudo),\n ESX400-201005407-SG (gcc). \n\n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2695\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2908\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3228\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3286\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3613\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3612\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3620\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3621\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3726\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4567\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4537\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6304\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2910\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3080\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3556\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3889\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4020\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4021\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4141\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4272\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4355\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0382\n\n- ------------------------------------------------------------------------\n\n6. Change log\n\n2010-05-27 VMSA-2010-0009\nInitial security advisory after release of patch 06 bulletins for ESX\n4.0 on 2010-05-27\n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2010 VMware Inc. All rights reserved. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (MingW32)\n\niEYEARECAAYFAkv/V8IACgkQS2KysvBH1xnqNgCcCwwelsQK6DQjcTc2wnIPp0EW\nE70An2gfkiCQ5FNqvf3y+kNredxyVZwI\n=JW3s\n-----END PGP SIGNATURE-----\n. Summary\n\n VMware hosted product updates, ESX patches and VI Client update\n resolve multiple security issues. \n VMware Player 3.1.3 and earlier. \n\n VMware Fusion 3.1.2 and earlier. \n\n ESXi 4.1 without patch ESXi410-201104402-BG. \n ESXi 4.0 without patch ESXi400-201104402-BG. \n ESXi 3.5 without patches ESXe350-201105401-I-SG and\n ESXe350-201105402-T-SG. \n\n ESX 4.1 without patch ESX410-201104401-SG\n ESX 4.0 without patch ESX400-201104401-SG\n ESX 3.5 without patches ESX350-201105401-SG,\n ESX350-201105404-SG and\n ESX350-201105406-SG. \n\n 2) SCSI Driver Denial of Service / Possible Privilege Escalation\n A local attacker can achieve a denial of service and\n possibly a privilege escalation via a vulnerability in the\n Linux SCSI drivers. \n\n 3) Kernel Memory Management Arbitrary Code Execution\n A context-dependent attacker can execute arbitrary code via\n a vulnerability in a kernel memory handling function. Multiple vulnerabilities in mount.vmhgfs\n\n This patch provides a fix for the following three security\n issues in the VMware Host Guest File System (HGFS). None of\n these issues affect Windows based Guest Operating Systems. \n\n 1) Mount.vmhgfs Information Disclosure\n Information disclosure via a vulnerability that allows an\n attacker with access to the Guest to determine if a path\n exists in the Host filesystem and whether it is a file or\n directory regardless of permissions. \n\n 2) Mount.vmhgfs Race Condition\n Privilege escalation via a race condition that allows an\n attacker with access to the guest to mount on arbitrary\n directories in the Guest filesystem and achieve privilege\n escalation if they can control the contents of the mounted\n directory. \n\n 3) Mount.vmhgfs Privilege Escalation\n Privilege escalation via a procedural error that allows an\n attacker with access to the guest operating system to gain\n write access to an arbitrary file in the Guest filesystem. \n This issue only affects Solaris and FreeBSD Guest Operating\n Systems. \n\n VMware would like to thank Dan Rosenberg for reporting these\n issues. VI Client ActiveX vulnerabilities\n\n VI Client COM objects can be instantiated in Internet Explorer\n which may cause memory corruption. An attacker who succeeded in\n making the VI Client user visit a malicious Web site could\n execute code on the user\u0027s system within the security context of\n that user. \n\n VMware would like to thank Elazar Broad and iDefense for\n reporting this issue to us. \n\n Affected versions. \n\n The vSphere Client which comes with vSphere 4.0 and vSphere 4.1\n is not affected. This is any build of vSphere Client Version\n 4.0.0 and vSphere Client Version 4.1.0. \n\n VI Clients bundled with VMware Infrastructure 3 that are not\n affected are:\n - VI Client 2.0.2 Build 230598 and higher\n - VI Client 2.5 Build 204931 and higher\n\n The issue can be remediated by replacing an affected VI Client\n with the VI Client bundled with VirtualCenter 2.5 Update 6 or\n VirtualCenter 2.5 Update 6a. \n\n VMware Workstation 7.1.4\n ----------------------------\n\nhttp://downloads.vmware.com/d/info/desktop_downloads/vmware_workstation/7_0\n Release notes:\n http://downloads.vmware.com/support/ws71/doc/releasenotes_ws714.html\n\n VMware Workstation for Windows 32-bit and 64-bit with VMware Tools\n md5sum: b52d064dff3e9fb009e0637d59b79c44\n sha1sum: bf4fe9e901b45e59b33852c4612e90fb77223d64\n\n VMware Workstation for Linux 32-bit with VMware Tools\n md5sum: 5f5f25b1cfd8990e46db07788fe0adab\n sha1sum: d5b4bfe0d22079988a7777dcc0f87a16b494b5f9\n\n VMware Workstation for Linux 64-bit with VMware Tools\n md5sum: 68b424f836f63c12b071a791f80b1593\n sha1sum: a7d1f461830db022af8f9d872c980fc59a83c5d6\n\n VMware Fusion 3.1.3\n ---------------------------\n\nhttp://downloads.vmware.com/d/info/desktop_downloads/vmware_fusion_for_the_mac/3_0\n Release notes:\n\nhttp://downloads.vmware.com/support/fusion3/doc/releasenotes_fusion_313.html\n\n VMware Fusion for Intel-based Macs\n md5sum: f35ac5c15354723468257d2a48dc4f76\n sha1sum: 3c849a62c45551fddb16eebf298cef7279d622a9\n\n VMware Player 3.1.4\n ---------------------------\n http://downloads.vmware.com/d/info/desktop_downloads/vmware_player/3_0\n Release notes:\n https://www.vmware.com/support/player31/doc/releasenotes_player314.html\n\n VMware Player 3.1.4 for 32-bit and 64-bit Windows\n md5sum: 29dd5fefe40af929dba40185eb6d4804\n sha1sum: ac00488dd9e412beea2366c167ceb87ed262054f\n\n VMware Player 3.1.4 for 32-bit Linux\n md5sum: 75a41b63836d19db34f5551846c8b11d\n sha1sum: 7350051c0fc781604d1d46bc24003434cbcd3b26\n\n VMware Player 3.1.4 for 64-bit Linux\n md5sum: a7fdadfb2af8d9f76571cd06f2439041\n sha1sum: 90031375a9c10d9a0a5e32be154c856693ad7526\n\n VMware ESXi 4.1\n ---------------------------\n ESXi410-201104001\n Download link:\n\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-276-20110420-682352/ESXi410-201104001.zip\n md5sum: 23bd026d6cbca718fe50ed1dd73cfe9d\n sha1sum: 82fa6da02a1f37430a15a659254426b3d3a62662\n http://kb.vmware.com/kb/1035111\n\n ESXi410-201104001 contains ESXi410-201104402-BG. \n\n VMware ESX 4.1\n -------\n ESX410-201104001\n Download link:\n\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-275-20110420-062017/ESX410-201104001.zip\n md5sum: 757c3370ae63c75ef5b2178bd35a4ac3\n sha1sum: 95cfdc08e0988b4a0c0c3ea1a1acc1c661979888\n http://kb.vmware.com/kb/1035110\n\n