Action not permitted
Modal body text goes here.
cve-2007-3851
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25263", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25263" }, { "name": "26389", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26389" }, { "name": "27227", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27227" }, { "name": "26664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26664" }, { "name": "26643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26643" }, { "name": "SUSE-SA:2007:051", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html" }, { "name": "SUSE-SA:2007:053", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1620" }, { "name": "USN-510-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-510-1" }, { "name": "DSA-1356", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1356" }, { "name": "USN-509-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-509-1" }, { "name": "oval:org.mitre.oval:def:11196", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11196" }, { "name": "26760", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26760" }, { "name": "RHSA-2007:0705", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html" }, { "name": "MDVSA-2008:105", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:105" }, { "name": "ADV-2007-2854", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2854" }, { "name": "26500", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26500" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2" }, { "name": "26450", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "25263", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25263" }, { "name": "26389", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26389" }, { "name": "27227", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27227" }, { "name": "26664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26664" }, { "name": "26643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26643" }, { "name": "SUSE-SA:2007:051", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html" }, { "name": "SUSE-SA:2007:053", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1620" }, { "name": "USN-510-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-510-1" }, { "name": "DSA-1356", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1356" }, { "name": "USN-509-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-509-1" }, { "name": "oval:org.mitre.oval:def:11196", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11196" }, { "name": "26760", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26760" }, { "name": "RHSA-2007:0705", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html" }, { "name": "MDVSA-2008:105", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:105" }, { "name": "ADV-2007-2854", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2854" }, { "name": "26500", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26500" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2" }, { "name": "26450", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26450" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-3851", "datePublished": "2007-08-13T19:00:00", "dateReserved": "2007-07-18T00:00:00", "dateUpdated": "2024-08-07T14:28:52.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-3851\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-08-13T19:17:00.000\",\"lastModified\":\"2017-09-29T01:29:08.157\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.\"},{\"lang\":\"es\",\"value\":\"El componente drm/i915 en el n\u00facleo Linux anterior a 2.6.22.2, cuando se usa con el conjunto de chips (chipset) i965G y posteriores, permite a usuarios locales con acceso a una sesi\u00f3n X11 y al Direct Rendering Manager (DRM) escribir a posiciones de memoria de su elecci\u00f3n y obtener privilegios mediante un b\u00fafer de ejecuci\u00f3n por lotes (batchbuffer) manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:S/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":6.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":1.5,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.22.1\",\"matchCriteriaId\":\"37B99E64-8A0A-4B5E-A2E5-34F2E612F7DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:i915_chipset:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A78D73-3C00-47E8-A8E7-285A2C83A8A6\"}]}]}],\"references\":[{\"url\":\"http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26389\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26450\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26500\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26643\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26664\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26760\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27227\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1356\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:105\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_51_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_53_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0705.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/25263\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-509-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-510-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2854\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1620\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11196\",\"source\":\"secalert@redhat.com\"}]}}" } }
rhsa-2007_0705
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix various security issues in the Red Hat\nEnterprise Linux 5 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the following security issues:\n\n* a flaw in the DRM driver for Intel graphics cards that allowed a local\nuser to access any part of the main memory. To access the DRM functionality\na user must have access to the X server which is granted through the\ngraphical login. This also only affected systems with an Intel 965 or later\ngraphic chipset. (CVE-2007-3851, Important)\n\n* a flaw in the VFAT compat ioctl handling on 64-bit systems that allowed a\nlocal user to corrupt a kernel_dirent struct and cause a denial of service\n(system crash). (CVE-2007-2878, Important)\n\n* a flaw in the connection tracking support for SCTP that allowed a remote\nuser to cause a denial of service by dereferencing a NULL pointer.\n(CVE-2007-2876, Important)\n\n* flaw in the CIFS filesystem which could cause the umask values of a\nprocess to not be honored. This affected CIFS filesystems where the Unix\nextensions are supported. (CVE-2007-3740, Important)\n\n* a flaw in the stack expansion when using the hugetlb kernel on PowerPC\nsystems that allowed a local user to cause a denial of service.\n(CVE-2007-3739, Moderate)\n\n* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a\ndenial of service or potential remote access. Exploitation would require\nthe attacker to be able to send arbitrary frames over the ISDN network to\nthe victim\u0027s machine. (CVE-2007-1217, Moderate)\n\n* a flaw in the cpuset support that allowed a local user to obtain\nsensitive information from kernel memory. To exploit this the cpuset\nfilesystem would have to already be mounted. (CVE-2007-2875, Moderate)\n\n* a flaw in the CIFS handling of the mount option \"sec=\" that didn\u0027t enable\nintegrity checking and didn\u0027t produce any error message. (CVE-2007-3843,\nLow)\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these packages,\nwhich contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0705", "url": "https://access.redhat.com/errata/RHSA-2007:0705" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "232260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=232260" }, { "category": "external", "summary": "245773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245773" }, { "category": "external", "summary": "245774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245774" }, { "category": "external", "summary": "247726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247726" }, { "category": "external", "summary": "251185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251185" }, { "category": "external", "summary": "253313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253313" }, { "category": "external", "summary": "253314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253314" }, { "category": "external", "summary": "253315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=253315" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0705.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T01:36:20+00:00", "generator": { "date": "2024-11-22T01:36:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0705", "initial_release_date": "2007-09-13T09:13:00+00:00", "revision_history": [ { "date": "2007-09-13T09:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-09-13T05:21:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:36:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-devel-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-xen-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686", "product_id": "kernel-PAE-0:2.6.18-8.1.10.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-8.1.10.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-8.1.10.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.i386", "product_id": "kernel-headers-0:2.6.18-8.1.10.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-8.1.10.el5.x86_64", "product": { "name": "kernel-0:2.6.18-8.1.10.el5.x86_64", "product_id": "kernel-0:2.6.18-8.1.10.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-8.1.10.el5.src", "product": { "name": "kernel-0:2.6.18-8.1.10.el5.src", "product_id": "kernel-0:2.6.18-8.1.10.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch", "product_id": "kernel-doc-0:2.6.18-8.1.10.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-8.1.10.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-8.1.10.el5.ia64", "product": { "name": "kernel-0:2.6.18-8.1.10.el5.ia64", "product_id": "kernel-0:2.6.18-8.1.10.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64", "product_id": "kernel-devel-0:2.6.18-8.1.10.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64", "product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64", "product_id": "kernel-xen-0:2.6.18-8.1.10.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-8.1.10.el5.ppc64", "product": { "name": "kernel-0:2.6.18-8.1.10.el5.ppc64", "product_id": "kernel-0:2.6.18-8.1.10.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-8.1.10.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-8.1.10.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-8.1.10.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc", "product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-8.1.10.el5.s390x", "product": { "name": "kernel-0:2.6.18-8.1.10.el5.s390x", "product_id": "kernel-0:2.6.18-8.1.10.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x", "product_id": "kernel-devel-0:2.6.18-8.1.10.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x", "product_id": "kernel-headers-0:2.6.18-8.1.10.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.src" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-8.1.10.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.src" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-8.1.10.