Note ESX410-201104001 contains ESX410-201104401-SG. \n\n VMware ESXi 4.0\n ---------------------------\n ESXi400-201104001\n Download link:\n\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-278-20110424-080274/ESXi400-201104001.zip\n md5sum: 08216b7ba18988f608326e245ac27e98\n sha1sum: 508a04532f0af007ce7c9d7693371470ed8257f0\n http://kb.vmware.com/kb/1037261\n\n Note ESXi400-201104001 contains ESXi400-201104402-BG. \n\n VMware ESX 4.0\n ---------------------------\n ESX400-201104001\n Download link:\n\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-277-20110424-816604/ESX400-201104001.zip\n\n md5sum: 1a305fbf6c751403e56ef4e33cabde06\n sha1sum: bc7577cb80e69fbe81e3e9272a182deb42987b3d\n http://kb.vmware.com/kb/1037260\n\n Note ESX400-201104001 contains ESX400-201104401-SG. \n\n VMware ESXi 3.5\n ---------------------------\n ESXe350-201105401-O-SG\n Download link:\n http://download3.vmware.com/software/vi/ESXe350-201105401-O-SG.zip\n md5sum: 9bc9296cae1fbecf417f60941590fcb4\n sha1sum: d6902377f57e3b05b08c07a810d6b58fa30aa8d5\n http://kb.vmware.com/kb/1036403\n\n Note ESXe350-201105401-O-SG contains the following security fixes:\n ESXe350-201105402-T-SG and ESXe350-201105401-I-SG\n\n VMware ESX 3.5\n ---------------------------\n ESX350-201105401-SG\n Download link:\n http://download3.vmware.com/software/vi/ESX350-201105401-SG.zip\n md5sum: 2853ca6e75ef5e856ec582151908ad93\n sha1sum: c538971d47af4b813348d87bf2f4fa6acd9292f7\n http://kb.vmware.com/kb/1036399\n\n ESX350-201105404-SG\n Download link:\n http://download3.vmware.com/software/vi/ESX350-201105404-SG.zip\n md5sum: 7403d4a06e2bdb9cdfb5590432f51bf8\n sha1sum: 1700d6175524680b982ca4430cff77b5f7cb15c4\n http://kb.vmware.com/kb/1036402\n\n ESX350-201105406-SG\n Download link:\n http://download3.vmware.com/software/vi/ESX350-201105406-SG.zip\n md5sum: 6c695f7d021f751959aec08fed94df11\n sha1sum: 83a862c469e7f3334e2a78f6b81d98c02108b708\n http://kb.vmware.com/kb/1036754\n\n5. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. Rather, they will be\nreleased in a staggered or \"leap-frog\" fashion", "sources": [ { "db": "NVD", "id": "CVE-2009-4536" }, { "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "db": "BID", "id": "37519" }, { "db": "VULHUB", "id": "VHN-41982" }, { "db": "VULMON", "id": "CVE-2009-4536" }, { "db": "PACKETSTORM", "id": "86600" }, { "db": "PACKETSTORM", "id": "86790" }, { "db": "PACKETSTORM", "id": "85958" }, { "db": "PACKETSTORM", "id": "90046" }, { "db": "PACKETSTORM", "id": "101970" }, { "db": "PACKETSTORM", "id": "86286" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-4536", "trust": 3.5 }, { "db": "BID", "id": "37519", "trust": 2.9 }, { "db": "SECUNIA", "id": "35265", "trust": 2.6 }, { "db": "SECUNIA", "id": "38031", "trust": 2.6 }, { "db": "SECTRACK", "id": "1023420", "trust": 2.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2009/12/31/1", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2009/12/29/2", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2009/12/28/1", "trust": 1.8 }, { "db": "SECUNIA", "id": "38610", "trust": 1.2 }, { "db": "SECUNIA", "id": "38492", "trust": 1.2 }, { "db": "SECUNIA", "id": "38276", "trust": 1.2 }, { "db": "SECUNIA", "id": "38779", "trust": 1.2 }, { "db": "SECUNIA", "id": "38296", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2010-001004", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201001-076", "trust": 0.7 }, { "db": "NSFOCUS", "id": "14333", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20091229 RE: CVE REQUESTS - KERNEL SECURITY REGRESSIONS FOR CVE-2009-1385/AND -1389", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20091228 CVE REQUESTS - KERNEL SECURITY REGRESSIONS FOR CVE-2009-1385/AND -1389", "trust": 0.6 }, { "db": "MLIST", "id": "[OSS-SECURITY] 20091231 RE: CVE REQUESTS - KERNEL SECURITY REGRESSIONS FOR CVE-2009-1385/AND -1389", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2010:0020", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2010:0095", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2010:0019", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2010:0041", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-41982", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2009-4536", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86600", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86790", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "85958", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "90046", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "101970", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "86286", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-41982" }, { "db": "VULMON", "id": "CVE-2009-4536" }, { "db": "BID", "id": "37519" }, { "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "db": "PACKETSTORM", "id": "86600" }, { "db": "PACKETSTORM", "id": "86790" }, { "db": "PACKETSTORM", "id": "85958" }, { "db": "PACKETSTORM", "id": "90046" }, { "db": "PACKETSTORM", "id": "101970" }, { "db": "PACKETSTORM", "id": "86286" }, { "db": "CNNVD", "id": "CNNVD-201001-076" }, { "db": "NVD", "id": "CVE-2009-4536" } ] }, "id": "VAR-200906-0612", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-41982" } ], "trust": 0.43838382 }, "last_update_date": "2024-11-29T20:38:59.510000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "kernel-2.6.18-128.15.AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1023" }, { "title": "kernel-2.6.18-128.14.AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1005" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.kernel.org/" }, { "title": "1992", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1992" }, { "title": "2186", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2186" }, { "title": "RHSA-2010:0882", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0882.html" }, { "title": "RHSA-2010:0019", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0019.html" }, { "title": "RHSA-2010:0020", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0020.html" }, { "title": "RHSA-2010:0053", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0053.html" }, { "title": "RHSA-2010:0079", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0079.html" }, { "title": "RHSA-2010:0111", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0111.html" }, { "title": "VMSA-2011-0009", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "title": "kernel-trace-2.6.27.45-0.1.1.x86_64.rpm", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=4935" }, { "title": "kernel-debug-base-2.6.27.45-0.1.1.i586.rpm", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=4898" }, { "title": "kernel-xen-2.6.27.45-0.1.1.x86_64.rpm", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=4939" }, { "title": "kernel-debug-debugsource-2.6.27.42-0.1.1.i586.rpm", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=5033" }, { "title": "kernel-pae-debugsource-2.6.27.42-0.1.1.i586.rpm", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=5037" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20100020 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20100053 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20100111 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20100019 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20100079 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux, linux-source-2.6.15 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-894-1" }, { "title": "VMware Security Advisories: VMware hosted product updates, ESX patches and VI Client update resolve multiple security issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=f44ffb8b647b46490ea24f9f9b23fb18" }, { "title": "Debian Security Advisories: DSA-2003-1 linux-2.6 -- privilege escalation/denial of service", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=c8b001529c4e555fa474fe8cb901ade3" }, { "title": "Debian Security Advisories: DSA-2005-1 linux-2.6.24 -- privilege escalation/denial of service/sensitive memory leak", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=730b40b3a3f2a9a1f3cba6257e5248fb" }, { "title": "VMware Security Advisories: ESXi utilities and ESX Service Console third party updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=9ca0d654a28a118d1f99d0ae3b1753e8" } ], "sources": [ { "db": "VULMON", "id": "CVE-2009-4536" }, { "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "db": "CNNVD", "id": "CNNVD-201001-076" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-41982" }, { "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "db": "NVD", "id": "CVE-2009-4536" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/37519" }, { "trust": 2.6, "url": "http://securitytracker.com/id?1023420" }, { "trust": 2.6, "url": "http://secunia.com/advisories/35265" }, { "trust": 2.6, "url": "http://secunia.com/advisories/38031" }, { "trust": 2.1, "url": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/" }, { "trust": 1.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "trust": 1.8, "url": "http://events.ccc.de/congress/2009/fahrplan/events/3596.en.html" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2009/12/28/1" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2009/12/29/2" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2009/12/31/1" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2010-0019.html" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2010-0020.html" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2010-0041.html" }, { "trust": 1.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0095.html" }, { "trust": 1.7, "url": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2" }, { "trust": 1.5, "url": "http://www.vmware.com/security/advisories/vmsa-2011-0009.html" }, { "trust": 1.2, "url": "http://www.debian.org/security/2010/dsa-1996" }, { "trust": 1.2, "url": "http://www.debian.org/security/2010/dsa-2005" }, { "trust": 1.2, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-february/035159.html" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10607" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12440" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a13226" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7453" }, { "trust": 1.2, "url": "http://www.redhat.com/support/errata/rhsa-2010-0053.html" }, { "trust": 1.2, "url": "http://www.redhat.com/support/errata/rhsa-2010-0111.html" }, { "trust": 1.2, "url": "http://www.redhat.com/support/errata/rhsa-2010-0882.html" }, { "trust": 1.2, "url": "http://secunia.com/advisories/38276" }, { "trust": 1.2, "url": "http://secunia.com/advisories/38296" }, { "trust": 1.2, "url": "http://secunia.com/advisories/38492" }, { "trust": 1.2, "url": "http://secunia.com/advisories/38610" }, { "trust": 1.2, "url": "http://secunia.com/advisories/38779" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55648" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4536" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4536" }, { "trust": 0.6, "url": "http://support.avaya.com/css/p8/documents/100072895" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4536" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14333" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3080" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0007" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4538" }, { "trust": 0.3, "url": "http://marc.info/?l=linux-netdev\u0026m=126203101730472\u0026w=2" }, { "trust": 0.3, "url": "http://events.ccc.de/congress/2009/fahrplan//events/3596.en.html" }, { "trust": 0.3, "url": "http://events.ccc.de/congress/2009/fahrplan//attachments/1483_26c3_ipv4_fuckups.pdf" }, { "trust": 0.3, "url": "http://www.kernel.org/" }, { "trust": 0.3, "url": "http://permalink.gmane.org/gmane.comp.security.oss.general/2459" }, { "trust": 0.3, "url": "http://www.kernel.org/pub/linux/kernel/v2.4/changelog-2.4.37.9" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100141285" }, { "trust": 0.3, "url": "http://www.ubuntu.com/usn/usn-894-1" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2010-0111.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4020" }, { "trust": 0.3, "url": "http://www.debian.org/security/faq" }, { "trust": 0.3, "url": "http://security.debian.org/" }, { "trust": 0.3, "url": "http://www.debian.org/security/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3726" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0415" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0410" }, { "trust": 0.3, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4021" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0291" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0003" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4005" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0622" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2695" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4308" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4138" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3080" }, { "trust": 0.2, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.2, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.2, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.2, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.2, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://marc.info/?t=126203102000001\u0026amp;r=1\u0026amp;w=2" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/189.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2010:0020" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=19694" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/894-1/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-iop32x_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-footbridge_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-26etch2.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-iop32x_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-26etch2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-rpc_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-ip32_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-26etch2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-26etch2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s3c2410_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-arm_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-26etch2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-26etch2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-26etch2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-26etch2.