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-1217", "discovery_date": "2007-03-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "402741" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: CAPI overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-1217" }, { "category": "external", "summary": "RHBZ#402741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=402741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1217", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1217" } ], "release_date": "2007-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-09-13T09:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2007:0705" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: CAPI overflow" }, { "cve": "CVE-2007-2875", "discovery_date": "2007-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "245773" } ], "notes": [ { "category": "description", "text": "Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cpuset information leak", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2875" }, { "category": "external", "summary": "RHBZ#245773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245773" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2875", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2875" } ], "release_date": "2007-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-09-13T09:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2007:0705" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cpuset information leak" }, { "cve": "CVE-2007-2876", "discovery_date": "2007-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "245774" } ], "notes": [ { "category": "description", "text": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2876" }, { "category": "external", "summary": "RHBZ#245774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245774" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2876", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876" } ], "release_date": "2007-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-09-13T09:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2007:0705" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference" }, { "cve": "CVE-2007-2878", "discovery_date": "2007-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "247726" } ], "notes": [ { "category": "description", "text": "The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run on a 64-bit system, allow local users to corrupt a kernel_dirent struct and cause a denial of service (system crash) via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "VFAT compat ioctls DoS on 64-bit", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2878" }, { "category": "external", "summary": "RHBZ#247726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=247726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2878", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2878" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2878", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2878" } ], "release_date": "2007-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-09-13T09:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2007:0705" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "VFAT compat ioctls DoS on 64-bit" }, { "cve": "CVE-2007-3739", "discovery_date": "2007-07-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "294941" } ], "notes": [ { "category": "description", "text": "mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "LTC36188-Don\u0027t allow the stack to grow into hugetlb reserved regions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3739" }, { "category": "external", "summary": "RHBZ#294941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=294941" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3739", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3739" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3739", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3739" } ], "release_date": "2007-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-09-13T09:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2007:0705" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "LTC36188-Don\u0027t allow the stack to grow into hugetlb reserved regions" }, { "cve": "CVE-2007-3740", "discovery_date": "2007-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "275881" } ], "notes": [ { "category": "description", "text": "The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "CIFS should honor umask", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3740" }, { "category": "external", "summary": "RHBZ#275881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=275881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3740", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3740" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3740", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3740" } ], "release_date": "2007-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-09-13T09:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2007:0705" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CIFS should honor umask" }, { "cve": "CVE-2007-3843", "discovery_date": "2007-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "275901" } ], "notes": [ { "category": "description", "text": "The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.", "title": "Vulnerability description" }, { "category": "summary", "text": "CIFS signing sec= mount options don\u0027t work correctly", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3843" }, { "category": "external", "summary": "RHBZ#275901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=275901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3843", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3843" } ], "release_date": "2007-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-09-13T09:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2007:0705" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "CIFS signing sec= mount options don\u0027t work correctly" }, { "cve": "CVE-2007-3851", "discovery_date": "2007-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "251185" } ], "notes": [ { "category": "description", "text": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "i965 DRM allows insecure packets", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3851" }, { "category": "external", "summary": "RHBZ#251185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3851", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3851" } ], "release_date": "2007-08-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-09-13T09:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-0:2.6.18-8.1.10.el5.src", "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-0:2.6.18-8.1.10.el5.src", "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x", "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2007:0705" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "i965 DRM allows insecure packets" } ] }
ghsa-fvc6-7939-69wx
Vulnerability from github
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
{ "affected": [], "aliases": [ "CVE-2007-3851" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-08-13T19:17:00Z", "severity": "MODERATE" }, "details": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.", "id": "GHSA-fvc6-7939-69wx", "modified": "2022-05-01T18:17:49Z", "published": "2022-05-01T18:17:49Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3851" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1620" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11196" }, { "type": "WEB", "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2" }, { "type": "WEB", "url": "http://secunia.com/advisories/26389" }, { "type": "WEB", "url": "http://secunia.com/advisories/26450" }, { "type": "WEB", "url": "http://secunia.com/advisories/26500" }, { "type": "WEB", "url": "http://secunia.com/advisories/26643" }, { "type": "WEB", "url": "http://secunia.com/advisories/26664" }, { "type": "WEB", "url": "http://secunia.com/advisories/26760" }, { "type": "WEB", "url": "http://secunia.com/advisories/27227" }, { "type": "WEB", "url": "http://www.debian.org/security/2007/dsa-1356" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:105" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/25263" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-509-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-510-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2854" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2007-3851
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2007-3851", "description": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.", "id": "GSD-2007-3851", "references": [ "https://www.suse.com/security/cve/CVE-2007-3851.html", "https://www.debian.org/security/2007/dsa-1356", "https://access.redhat.com/errata/RHSA-2007:0705", "https://linux.oracle.com/cve/CVE-2007-3851.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-3851" ], "details": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.", "id": "GSD-2007-3851", "modified": "2023-12-13T01:21:42.390665Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-3851", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/26664", "refsource": "MISC", "url": "http://secunia.com/advisories/26664" }, { "name": "http://secunia.com/advisories/27227", "refsource": "MISC", "url": "http://secunia.com/advisories/27227" }, { "name": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html" }, { "name": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html", "refsource": "MISC", "url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html" }, { "name": "http://secunia.com/advisories/26760", "refsource": "MISC", "url": "http://secunia.com/advisories/26760" }, { "name": "http://www.redhat.com/support/errata/RHSA-2007-0705.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html" }, { "name": "http://www.ubuntu.com/usn/usn-510-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-510-1" }, { "name": "http://secunia.com/advisories/26450", "refsource": "MISC", "url": "http://secunia.com/advisories/26450" }, { "name": "http://secunia.com/advisories/26500", "refsource": "MISC", "url": "http://secunia.com/advisories/26500" }, { "name": "http://secunia.com/advisories/26643", "refsource": "MISC", "url": "http://secunia.com/advisories/26643" }, { "name": "http://www.debian.org/security/2007/dsa-1356", "refsource": "MISC", "url": "http://www.debian.org/security/2007/dsa-1356" }, { "name": "http://www.ubuntu.com/usn/usn-509-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-509-1" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:105", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:105" }, { "name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2", "refsource": "MISC", "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2" }, { "name": "http://secunia.com/advisories/26389", "refsource": "MISC", "url": "http://secunia.com/advisories/26389" }, { "name": "http://www.securityfocus.com/bid/25263", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/25263" }, { "name": "http://www.vupen.com/english/advisories/2007/2854", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/2854" }, { "name": "https://issues.rpath.com/browse/RPL-1620", "refsource": "MISC", "url": "https://issues.rpath.com/browse/RPL-1620" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11196", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11196" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.22.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i915_chipset:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-3851" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "26389", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26389" }, { "name": "https://issues.rpath.com/browse/RPL-1620", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-1620" }, { "name": "DSA-1356", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2007/dsa-1356" }, { "name": "RHSA-2007:0705", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html" }, { "name": "SUSE-SA:2007:051", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html" }, { "name": "SUSE-SA:2007:053", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html" }, { "name": "USN-510-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-510-1" }, { "name": "USN-509-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-509-1" }, { "name": "25263", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/25263" }, { "name": "26500", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/26500" }, { "name": "26450", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/26450" }, { "name": "26643", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/26643" }, { "name": "26760", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/26760" }, { "name": "26664", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/26664" }, { "name": "27227", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/27227" }, { "name": "MDVSA-2008:105", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:105" }, { "name": "ADV-2007-2854", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/2854" }, { "name": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2", "refsource": "CONFIRM", "tags": [], "url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2" }, { "name": "oval:org.mitre.oval:def:11196", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11196" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-29T01:29Z", "publishedDate": "2007-08-13T19:17Z" } } }
var-200708-0604
Vulnerability from variot
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer. The Linux kernel is prone to a local privilege-escalation vulnerability. Exploiting this issue may allow local attackers to gain elevated privileges, facilitating the complete compromise of affected computers. Versions of Linux kernel prior to 2.6.22.2 are vulnerable to this issue. =========================================================== Ubuntu Security Notice USN-510-1 August 31, 2007 linux-source-2.6.20 vulnerabilities CVE-2007-2525, CVE-2007-2875, CVE-2007-2876, CVE-2007-2878, CVE-2007-3104, CVE-2007-3105, CVE-2007-3513, CVE-2007-3642, CVE-2007-3843, CVE-2007-3848, CVE-2007-3851, CVE-2007-4308 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 7.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 7.04: linux-image-2.6.20-16-386 2.6.20-16.31 linux-image-2.6.20-16-generic 2.6.20-16.31 linux-image-2.6.20-16-hppa32 2.6.20-16.31 linux-image-2.6.20-16-hppa64 2.6.20-16.31 linux-image-2.6.20-16-itanium 2.6.20-16.31 linux-image-2.6.20-16-lowlatency 2.6.20-16.31 linux-image-2.6.20-16-mckinley 2.6.20-16.31 linux-image-2.6.20-16-powerpc 2.6.20-16.31 linux-image-2.6.20-16-powerpc-smp 2.6.20-16.31 linux-image-2.6.20-16-powerpc64-smp 2.6.20-16.31 linux-image-2.6.20-16-server 2.6.20-16.31 linux-image-2.6.20-16-server-bigiron 2.6.20-16.31 linux-image-2.6.20-16-sparc64 2.6.20-16.31 linux-image-2.6.20-16-sparc64-smp 2.6.20-16.31
After a standard system upgrade you need to reboot your computer to affect the necessary changes.