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-26etch2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-26etch2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-26etch2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-ixp4xx_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-ixp4xx_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-26etch2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mips_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-ip22_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-26etch2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-26etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-26etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-footbridge_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-26etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-rpc_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-26etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s3c2410_2.6.18.dfsg.1-26etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-26etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-26etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2691" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3889" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.9etch3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.9etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.9etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.9etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.9etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.9etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.9etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.9etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.9etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.9etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-18-lpia_2.6.28-18.59_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-lpia_2.6.31-19.56_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304_2.6.31-304.10_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_2.6.31-19.56_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-k7_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-55.82_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-17.45_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-386_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpia_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-k7_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-rt_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-server_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4031" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-virtual_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-18.59_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-18.59.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-openvz_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpiacompat_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-virtual_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-doc_2.6.31-304.10_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-server_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-sparc64-smp_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc64-smp_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-server_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27_2.6.24-27.65_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-generic_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17-server_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-55.82_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4141" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-27.65_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-17.45_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic-pae_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-17.45.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-686_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2-source-2.6.31_2.6.31-304.10_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-virtual_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc-smp_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-server_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0006" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-generic_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-server_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-sparc64_2.6.31-19.56_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-openvz_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-generic_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-sparc64-smp_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-686_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-generic_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.31-19.56.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-27.65_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-386_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18_2.6.28-18.59_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-generic_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-27.65.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-amd64-xeon_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-386_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-sparc64-smp_2.6.24-27.65_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-mvl-dove/linux-mvl-dove_2.6.31-211.22.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-27-lpia_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-image-2.6.31-304-ec2_2.6.31-304.10_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-27.65_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-server_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-17_2.6.27-17.45_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-generic_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc64-smp_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19_2.6.31-19.56_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-ec2_2.6.31-304.10.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-386_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-rt_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/char-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-virtual_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-ec2/linux-headers-2.6.31-304-ec2_2.6.31-304.10_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-virtual_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.31_2.6.31-19.56_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-virtual_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-17.45_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-lpia_2.6.31-19.56_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-386_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-55.82.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-27-xen_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-fsl-imx51/linux-fsl-imx51_2.6.31-108.21.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.31-19.56_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-generic_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.31-19-powerpc64-smp_2.6.31-19.56_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-27-powerpc-smp_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-18-generic_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-sparc64_2.6.15-55.82_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-27-386_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-55_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-server-bigiron_2.6.15-55.82_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-18-generic-di_2.6.28-18.59_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/char-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-27-xen_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-17-server_2.6.27-17.45_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-18-generic_2.6.28-18.59_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-18-lpia_2.6.28-18.59_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-generic_2.6.24-27.65_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-18-lpia-di_2.6.28-18.59_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.31-19-generic-di_2.6.31-19.56_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-27-server_2.6.24-27.65_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-18-generic-di_2.6.28-18.59_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-17-generic-di_2.6.27-17.45_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-386-di_2.6.15-55.82_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-27-powerpc_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-amd64-k8_2.6.15-55.82_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-server_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-55-sparc64-di_2.6.15-55.82_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-27-386-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-27.65_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-powerpc64-smp-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.31-19-386_2.6.31-19.56_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.31-19-powerpc-di_2.6.31-19.56_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-18.59_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-27-generic-di_2.6.24-27.65_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.31-19-server_2.6.31-19.56_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.31-19-sparc64-di_2.6.31-19.56_sparc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-27-powerpc-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-55-powerpc-smp_2.6.15-55.82_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-27-generic-di_2.6.24-27.65_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-17-generic-di_2.6.27-17.45_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-27-powerpc64-smp-di_2.6.24-27.65_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-27-sparc64-di_2.6.24-27.65_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.31-19-generic-di_2.6.31-19.56_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.31-19-lpia-di_2.6.31-19.56_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-55-amd64-generic-di_2.6.15-55.82_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-55-powerpc64-smp-di_2.6.15-55.82_powerpc.udeb" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1386" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3547" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4567" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0001" }, { "trust": 0.1, "url": "http://bit.ly/aqtcqn" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4567" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2908" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1013127" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1377" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2409" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3620" }, { "trust": 0.1, "url": "http://www.vmware.com/security" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3228" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4021" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1387" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0427" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0426" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-6304" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3939" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4020" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3736" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2695" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3556" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1378" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3621" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0097" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4537" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0290" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3547" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3612" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3613" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4138" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4272" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0382" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1384" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4355" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4141" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2908" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3613" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0590" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4538" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3620" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3726" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6304" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2910" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3556" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3612" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1379" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4212" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4537" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3889" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2910" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3563" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3228" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1787" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1035110" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esxe350-201105401-o-sg.zip" }, { "trust": 0.1, "url": "http://downloads.vmware.com/d/info/desktop_downloads/vmware_player/3_0" }, { "trust": 0.1, "url": "https://hostupdate.vmware.com/software/vum/offline/release-277-20110424-816604/esx400-201104001.zip" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1188" }, { "trust": 0.1, "url": "http://downloads.vmware.com/d/info/desktop_downloads/vmware_fusion_for_the_mac/3_0" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2217" }, { "trust": 