Details follow:
A flaw was discovered in the PPP over Ethernet implementation. Local attackers could manipulate ioctls and cause kernel memory consumption leading to a denial of service. (CVE-2007-2525)
An integer underflow was discovered in the cpuset filesystem. If mounted, local attackers could obtain kernel memory using large file offsets while reading the tasks file. This could disclose sensitive data. (CVE-2007-2875)
Vilmos Nebehaj discovered that the SCTP netfilter code did not correctly validate certain states. A remote attacker could send a specially crafted packet causing a denial of service. (CVE-2007-2876)
Luca Tettamanti discovered a flaw in the VFAT compat ioctls on 64-bit systems. A local attacker could corrupt a kernel_dirent struct and cause a denial of service. (CVE-2007-2878)
A flaw in the sysfs_readdir function allowed a local user to cause a denial of service by dereferencing a NULL pointer. (CVE-2007-3104)
A buffer overflow was discovered in the random number generator. In environments with granular assignment of root privileges, a local attacker could gain additional privileges. (CVE-2007-3105)
A flaw was discovered in the usblcd driver. A local attacker could cause large amounts of kernel memory consumption, leading to a denial of service. (CVE-2007-3513)
Zhongling Wen discovered that the h323 conntrack handler did not correctly handle certain bitfields. A remote attacker could send a specially crafted packet and cause a denial of service. (CVE-2007-3642)
A flaw was discovered in the CIFS mount security checking. Remote attackers could spoof CIFS network traffic, which could lead a client to trust the connection. (CVE-2007-3843)
It was discovered that certain setuid-root processes did not correctly reset process death signal handlers. A local user could manipulate this to send signals to processes they would not normally have access to. (CVE-2007-3848)
The Direct Rendering Manager for the i915 driver could be made to write to arbitrary memory locations. An attacker with access to a running X11 session could send a specially crafted buffer and gain root privileges. (CVE-2007-3851)
It was discovered that the aacraid SCSI driver did not correctly check permissions on certain ioctls. A local attacker could cause a denial of service or gain privileges. (CVE-2007-4308)
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31.diff.gz
Size/MD5: 1577853 d02fd4ba44af531c4eb5c8035fbe3a3f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31.dsc
Size/MD5: 2472 b5489267cd7642fc1af25f1a4fb2aa4a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20.orig.tar.gz
Size/MD5: 62174876 f19203b2488d943a640abe8f3cd20f57
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-doc-2.6.20_2.6.20-16.31_all.deb
Size/MD5: 4877040 3c8035f595205bf4ac22cc20acdd6794
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-kernel-devel_2.6.20-16.31_all.deb
Size/MD5: 84870 94e07da627c80ce5b54db4f6eb59812b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31_all.deb
Size/MD5: 47822126 598e49bbe0381668e0b471dcb580563f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 24494 b980d0baa6f45bd2d9c6ea3b71491996
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 202070 30b2f790562a3b5ffc8f6baf54cf5def
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 39354 0933702198ce478aa4b1842c8b12ac8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 50910 9b7df5269dd71693804155d712008929
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 187502 faf88d2629336c2da3949e4018474771
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 34906 27ab0c4687f3982b121851f2f875e491
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 644422 46b3463556bff461e1b781c381e9ca1c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 174704 9c94e0c3af584b38143b1672ae1b0b0f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 76424 b53a41dd02648eacb54debe890388be5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 57886 f2d1733f4b960c624f14589a36ec5ebb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 140014 10367ad74fa4252b5d0d080a254938d9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 277466 3b3731edab4901d7234fbea7f6c7974e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 1905414 b7a3da16e9217bae2d90fd2fbf66235c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-generic_2.6.20-16.31_amd64.deb
Size/MD5: 857546 37ed6063fb5c8f4dbfba9ab6dd5736da
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb
Size/MD5: 857378 31446d9184e0346b56680b8321a20734
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server_2.6.20-16.31_amd64.deb
Size/MD5: 856618 26eae5ee867cd1c209920aad4c9e3195
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_amd64.deb
Size/MD5: 8128538 49ac62df22c8cceeb563991baf7917c1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-generic_2.6.20-16.31_amd64.deb
Size/MD5: 23066094 111d7dbd3fcb9c8571f7007c334b1c72
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server_2.6.20-16.31_amd64.deb
Size/MD5: 23386510 d2a8aeecf1278d8cfa9d73b9ac0920ed
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-generic_2.6.20-16.31_amd64.deb
Size/MD5: 18427438 060995fe8665a45d2338a4bdd9bb1c0d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server_2.6.20-16.31_amd64.deb
Size/MD5: 18698142 e57199fb26fc10293616c4698229fa60
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_amd64.deb
Size/MD5: 667956 3fc892773a94ea6130e19bbd41223669
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 246420 cdf0e83f330225229d0aac8d756bebef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 144474 52363784520d5673b37c1b00d1825835
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 225016 2cb7db7f772480b16de5a6d03797c5b6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 1110522 41b51553dde0a4c1fe3a6cba67a943ac
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 1754820 0b67f1cc816f96777c4035f4536dc34d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 140922 68de52e127bbeabceda23d61a36322f3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 163320 ad8f39c56c00d85cb69e0d14cd7510d1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 265728 f9bf51de08b4b70546e7bb412dedfe5e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 34298 bd875a9e3a6204b2e2c81851e763c501
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 38438 126954fc2b53b6371332715fcf97b8fc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 67682 82587156ac6bbf9b24485f3e47ba73e8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 20962 40eadc3c9036b2e47dddc43561eae9d8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 8328 45da242f89022fb095499adf1ad4229f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 54580 1de7964374ceaa29e42b1ee4c46722b2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 86016 301d95060d03db0efbd6a13b087c46dd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 322570 ac8b968393ae953b9df98134ae117861
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 1046886 84c9ea8c539c15bdaff8ca8f37cbdf7a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 43976 0ddc45fffff5249b5551b2e673b73b15
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 12012 ccb1f0c0fbc1074e1b1ccbee31630597
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 61918 982e8d147d6b54edb3a8f83adc3c6086
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 377828 cad9af34b502d072b7922f700d077f47
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb
Size/MD5: 66666 628ae089db689328b0a41682bf0e5900
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb
Size/MD5: 23125936 b1a8c95965a2ef280b13a422a4d6173c
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb
Size/MD5: 18477150 34a36604a92f81d1560457bd113330b1
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 20322 e8ab9fd789fe1b8f0c8546c00e763e25
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 22888 8d0d299344fde6654991003cbac384f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 210074 efa1c3d6a93ccb7296d67b1d0f937681
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 212252 d48b3db497527154d378b6f9bfd0edd3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 88698 e85fbe5bf7d9909d7bc00ce6f7305959
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 35626 cde513a471134d3560aac41fbd6d70cc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 37740 fac42d0beab2e5f68baf2e19d76a2778
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 38416 12a300b67959db63206e8122d560489b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 45640 6faf39407cd6c881666e16309202e62d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 45804 5214d5c0756417da98784c85e4ede304
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 179468 53d4e47e8ffe950ccd146666101b7157
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 179830 49c07cb759ae3708ca26e09b15a943b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 32104 e574d74194c75cc699920672b137400a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 32426 3e84e290381c1cf7c2c7c0f7a5a74a6a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 648648 416f1cde45a2ecd76de54875150a7879
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 667458 00ea27a9d01f200cb65926ed9d6a9cd6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 178212 a93bea57ce7779cbc4dcce35a5487a64
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 181284 2ea1dce0a2d6b197c00946d9a44c3834
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 72392 59330a18dd5e401e938781ef311f31f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 74054 41220f95474992bbd26223aac196f4a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 53578 9a7390218ace76fa1f00e243502c3e81
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 54790 648d4b48dbef21bb4cdb57bd6177947d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 129184 f9e56d8470f376595383fbc54c3d4310
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 134878 ebb36b1cf716fa2f7ef59d2f197b95cf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 275956 294313e8e94b96b3b800f2b0830bcd89
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 274972 6f05cd6698404431694da60df75d5a7d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 1815218 7ae643f0eb6d41d7570b5b05d4922959
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 1886534 e8e1809266b9d6e3179fe8208e73e750
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-386_2.6.20-16.31_i386.deb
Size/MD5: 844272 66490409aa7465bb64db19ca4e37bac1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-generic_2.6.20-16.31_i386.deb
Size/MD5: 849482 eed7f1e2febb4e8b6a1c09ecbbe4251d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb
Size/MD5: 841878 a8c7b5f67015adbf13449a768812df54
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb
Size/MD5: 850348 bc6d77642ca93c95875eeb929cb35d12
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server_2.6.20-16.31_i386.deb
Size/MD5: 847286 f5889a4a92ff20c893742a98f366c7f4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_i386.deb
Size/MD5: 8118254 7ae93d26293ec4b8d69995342bd0784d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-386_2.6.20-16.31_i386.deb
Size/MD5: 23746716 53eb1ff56c3673abb4999657cd1289aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-generic_2.6.20-16.31_i386.deb