0.1, "url": "http://downloads.vmware.com/support/fusion3/doc/releasenotes_fusion_313.html" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1036402" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2145" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1036754" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2240" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1035111" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2240" }, { "trust": 0.1, "url": "https://hostupdate.vmware.com/software/vum/offline/release-275-20110420-062017/esx410-201104001.zip" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2217" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx350-201105404-sg.zip" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2145" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2146" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1036403" }, { "trust": 0.1, "url": "http://downloads.vmware.com/d/info/desktop_downloads/vmware_workstation/7_0" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1037260" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1036399" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1188" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1037261" }, { "trust": 0.1, "url": "https://hostupdate.vmware.com/software/vum/offline/release-278-20110424-080274/esxi400-201104001.zip" }, { "trust": 0.1, "url": "http://enigmail.mozdev.org/" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx350-201105406-sg.zip" }, { "trust": 0.1, "url": "https://hostupdate.vmware.com/software/vum/offline/release-276-20110420-682352/esxi410-201104001.zip" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2146" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1787" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx350-201105401-sg.zip" }, { "trust": 0.1, "url": "https://www.vmware.com/support/player31/doc/releasenotes_player314.html" }, { "trust": 0.1, "url": "http://downloads.vmware.com/support/ws71/doc/releasenotes_ws714.html" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc64_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-versatile_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mips_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r4k-ip22_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0309" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc64_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-ip32_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r4k-ip22_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc-smp_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny2.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-mckinley_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc64_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-itanium_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-ip32_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64-smp_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc-smp_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny1.diff.gz" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0307" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc64_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0298" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-versatile_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mips_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-xen-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-2-xen-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-mckinley_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-486_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4027" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r4k-ip22_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390-tape_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-5kc-malta_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686-bigmem_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-ixp4xx_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-i386_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3939" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc64_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-s390_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-ip32_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sparc64-smp_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-xen-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-legacy_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-hppa_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-armel_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-openvz-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-ia64_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-21lenny2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-mckinley_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-smp_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-orion5x_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390x_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-iop32x_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-5kc-malta_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64-smp_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-4kc-malta_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-footbridge_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-ixp4xx_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-21lenny2.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r4k-ip22_2.6.26-21lenny3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-alpha_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-cobalt_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-openvz-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-footbridge_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-vserver_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-sparc64_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-itanium_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-mipsel_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-smp_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-arm_2.6.26-21lenny3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-legacy_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-sparc_2.6.26-21lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-sparc64_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-alpha-generic_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-s390_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-21lenny3_hppa.