Size/MD5: 23812992 1b0cda5d74a37df374841374ca82cddb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb
Size/MD5: 24376420 7059f5cbf8ffc55cb16b62d0fa1d8e79
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server_2.6.20-16.31_i386.deb
Size/MD5: 23866754 435d7d5fbb668bb962a681ebafd0d0af
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-386_2.6.20-16.31_i386.deb
Size/MD5: 23587990 69734d888bdbe1417f6c88b03f5e4ff8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-generic_2.6.20-16.31_i386.deb
Size/MD5: 24165892 e9f0dd3a1cbed9f4c275bc35d31427fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb
Size/MD5: 25658356 5d4b95dbe14f67113a961a5a419d8ef8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server_2.6.20-16.31_i386.deb
Size/MD5: 24393594 720c451484e4e17ecfdfbb0036aa6506
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_i386.deb
Size/MD5: 667938 2b7ff6cd306c617c326433b931e216f8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 244602 e913dcb61ef84b6627b7f18237a712d6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 250124 7f2228c4ab74af27fba4bb22462263ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 132546 40311392b60143adc9fe23f3dd38cfb7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 133078 ca3ce80ba0b75545dc34638b5e3e3093
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 213188 4e288fe10dcec0c1392ceba87aefa0b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 220604 293c95c215960ad9c8179b1b87badb2a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 1110410 75deb32ca249568e08b0c5b2ed5cabf2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 1110518 ce208c014af3ccfd3be5a22140bf3409
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 1951376 e21d5a4cfae2c7abd52ce321a31da6e6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 1974734 db0e2ba53b60a7f75f7dab6846d1b84e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 149860 a4f1351290e30f1c4e7260eda9f88848
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 142502 6f7279214ccebd2ebae2e3e07c0366cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 160736 2a5196a2451a69a95ac4081ee383d047
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 161936 2ee85739f55c9c48454ecff39fa5cc2e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 252950 e6d25fb7085fa024c8215794bf41cf7e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 255524 ad476aca2e64994e4996e174f0129d01
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 32766 355e4201f652623ba7a425a455ddd591
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 33336 84393db083655e4746ee5f8872d1634c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 38030 3cd77914f9e2a14b45bffdbcb7afd379
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 38304 312bae8ca1298fb78eeb5f2c14024b1b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 81860 01a489568d19811b95dbda49807e554c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 82094 916c336e60e8e5a6c3ded678daf3eb67
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 47686 a554ef6d1fc404b299b2ca9eab600052
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 47720 e4bd92d0011d9968e3b11a2b53ad898d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 8262 215b2b44f65782e91f246c9892c36d9b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 8496 8325dd4d7645b52215c584ee313090c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 49958 b7fdb76f7e7b9b53bdfb61d5b4cbaf02
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 51874 b4cd612bd943018b048d33fc01e5b86b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 78852 6017590ac379305f3582cb580c53d69c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 79498 d54d0bf75b57827e777227bf42aa6696
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 322544 83fb94754d28fef49f55abe43d7210d2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 322558 3f453982483722a158b076654a2cbf13
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 1362526 a4592f0dd429f6e30cc099f576875724
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 1347968 e1eff7dc50dda5e62f0048d5b79c9cb9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 42454 b9ed0551f44707a796103007e701ea7b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 42232 3bf62f9da0492ea4b89c5e97e2331d6e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 10764 e4256b9c2b4c127c58a9767480e54fae
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 11400 379056a56e93d6f937eed48d688a8b1f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 55990 4f518d325713f1236e4b0a25f8dd7b52
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 56906 4b4737720e477381e0fb36dd4144bfbe
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 360292 771d1ef6457a09df95544efd1e60eb06
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 363244 35c8893c56a7d607a710053281fbbf91
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb
Size/MD5: 63174 3b76dd2a0add8ca514ad29439f68eecb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb
Size/MD5: 63822 c53f0bbf1e69c2640ac21d28686511fd
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb
Size/MD5: 23844340 0983e69e816ab28b4b64e334402783e8
http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb
Size/MD5: 24183898 e8003d1d07e9a8c1406a4015b69c6c3b
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 328852 a7cd45e2be9e7e24b69bddedd50bfdb4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 325564 1ef1df8e755a7a5b77b8581619c89ee0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 41192 1cac100551f5e4b6b0e2ae199611864b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 47458 9b33803ceac1d9870c77519d76a04ca2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 219676 9b9cd2b6baf413bdca155456830c6f17
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 239174 5f1653e0836212e88ba2311f02f87620
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 43658 bcfd2536cffc99bea761590c172ff275
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 39788 24d008470a22eec523ccdae1a2deefa6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 717810 bfd614b17ec4871312b6d3ac5a9a5bc6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 776474 8f19375582c1eaf502b12eecb6654ab1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 205086 15c27cf635e6df1a0a3002244c6df7b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 209732 41f77baa8bd624a3e308020161ef65a6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 59220 8edd5472ed0b49960ef60d5a08938662
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 66868 c9eab04b79d1d69cb0413a2baa82b032
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 64208 dc65a0af2c574e8be115966b8546a8b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 65334 645b7161988b7d45de3909ec5495f9f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 144020 d3bd7f70c349f7c3f418e1874e1fd3b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 162728 9e4d6c1014ee67ac7936ae633e5b8c40
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 383368 0e4c1db36a8fb12a4ed0ad6f1812cd51
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 251816 60e37f8e82d11c812da0a5fc13956ff0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 2157386 9f989874c520ef7162ff584b1b46c57c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 3083276 9593e34c7bdd87099e52fc6c9b895cab
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb
Size/MD5: 862972 b92ce0da33fa2ec26026fc0953fb08e2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb
Size/MD5: 871242 3c5ab3bbae356d7f871ce32467dc5be3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb
Size/MD5: 861158 1b4608e402fe83c9fc98c61901e78d66
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_powerpc.deb
Size/MD5: 8149744 6da619f7644f352241474fe8c477fb74
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb
Size/MD5: 24515980 660232361f3989d0410feb6a6db7b0d9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb
Size/MD5: 26857602 9264e9266e6cb960f827f92d36f40548
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb
Size/MD5: 24218060 aab7fc0aad04b0de9413623ad31d1b2c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb
Size/MD5: 2127114 a5fc2cbbb33a5347bebfbc6e163ebe80
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb
Size/MD5: 2853502 6c53e0efb48f37a924a29250f943f817
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb
Size/MD5: 2048790 d653fc70fe49dc380023d2a5498936e7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_powerpc.deb
Size/MD5: 644014 9da17f10f2d56ea22b65fa98926800cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 253018 d277f40b34880f91bb2c056aff6ac944
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 295082 58819ea33818cb4aeb48cfdae6395a98
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 155556 495756400fc7ec91ab232f3ebd89d385
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 168438 78fe49aa32d9e4500fc43ae59cb60d7a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 248196 4974d3b007dfe46ce42a2b06c8e17e32
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 279960 a1e9f0007ab0df9f948fdfed5cc26770
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 1110514 16d9506e2af45001d4ff88cf090190d3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 1110664 3093478896f990fc5843a9fac313ca99
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 1951274 1ce8ec5d210a625754b051707ac2f007
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 2253544 4cec0807f70fea6b523482e17a8c3f3f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 233510 d8a0602f850212b4033bf6d0d3f548b8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 223082 8423289edb7f8b98d8d137fa50bf2cd2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 172830 ec4875ed04bf8fe234b1d077edfe2530
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 205458 d6dcff3d393701c4e74a40ea1fad791f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 280984 0677e9ed958f75e003c1be08c278e39a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 316602 2635b1021b00635ecf2fe2b165f878ab
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 44660 99af30e421d82a3ee7ab8dd830b3279e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 43412 8e3266956a0680df84b833337a9e7052
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 41214 fb70bee40375248794dedfdec971d05d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 53688 6e3d3491ba08fbbfa24c667ba03b010f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 72816 c0555aa557ec4f17de285bdf860289fa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 85290 7701eef53b049cef94049934db28a53f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 74544 3371da9e68ff23fa9a44ab4be9594817
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 29718 0cf514c1aec245368814c31543c058fd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 8400 eaf01ca132467927b60e01de21c964c8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 9882 f369668ec2986b9bb2e835c792f53a5c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 56160 f7ebbeedcf2f88cf4ca321351c9da193
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 67414 89742f040e6be6207bda53276f2633eb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 86638 c793c199e9b5b47ea0cd6e1b4a0cf077