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0306" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1a-bcm91480b_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-21lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-2_2.6.26-21lenny3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-s390x_2.6.26-21lenny2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-r5k-cobalt_2.6.26-21lenny3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-s390x_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-686-bigmem_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-sparc64_2.6.26-21lenny2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-amd64_2.6.26-21lenny2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-powerpc-smp_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-alpha-generic_2.6.26-21lenny2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-parisc-smp_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-xen_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-parisc64-smp_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-mckinley_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-itanium_2.6.26-21lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-powerpc_2.6.26-21lenny3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-orion5x_2.6.26-21lenny3_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-vserver-686-bigmem_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-all_2.6.26-21lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-486_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-686_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-itanium_2.6.26-21lenny3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-iop32x_2.6.26-21lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-s390x_2.6.26-21lenny3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-vserver-amd64_2.6.26-21lenny2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-2-xen-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-amd64_2.6.26-21lenny3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common_2.6.26-21lenny2_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-sb1-bcm91250a_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-2-common-openvz_2.6.26-21lenny3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-r5k-ip32_2.6.26-21lenny2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-2-4kc-malta_2.6.26-21lenny3_mipsel.deb" } ], "sources": [ { "db": "VULHUB", "id": "VHN-41982" }, { "db": "VULMON", "id": "CVE-2009-4536" }, { "db": "BID", "id": "37519" }, { "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "db": "PACKETSTORM", "id": "86600" }, { "db": "PACKETSTORM", "id": "86790" }, { "db": "PACKETSTORM", "id": "85958" }, { "db": "PACKETSTORM", "id": "90046" }, { "db": "PACKETSTORM", "id": "101970" }, { "db": "PACKETSTORM", "id": "86286" }, { "db": "CNNVD", "id": "CNNVD-201001-076" }, { "db": "NVD", "id": "CVE-2009-4536" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-41982" }, { "db": "VULMON", "id": "CVE-2009-4536" }, { "db": "BID", "id": "37519" }, { "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "db": "PACKETSTORM", "id": "86600" }, { "db": "PACKETSTORM", "id": "86790" }, { "db": "PACKETSTORM", "id": "85958" }, { "db": "PACKETSTORM", "id": "90046" }, { "db": "PACKETSTORM", "id": "101970" }, { "db": "PACKETSTORM", "id": "86286" }, { "db": "CNNVD", "id": "CNNVD-201001-076" }, { "db": "NVD", "id": "CVE-2009-4536" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-12T00:00:00", "db": "VULHUB", "id": "VHN-41982" }, { "date": "2010-01-12T00:00:00", "db": "VULMON", "id": "CVE-2009-4536" }, { "date": "2009-12-29T00:00:00", "db": "BID", "id": "37519" }, { "date": "2010-02-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "date": "2010-02-24T00:55:37", "db": "PACKETSTORM", "id": "86600" }, { "date": "2010-03-01T21:20:35", "db": "PACKETSTORM", "id": "86790" }, { "date": "2010-02-05T16:17:54", "db": "PACKETSTORM", "id": "85958" }, { "date": "2010-05-28T20:14:56", "db": "PACKETSTORM", "id": "90046" }, { "date": "2011-06-03T16:16:00", "db": "PACKETSTORM", "id": "101970" }, { "date": "2010-02-15T20:31:13", "db": "PACKETSTORM", "id": "86286" }, { "date": "2009-12-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-076" }, { "date": "2010-01-12T17:30:00.697000", "db": "NVD", "id": "CVE-2009-4536" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-16T00:00:00", "db": "VULHUB", "id": "VHN-41982" }, { "date": "2018-11-16T00:00:00", "db": "VULMON", "id": "CVE-2009-4536" }, { "date": "2015-05-07T17:01:00", "db": "BID", "id": "37519" }, { "date": "2011-06-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001004" }, { "date": "2010-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-076" }, { "date": "2024-11-21T01:09:51.777000", "db": "NVD", "id": "CVE-2009-4536" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-076" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux kernel of e1000 Vulnerability in driver that bypasses packet filter restrictions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001004" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-076" } ], "trust": 0.6 } }
gsd-2009-4536
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2009-4536", "description": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "id": "GSD-2009-4536", "references": [ "https://www.suse.com/security/cve/CVE-2009-4536.html", "https://www.debian.org/security/2010/dsa-2005", "https://www.debian.org/security/2010/dsa-2003", "https://www.debian.org/security/2010/dsa-1996", "https://access.redhat.com/errata/RHSA-2010:0882", "https://access.redhat.com/errata/RHSA-2010:0111", "https://access.redhat.com/errata/RHSA-2010:0095", "https://access.redhat.com/errata/RHSA-2010:0079", "https://access.redhat.com/errata/RHSA-2010:0053", "https://access.redhat.com/errata/RHSA-2010:0041", "https://access.redhat.com/errata/RHSA-2010:0020", "https://access.redhat.com/errata/RHSA-2010:0019", "https://linux.oracle.com/cve/CVE-2009-4536.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-4536" ], "details": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "id": "GSD-2009-4536", "modified": "2023-12-13T01:19:45.811497Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35265", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35265" }, { "name": "38276", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38276" }, { "name": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2", "refsource": "CONFIRM", "url": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2" }, { "name": "1023420", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023420" }, { "name": "oval:org.mitre.oval:def:13226", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226" }, { "name": "SUSE-SA:2010:007", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" }, { "name": "RHSA-2010:0111", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0111.html" }, { "name": "38779", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38779" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=552126", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "name": "oval:org.mitre.oval:def:12440", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440" }, { "name": "oval:org.mitre.oval:def:10607", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607" }, { "name": "38296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38296" }, { "name": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/", "refsource": "MISC", "url": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/" }, { "name": "SUSE-SA:2010:012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "RHSA-2010:0053", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0053.html" }, { "name": "SUSE-SA:2010:014", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" }, { "name": "RHSA-2010:0882", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "kernel-e1000main-security-bypass(55648)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55648" }, { "name": "DSA-1996", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-1996" }, { "name": "RHSA-2010:0019", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