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 129208 fcb49eab78230ea9fc2f96b5228641a0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 322566 5ec4f9114292dbe0dee389083f12d26b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 322590 48cabc807eef249b4594d8c381a81363
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 1415824 bfbba6cfea2b470d8a97e9a4d4f88b9a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 1345416 759d88182f74baff59cf7a96aa6642f8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 74232 37b357240eec1bc03aee9b33c3722295
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 83246 b61bcb2c2c62ad88ff41809426778567
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 12016 93ede1fbe9359ed417f07a091a4d9819
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 13946 10c51757e6febf19e2d3417335ef5766
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 78350 16e3593d499463b13dd71d9d09b688eb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 85458 946690439579373ea1826342220071cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 398198 d840472b2574e16ea6f44c5f45427de6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 445188 ee7e96c614a00d1137483658a5450c0a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 76716 782937e9d57c10902d871b281cf62515
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb
Size/MD5: 100188 7dd8d77b380f4b3d7a656532510c775f
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 53734 56e3639109c91b9c70151398b3837add
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 42156 01eaf1c77f77ac711cbfa3b6bd7c9ae2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 211712 79f67c0341bc145590ca2485f7364824
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 607888 d18af721cafb8bec7d1e17297dfbcc32
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 142706 09e2dfa857a349061e96f467e9c825b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 51444 db22c9845a481ca60d58a1f844695163
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 37408 eaedbf00ede88a54db7b13762fdcb716
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 151156 6ee9c9decad54a21140c90893d10b0aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 1930634 333430bccad9de0487af5a050173091b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb
Size/MD5: 779738 031e5d9af9445b517c49c8aefcb4dd40
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb
Size/MD5: 778590 07b6ba1bb24fc1907b991575b8705807
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_sparc.deb
Size/MD5: 8120610 4418251e39b254cf57130e35220621fa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb
Size/MD5: 16955024 69bcc60276b1759bde1206dd2e46584f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb
Size/MD5: 16590864 08de9c062a191c372b33bf7449e476b3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb
Size/MD5: 2262940 07bccad347f0390fb8c1b498b4a668d1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb
Size/MD5: 2176860 3c6adeb479419b6d42ea864eba0f1be1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_sparc.deb
Size/MD5: 699174 74d4da9c93b515d1dc80cd6f5c8a6d86
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 264332 b3cb71049afbeaf81b0ca1fa1d5e95d8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 156572 cd9bdd297c18316905ea3f660a2be324
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 241028 5deb47cc86fdff7ccaf49d50ac4476f0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 1110524 7b330f95a1cacc790372ef810bc9cda7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 1571854 7fe9b3ea1766e53415deec6a78c31a89
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 180384 8e8cae9b9c2217cc6fa610160b48ea21
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 310086 9c3269d5982382258ef0f7938ec42116
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 39662 453530c683eef14de2c8c5ff111fce82
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 37984 4e923ff0f29bb521fa542cbf523fb7b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 8644 d925f83bd72ace70986656ac077efb0b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 59410 a49e42d1e09c5e734167c09e450ea47b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 90820 e0ba3e1bb84fd22cfb6deb879eca9634
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 322566 c64db3fb65e3fccb40d454c3fff95cc3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 882382 5edd846df467cdd53baac8b54f4d1721
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 9828 0d7aac7d3076eed86a509c66a48c8e0e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 290224 eb743d1afdad54d227eddd91e867e7ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb
Size/MD5: 54798 0dd2e0292ae67485c182631388920467
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA 1356-1 security@debian.org http://www.debian.org/security/ Dann Frazier August 15th, 2007 http://www.debian.org/security/faq
Package : linux-2.6 Vulnerability : several Problem-Type : local/remote Debian-specific: no CVE ID : CVE-2007-1353 CVE-2007-2172 CVE-2007-2453 CVE-2007-2525 CVE-2007-2876 CVE-2007-3513 CVE-2007-3642 CVE-2007-3848 CVE-2007-3851
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-1353
Ilja van Sprundel discovered that kernel memory could be leaked via the
Bluetooth setsockopt call due to an uninitialized stack buffer.
CVE-2007-2172
Thomas Graf reported a typo in the DECnet protocol handler that could
be used by a local attacker to overrun an array via crafted packets,
potentially resulting in a Denial of Service (system crash).
A similar issue exists in the IPV4 protocol handler and will be fixed
in a subsequent update.
Slightly less random numbers resulted from hashing a subset of the
available entropy. zero-entropy systems were seeded with the same
inputs at boot time, resulting in repeatable series of random numbers.
CVE-2007-2525
Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused
by releasing a socket before PPPIOCGCHAN is called upon it. This could
be used by a local user to DoS a system by consuming all available memory.
CVE-2007-2876
Vilmos Nebehaj discovered a NULL pointer dereference condition in the
netfilter subsystem. This allows remote systems which communicate using
the SCTP protocol to crash a system by creating a connection with an
unknown chunk type.
CVE-2007-3513
Oliver Neukum reported an issue in the usblcd driver which, by not
limiting the size of write buffers, permits local users with write access
to trigger a DoS by consuming all available memory.
CVE-2007-3642
Zhongling Wen reported an issue in nf_conntrack_h323 where the lack of
range checking may lead to NULL pointer dereferences. Remote attackers
could exploit this to create a DoS condition (system crash).
CVE-2007-3848
Wojciech Purczynski discovered that pdeath_signal was not being reset
properly under certain conditions which may allow local users to gain
privileges by sending arbitrary signals to suid binaries.
CVE-2007-3851
Dave Airlie reported that Intel 965 and above chipsets have relocated
their batch buffer security bits. Local X server users may exploit this
to write user data to arbitrary physical memory addresses.
These problems have been fixed in the stable distribution in version 2.6.18.dfsg.1-13etch1.
The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update:
Debian 4.0 (etch)
fai-kernels 1.17+etch4
user-mode-linux 2.6.18-1um-2etch3
We recommend that you upgrade your kernel package immediately and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Source archives:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.dsc
Size/MD5 checksum: 5672 ef2648e54c6ea1769b29ba191fc13083
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.diff.gz
Size/MD5 checksum: 5306139 589297d453d15848b5879cf22eed7d40
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
Architecture independent components:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
Size/MD5 checksum: 3585938 a94cd1247d3dc98378dd094b3b364044
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
Size/MD5 checksum: 1081908 36d119bd92dbd35a8f83b191f74daf09
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
Size/MD5 checksum: 1475708 0373ab2ac016f31d2591eab4de39e4d3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
Size/MD5 checksum: 41417232 279c0d7b44a451169a118e0a2b0c4eeb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-5_2.6.18.dfsg.1-13etch1_all.deb
Size/MD5 checksum: 3738202 e4cfce3e67d3a0f6aeb4fe1fb5706372
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-13etch1_all.deb
Size/MD5 checksum: 51094 b22167a8b2ab8d0cfb9eded0d0b8d8a0
Alpha architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 3024210 ad1fc21ac8fcb76a0db86d25737c8a83
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 50680 28ad3748b8d76abbb2e896f7ff190240
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 50720 1f106b97c91e07921402b0a2174574c6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 263524 4ce1e83ad733aee9d36b075babc6f908
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 263838 4c9ebe648f73818252ed3de79567219e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 262864 a3d6389b9224fcef726128f3a747a4f8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 3048212 d86c3c8fac6533904b91592016e2afba
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 264300 15606dadab1e1bbb4d9234a8bfb09b5e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 23485186 1978fddd39e8e7ce9ebc88efefd4ebe0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 23464818 bdfd39761fd0bc68de001efb430895af
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 23838852 e9ae2b4f056d9b47832234d2aa6ec4d7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb
Size/MD5 checksum: 23528772 4f029181ad02c46f2ae2b34038b629e0
AMD64 architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 3164562 5bef24546e02e53d0b866b68e57c8294
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 50644 173c9d06298afe48e609cd08a5420737
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 50668 61e625ce94855d474c0562819ae3b879
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 270036 cd6f518453e0b75e3d4e17bc1fca62a3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 3187796 2958630378a24cb3f16807e04fe17297
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 269650 dbfd4c56547401e7b6a6460f41dd266b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 3330944 996a5cba350ae0c9110f8ca72492bfc2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 271784 c1841e07342a73c9cf87058cc0ca943b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 3353796 730dd7dd17cb532152463000f16459f0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 270068 363ff82948e473032eaa4fc37d2b9d6b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 16838550 dee2a96f0c89bc9b59b2febd42dc8bb1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 1647400 8f72b372c132b40f5c828d7d0a94bf62
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 1679728 853224dc22a8fa38c8b4af6534886a77
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 15238676 d62ddc5e61a35e84529262c9101b0e93
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 15256142 8b0667dd7cb043b753ce3a9770058515
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 50618 0da191c5dcd2406d079f9aab3b4ca0a3
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb
Size/MD5 checksum: 50632 46cd39c06556d9bc465099cddb3c7f3d
ARM architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 3346806 bc6581484d2364ccba4bbdb275072ecb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 50652 976339e33b567d816811d561dc575cc8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-arm_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 50694 19473ef72c0109f1ce9dc9dfd4f3de3d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 225038 969f487c6c9d50fef7200e0a3ecb5c4b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 226564 c5f03ec763dfb6b27d00f8f90e0ae9da
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 232748 bb9606e416b2aa84c3cc8071ac2350d8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 192126 cd01397be860265e013d55aa574c7347
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 194764 e05a0715a2bf9cbac171217b22314b19
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 7518754 018e9a847ff04f7fc3580f85bfc2abe1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 7869416 e4750e15d602443f08ba02c7e7c2a137
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 8806748 7436ed2118660e9c7f4f4697ac5868c3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 4558510 68d071f5a09c182509bea873aef02105
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb
Size/MD5 checksum: 4981066 6c261104c98cc528d6633f79274ad72a
HP Precision architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 2964238 f6fd8c5dd6071370f953e496756851cf
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 50642 8aca6d6bffa3b334b71b66332dd125ae
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-hppa_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 50668 7dfc3cbdd0f0763008e0246015fe5c9f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 188488 31502e1f9bdcc0a24d6a7762f6f4cbe8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 189420 e6deaa2c4a398b59a40a732cb9018940
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 189146 133d151b9aa064b61c90c0c9ce20656c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 189834 c7ada740b1647894ceda503d4ee8399b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 10498710 5d3ee84cc71a57eabe1d0647f704ad3c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 10940810 8e1de20ffcc7df26862544af83f78771
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 11344516 a6fe777a6d6296c1d95c81c25931102e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb
Size/MD5 checksum: 11751450 e0c73577059ad7ee24893278e8bb580c
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 3164474 5581e6b60de382087f4e3cd05a326cd8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 277248 ff8b78d10cb79fc1c9258cd43a408499
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 275932 874d04ecd1f692d9781e2cb47c687ee6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 276286 dbcc90161edc6a46b7a89a10b0fc22ff
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 50640 34b3065eb0fdc3a02576c9ebdd2508d9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 50700 77d1ae15ad63b7e9675225a6ca7db47c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 268294 a60191beaaf0d62099dbd1a20eaf6b75
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 275830 f9a83308d8ecd6eb36d6791b864116c5
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 3050892 8283afde8651de38ff35c68ac9d34feb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 273688 759941012b1848db94e34d6f1c57cfd6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 273764 bc27c920b5a85c643d3f9a7fa3bb2f9f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 3145220 f0cee6bc58f389ef78fc3cbcad757197
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 270550 b1aca209d3f63334b8512bd70e7fee04
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 3167356 72a44aac33deb66d1eed41b37d9f6f84
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 271130 cebd78501825a595f992a575371cd8b7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 16170152 7dbf8514bc38e86a6d6454593628a9a8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 16319248 a099f9f04a33385dc29a7cc5ed743411
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 16384438 83d05912745de976a2648295241f0b15
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 16816198 1c14cd0e4867b12f05bea602a7940b11
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 16449650 9c195ec1b9f2b5f2531017389234d817
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 16358054 727d0f2e6e821a34c527c44946660653
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 16488812 1619800305c3c55e48f9b5484cd7ec39
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 1296346 6f233c2b69738b9d577a4c1d7d9283a3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 1323270 c3ba3e1299340fe9666746ada15cafe2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 14258314 37215c1b602209320153136ddae5b53d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 14272088 00cfea4d19109eff959c360f63b90c18
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 50620 3d60ebbd894ac77ddaafaaba903083b8
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb
Size/MD5 checksum: 50636 9277c97ebb5c14fc93c5449c5e5a391c
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_ia64.deb
Size/MD5 checksum: 3078390 7c1dc7cf08fdce40fdb01acd14c6167b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_ia64.deb
Size/MD5 checksum: 50644 4303c1255e6d4840b9ce34b8da158125
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-13etch1_ia64.deb
Size/MD5 checksum: 50662 5235fb30a8f35c91ea15335ee439a60d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb
Size/MD5 checksum: 251576 5b89eeb214501b0a1b6e2d2712763fe3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb
Size/MD5 checksum: 251558 573aa9cc9fba9924a98a1b6ca786edfe
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb
Size/MD5 checksum: 28008514 baaf3f87d60cb1d68c361cea849d3c27
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb
Size/MD5 checksum: 28178022 c6cb8de82903383b78c7a9646d7df7da
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 3346354 c0c5d438a80a114ffbe515104f44785f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 50644 822db9efc5caba5bd3f96c2ffef90ce8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mips_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 50692 9fbd9cb53ce75b25243adfb5568bd2f9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 146348 4a2ede92f7cba5e409a01504a5787786
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 156600 b56c8fe624757cca08eafda9a7b62122
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 160930 14710075883c5cb17ed1f4dfa854461f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 179380 f61160dd2e459a70170e5ba8524aea36
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 179154 aba921bcc75c80c0c96c727eac34afaf
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 6090314 99e9641ce38b6d0530199ad566738d73
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 8271518 6979492cd1b01cf3b76958211bfb3bdf
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 9037182 56824fbbc825d14d2fec62b2562f44ce
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 15636546 85bc62cca019e5d5c07374fe4ea05df8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb
Size/MD5 checksum: 15608670 233369e78b74fdca2143c971995440f5
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 3346628 a208480b2fa7bdd13559b4078d03cac9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 50648 20d1bf2c345a889720562597f9300152
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mipsel_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 50712 31666ed837cac8aec136528616a7407f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 146012 ec774ccba8d1783239b0f12cee90abe3
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 152252 99657c9b655c5f1bded07e4a5394d132
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 152340 0c0778fa59bda664f8cb4f0f1ba8f90b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 174444 8927ed0b8d880d99fcc79c64ecc44c54
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 179284 8b01ba01c4d2e0e4a1dbfd4acd5354ea
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 179144 368da689abd47ca70aced24efec5b040
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 6025698 a355ec38f440f7e08d0f22ce6184bcf8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 5937952 2de36f1fdeb55373eb50fb77efe7f938
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 5921402 006d6d3d34f2db5b21500cdc8914dc08
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 9857018 4246c3b15aae0df84b669381a8f1383e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 15052960 317130eff4221493bf31349bb99d0eab
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb
Size/MD5 checksum: 15019204 a5c6e183ff53d3c8fd169f0d2bc17ebc
PowerPC architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 3388916 6d6415c4241ea26786fd3a72899e266f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 50652 f19e0ad61b5e91f685e920a58248c8e9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 50698 111c11da4f26a93122b76b6eac5b92c8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 248366 7bafbd435e00ad6b647b347d84e1e0c1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 225218 90e19db35ef618a7e3f476576de60d95
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 248400 3dd8373a35220a27423c3f4eadd32358
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 248712 8a0281e9b856372f4d01c8a0f4b02d72
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 242934 92f3fda2938f60fdf6f957f0659712ab
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 3411216 b9070329bf0a6045896db2fc15f66f0a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 248448 e108e05b4fe2239d4e95fb6598405fd6
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 249006 3908dfaf4f518192bd550ca5ac45476f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 16623606 b76fa67819092073c6bfc51904163278
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 15149270 502237df8e0f90e7ab95b28cbe7a5f8f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 16960668 69f13fe8bde671497363849f76636eda
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 18291108 9cc68d73b1bcf401176d1f93bd1dfeb1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 16395670 fbab6e355aba9c29f63603d097855c5e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 17006732 cca0573ca442e02ad6f153fcc059f734
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb
Size/MD5 checksum: 18340518 3940b166f8b0464baa118c8557922edb
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 2939624 fada85c4d5ec9cbdee803116fde561b1
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 50642 9478b247c93b2ba8b405f93b525307ae
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-s390_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 50664 d694fdeff900e5b1ba575ad15bbd5310
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 139294 02bcbe57d1b62129243c8cb4b7bb8d2d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 139538 69993d0e2867ed4efa5bb0e442d3d014
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 2962698 36d89e72ac15117d15a3488878d205a4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 140274 5b8bacca256347a7ce02783651110e35