0019.html" }, { "name": "[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/12/28/1" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "FEDORA-2010-1787", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html" }, { "name": "37519", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37519" }, { "name": "[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/12/29/2" }, { "name": "SUSE-SA:2010:013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" }, { "name": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html", "refsource": "MISC", "url": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html" }, { "name": "RHSA-2010:0095", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html" }, { "name": "SUSE-SA:2010:005", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" }, { "name": "[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/12/31/1" }, { "name": "RHSA-2010:0020", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0020.html" }, { "name": "38031", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38031" }, { "name": "38610", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38610" }, { "name": "oval:org.mitre.oval:def:7453", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453" }, { "name": "DSA-2005", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "SUSE-SA:2010:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" }, { "name": "RHSA-2010:0041", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0041.html" }, { "name": "38492", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38492" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.32.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4536" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-189" } ] } ] }, "references": { "reference_data": [ { "name": "38031", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38031" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=552126", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "name": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/" }, { "name": "35265", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/35265" }, { "name": "37519", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/37519" }, { "name": "[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/29/2" }, { "name": "RHSA-2010:0020", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0020.html" }, { "name": "RHSA-2010:0019", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0019.html" }, { "name": "1023420", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1023420" }, { "name": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2", "refsource": "CONFIRM", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2" }, { "name": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html" }, { "name": "[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/31/1" }, { "name": "[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2009/12/28/1" }, { "name": "RHSA-2010:0041", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0041.html" }, { "name": "RHSA-2010:0095", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html" }, { "name": "RHSA-2010:0111", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0111.html" }, { "name": "SUSE-SA:2010:013", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" }, { "name": "SUSE-SA:2010:012", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "name": "SUSE-SA:2010:010", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" }, { "name": "DSA-1996", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-1996" }, { "name": "FEDORA-2010-1787", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html" }, { "name": "38492", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38492" }, { "name": "38276", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38276" }, { "name": "SUSE-SA:2010:005", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" }, { "name": "SUSE-SA:2010:007", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" }, { "name": "38296", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38296" }, { "name": "DSA-2005", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-2005" }, { "name": "RHSA-2010:0053", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0053.html" }, { "name": "38610", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38610" }, { "name": "SUSE-SA:2010:014", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" }, { "name": "38779", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38779" }, { "name": "RHSA-2010:0882", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" }, { "name": "kernel-e1000main-security-bypass(55648)", "refsource": "XF", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55648" }, { "name": "oval:org.mitre.oval:def:7453", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453" }, { "name": "oval:org.mitre.oval:def:13226", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226" }, { "name": "oval:org.mitre.oval:def:12440", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440" }, { "name": "oval:org.mitre.oval:def:10607", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-11-16T15:51Z", "publishedDate": "2010-01-12T17:30Z" } } }
ghsa-f8hp-66pw-jmc7
Vulnerability from github
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
{ "affected": [], "aliases": [ "CVE-2009-4536" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-01-12T17:30:00Z", "severity": "HIGH" }, "details": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "id": "GHSA-f8hp-66pw-jmc7", "modified": "2022-05-02T03:55:42Z", "published": "2022-05-02T03:55:42Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55648" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html" }, { "type": "WEB", "url": "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups" }, { "type": "WEB", "url": "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" }, { "type": "WEB", "url": "http://marc.info/?t=126203102000001\u0026r=1\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/35265" }, { "type": "WEB", "url": "http://secunia.com/advisories/38031" }, { "type": "WEB", "url": "http://secunia.com/advisories/38276" }, { "type": "WEB", "url": "http://secunia.com/advisories/38296" }, { "type": "WEB", "url": "http://secunia.com/advisories/38492" }, { "type": "WEB", "url": "http://secunia.com/advisories/38610" }, { "type": "WEB", "url": "http://secunia.com/advisories/38779" }, { "type": "WEB", "url": "http://securitytracker.com/id?1023420" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-1996" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2005" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/12/28/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/12/29/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/12/31/1" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0019.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0020.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0041.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0053.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0111.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/37519" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0009.html" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.