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 5398576 b1054f70f0472fd020241b6af904438d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390-tape_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 1435060 daf41750946017171aad603b9218d0c4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 5613112 68d67210c4c6aa0ea54b1754df137d8e
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb
Size/MD5 checksum: 5659570 c6a2db3553a427cecf69d9f1258e9444
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 3164578 902a8ff3089225278575251ba13f1f98
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 50640 455bd9863c6f183ee28d15e7ba9ddc38
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 50674 8416d5c20659923183729457854e139f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 161886 f58a554b0de7e05c4727bff1e236a069
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 191010 bad7bf07af89b1ba54ff559f99cf3d1b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 191776 f059b7c75ea312f69758d02e6da4cd4f
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 3186936 2a865cc6aed95cdc0ed3ebb20ec0a6d0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 192172 197b2cd91975cbda876bc0ac18244870
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 6406184 e0ce977a5c79906c4996f069672e272b
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 10351700 69bc68d296d9134f6df792fb745c9810
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 10610496 b40bc9a07de220a54a1489b22d1d60f4
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb
Size/MD5 checksum: 10656362 91c6c66c24c7d5ca45c0e6eb5dcdcbba
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ etch/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/etch/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iD8DBQFGw6BUhuANDBmkLRkRAoORAJ9xahJqDWTm6CV7/bRjmcFCfPYJuACcDG5b 2aO+KPMNmsXmfH9W/1fMQtM= =L22s -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . (CVE-2007-4133)
The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register. (CVE-2007-4573)
Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an off-by-two error. (CVE-2007-4997)
The disconnect method in the Philips USB Webcam (pwc) driver in Linux kernel 2.6.x before 2.6.22.6 relies on user space to close the device, which allows user-assisted local attackers to cause a denial of service (USB subsystem hang and CPU consumption in khubd) by not closing the device after the disconnect is invoked. NOTE: this rarely crosses privilege boundaries, unless the attacker can convince the victim to unplug the affected device. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFIM/QcmqjQ0CJFipgRAua3AKCyF+W5X84EyQ0rcplkQs8m3TeBDQCgvo2f AEfloFQ4ShfC936g0fSh5vo= =RHR2 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200708-0604", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "lte", "trust": 1.0, "vendor": "linux", "version": "2.6.22.1" }, { "model": "kernel", "scope": "eq", "trust": 0.9, "vendor": "linux", "version": "2.6.22.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "kernel", "scope": "lt", "trust": 0.8, "vendor": "linux", "version": "version" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "kernel", "scope": "eq", "trust": 0.8, "vendor": "linux", "version": "2.6.22.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.6, "vendor": "suse", "version": "10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.23" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.11" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.3" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.13" }, { "model": "kernel -test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.2" }, { "model": "kernel 2.6.18-8.1.8.el5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.1x86" }, { "model": "kernel 2.6.21-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.11" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel 2.6.21-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.1" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "linux enterprise sdk 10.sp1", "scope": null, "trust": 0.3, "vendor": "suse", "version": null }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.2" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel -test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.9" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.11" }, { "model": "kernel -test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.18" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.5" }, { "model": "kernel -test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel -test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.8" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.1" }, { "model": "kernel -test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "kernel 2.6.20-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.3" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2x8664" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.8" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.4" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20-2" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.5" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.6.22.2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.4" }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1613" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.12" }, { "model": "kernel -git8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.2" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.6" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.0x86" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.6" }, { "model": "kernel -test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "linux enterprise server 10.sp1", "scope": null, "trust": 0.3, "vendor": "suse", "version": null }, { "model": "kernel -test9-cvs", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.214" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.8" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.22" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.1" }, { "model": "kernel 2.6.22-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.4" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel -test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.13" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.4" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.4" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.7" }, { "model": "kernel 2.6.21-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.14" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.1" }, { "model": "kernel 2.6.21-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.0x86-64" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.21" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.17" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.3" }, { "model": "kernel -test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.1x86-64" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1627" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.3" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2x8664" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel -test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.9" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.0" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel -test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.4" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" } ], "sources": [ { "db": "BID", "id": "25263" }, { "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "db": "CNNVD", "id": "CNNVD-200708-174" }, { "db": "NVD", "id": "CVE-2007-3851" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.22.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:i915_chipset:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-3851" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor disclosed this issue.", "sources": [ { "db": "BID", "id": "25263" }, { "db": "CNNVD", "id": "CNNVD-200708-174" } ], "trust": 0.9 }, "cve": "CVE-2007-3851", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.5, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Local", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 1.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2007-3851", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.5, "id": "VHN-27213", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:H/AU:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 6.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.5, "id": "CVE-2007-3851", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-3851", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2007-3851", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-200708-174", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-27213", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2007-3851", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-27213" }, { "db": "VULMON", "id": "CVE-2007-3851" }, { "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "db": "CNNVD", "id": "CNNVD-200708-174" }, { "db": "NVD", "id": "CVE-2007-3851" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer. The Linux kernel is prone to a local privilege-escalation vulnerability. \nExploiting this issue may allow local attackers to gain elevated privileges, facilitating the complete compromise of affected computers. \nVersions of Linux kernel prior to 2.6.22.2 are vulnerable to this issue. =========================================================== \nUbuntu Security Notice USN-510-1 August 31, 2007\nlinux-source-2.6.20 vulnerabilities\nCVE-2007-2525, CVE-2007-2875, CVE-2007-2876, CVE-2007-2878,\nCVE-2007-3104, CVE-2007-3105, CVE-2007-3513, CVE-2007-3642,\nCVE-2007-3843, CVE-2007-3848, CVE-2007-3851, CVE-2007-4308\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 7.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 7.04:\n linux-image-2.6.20-16-386 2.6.20-16.31\n linux-image-2.6.20-16-generic 2.6.20-16.31\n linux-image-2.6.20-16-hppa32 2.6.20-16.31\n linux-image-2.6.20-16-hppa64 2.6.20-16.31\n linux-image-2.6.20-16-itanium 2.6.20-16.31\n linux-image-2.6.20-16-lowlatency 2.6.20-16.31\n linux-image-2.6.20-16-mckinley 2.6.20-16.31\n linux-image-2.6.20-16-powerpc 2.6.20-16.31\n linux-image-2.6.20-16-powerpc-smp 2.6.20-16.31\n linux-image-2.6.20-16-powerpc64-smp 2.6.20-16.31\n linux-image-2.6.20-16-server 2.6.20-16.31\n linux-image-2.6.20-16-server-bigiron 2.6.20-16.31\n linux-image-2.6.20-16-sparc64 2.6.20-16.31\n linux-image-2.6.20-16-sparc64-smp 2.6.20-16.31\n\nAfter a standard system upgrade you need to reboot your computer to\naffect the necessary changes. \n\nDetails follow:\n\nA flaw was discovered in the PPP over Ethernet implementation. Local\nattackers could manipulate ioctls and cause kernel memory consumption\nleading to a denial of service. (CVE-2007-2525)\n\nAn integer underflow was discovered in the cpuset filesystem. If mounted,\nlocal attackers could obtain kernel memory using large file offsets while\nreading the tasks file. This could disclose sensitive data. (CVE-2007-2875)\n\nVilmos Nebehaj discovered that the SCTP netfilter code did not correctly\nvalidate certain states. A remote attacker could send a specially crafted\npacket causing a denial of service. (CVE-2007-2876)\n\nLuca Tettamanti discovered a flaw in the VFAT compat ioctls on 64-bit\nsystems. A local attacker could corrupt a kernel_dirent struct and cause\na denial of service. (CVE-2007-2878)\n\nA flaw in the sysfs_readdir function allowed a local user to cause a\ndenial of service by dereferencing a NULL pointer. (CVE-2007-3104)\n\nA buffer overflow was discovered in the random number generator. In\nenvironments with granular assignment of root privileges, a local attacker\ncould gain additional privileges. (CVE-2007-3105)\n\nA flaw was discovered in the usblcd driver. A local attacker could cause\nlarge amounts of kernel memory consumption, leading to a denial of service. \n(CVE-2007-3513)\n\nZhongling Wen discovered that the h323 conntrack handler did not correctly\nhandle certain bitfields. A remote attacker could send a specially crafted\npacket and cause a denial of service. (CVE-2007-3642)\n\nA flaw was discovered in the CIFS mount security checking. Remote\nattackers could spoof CIFS network traffic, which could lead a client\nto trust the connection. (CVE-2007-3843)\n\nIt was discovered that certain setuid-root processes did not correctly\nreset process death signal handlers. A local user could manipulate this\nto send signals to processes they would not normally have access to. \n(CVE-2007-3848)\n\nThe Direct Rendering Manager for the i915 driver could be made to write\nto arbitrary memory locations. An attacker with access to a running X11\nsession could send a specially crafted buffer and gain root privileges. \n(CVE-2007-3851)\n\nIt was discovered that the aacraid SCSI driver did not correctly check\npermissions on certain ioctls. A local attacker could cause a denial\nof service or gain privileges. (CVE-2007-4308)\n\n\nUpdated packages for Ubuntu 7.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31.diff.gz\n Size/MD5: 1577853 d02fd4ba44af531c4eb5c8035fbe3a3f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31.dsc\n Size/MD5: 2472 b5489267cd7642fc1af25f1a4fb2aa4a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20.orig.tar.gz\n Size/MD5: 62174876 f19203b2488d943a640abe8f3cd20f57\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-doc-2.6.20_2.6.20-16.31_all.deb\n Size/MD5: 4877040 3c8035f595205bf4ac22cc20acdd6794\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-kernel-devel_2.6.20-16.31_all.deb\n Size/MD5: 84870 94e07da627c80ce5b54db4f6eb59812b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31_all.deb\n Size/MD5: 47822126 598e49bbe0381668e0b471dcb580563f\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 24494 b980d0baa6f45bd2d9c6ea3b71491996\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 202070 30b2f790562a3b5ffc8f6baf54cf5def\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 39354 0933702198ce478aa4b1842c8b12ac8d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 50910 9b7df5269dd71693804155d712008929\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 187502 faf88d2629336c2da3949e4018474771\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 34906 27ab0c4687f3982b121851f2f875e491\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 644422 46b3463556bff461e1b781c381e9ca1c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 174704 9c94e0c3af584b38143b1672ae1b0b0f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 76424 b53a41dd02648eacb54debe890388be5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 57886 f2d1733f4b960c624f14589a36ec5ebb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 140014 10367ad74fa4252b5d0d080a254938d9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 277466 3b3731edab4901d7234fbea7f6c7974e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 1905414 b7a3da16e9217bae2d90fd2fbf66235c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-generic_2.6.20-16.31_amd64.deb\n Size/MD5: 857546 37ed6063fb5c8f4dbfba9ab6dd5736da\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb\n Size/MD5: 857378 31446d9184e0346b56680b8321a20734\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server_2.6.20-16.31_amd64.deb\n Size/MD5: 856618 26eae5ee867cd1c209920aad4c9e3195\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_amd64.deb\n Size/MD5: 8128538 49ac62df22c8cceeb563991baf7917c1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-generic_2.6.20-16.31_amd64.deb\n Size/MD5: 23066094 111d7dbd3fcb9c8571f7007c334b1c72\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server_2.6.20-16.31_amd64.deb\n Size/MD5: 23386510 d2a8aeecf1278d8cfa9d73b9ac0920ed\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-generic_2.6.20-16.31_amd64.deb\n Size/MD5: 18427438 060995fe8665a45d2338a4bdd9bb1c0d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server_2.6.20-16.31_amd64.deb\n Size/MD5: 18698142 e57199fb26fc10293616c4698229fa60\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_amd64.deb\n Size/MD5: 667956 3fc892773a94ea6130e19bbd41223669\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 246420 cdf0e83f330225229d0aac8d756bebef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 144474 52363784520d5673b37c1b00d1825835\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 225016 2cb7db7f772480b16de5a6d03797c5b6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 1110522 41b51553dde0a4c1fe3a6cba67a943ac\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 1754820 0b67f1cc816f96777c4035f4536dc34d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 140922 68de52e127bbeabceda23d61a36322f3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 163320 ad8f39c56c00d85cb69e0d14cd7510d1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 265728 f9bf51de08b4b70546e7bb412dedfe5e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 34298 bd875a9e3a6204b2e2c81851e763c501\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 38438 126954fc2b53b6371332715fcf97b8fc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 67682 82587156ac6bbf9b24485f3e47ba73e8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 20962 40eadc3c9036b2e47dddc43561eae9d8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 8328 45da242f89022fb095499adf1ad4229f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 54580 1de7964374ceaa29e42b1ee4c46722b2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 86016 301d95060d03db0efbd6a13b087c46dd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 322570 ac8b968393ae953b9df98134ae117861\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 1046886 84c9ea8c539c15bdaff8ca8f37cbdf7a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 43976 0ddc45fffff5249b5551b2e673b73b15\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 12012 ccb1f0c0fbc1074e1b1ccbee31630597\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 61918 982e8d147d6b54edb3a8f83adc3c6086\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 377828 cad9af34b502d072b7922f700d077f47\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb\n Size/MD5: 66666 628ae089db689328b0a41682bf0e5900\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb\n Size/MD5: 23125936 b1a8c95965a2ef280b13a422a4d6173c\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb\n Size/MD5: 18477150 34a36604a92f81d1560457bd113330b1\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 20322 e8ab9fd789fe1b8f0c8546c00e763e25\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 22888 8d0d299344fde6654991003cbac384f9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 210074 efa1c3d6a93ccb7296d67b1d0f937681\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 212252 d48b3db497527154d378b6f9bfd0edd3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 88698 e85fbe5bf7d9909d7bc00ce6f7305959\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 35626 cde513a471134d3560aac41fbd6d70cc\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 37740 fac42d0beab2e5f68baf2e19d76a2778\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 38416 12a300b67959db63206e8122d560489b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 45640 6faf39407cd6c881666e16309202e62d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 45804 5214d5c0756417da98784c85e4ede304\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 179468 53d4e47e8ffe950ccd146666101b7157\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 179830 49c07cb759ae3708ca26e09b15a943b9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 32104 e574d74194c75cc699920672b137400a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 32426 3e84e290381c1cf7c2c7c0f7a5a74a6a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 648648 416f1cde45a2ecd76de54875150a7879\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 667458 00ea27a9d01f200cb65926ed9d6a9cd6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 178212 a93bea57ce7779cbc4dcce35a5487a64\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 181284 2ea1dce0a2d6b197c00946d9a44c3834\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 72392 59330a18dd5e401e938781ef311f31f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 74054 41220f95474992bbd26223aac196f4a3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 53578 9a7390218ace76fa1f00e243502c3e81\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 54790 648d4b48dbef21bb4cdb57bd6177947d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 129184 f9e56d8470f376595383fbc54c3d4310\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 134878 ebb36b1cf716fa2f7ef59d2f197b95cf\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 275956 294313e8e94b96b3b800f2b0830bcd89\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 274972 6f05cd6698404431694da60df75d5a7d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 1815218 7ae643f0eb6d41d7570b5b05d4922959\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 1886534 e8e1809266b9d6e3179fe8208e73e750\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-386_2.6.20-16.31_i386.deb\n Size/MD5: 844272 66490409aa7465bb64db19ca4e37bac1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-generic_2.6.20-16.31_i386.deb\n Size/MD5: 849482 eed7f1e2febb4e8b6a1c09ecbbe4251d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb\n Size/MD5: 841878 a8c7b5f67015adbf13449a768812df54\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb\n Size/MD5: 850348 bc6d77642ca93c95875eeb929cb35d12\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server_2.6.20-16.31_i386.deb\n Size/MD5: 847286 f5889a4a92ff20c893742a98f366c7f4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_i386.deb\n Size/MD5: 8118254 7ae93d26293ec4b8d69995342bd0784d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-386_2.6.20-16.31_i386.deb\n Size/MD5: 23746716 53eb1ff56c3673abb4999657cd1289aa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-generic_2.6.20-16.31_i386.deb\n Size/MD5: 23812992 1b0cda5d74a37df374841374ca82cddb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb\n Size/MD5: 24376420 7059f5cbf8ffc55cb16b62d0fa1d8e79\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server_2.6.20-16.31_i386.deb\n Size/MD5: 23866754 435d7d5fbb668bb962a681ebafd0d0af\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-386_2.6.20-16.31_i386.deb\n Size/MD5: 23587990 69734d888bdbe1417f6c88b03f5e4ff8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-generic_2.6.20-16.31_i386.deb\n Size/MD5: 24165892 e9f0dd3a1cbed9f4c275bc35d31427fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb\n Size/MD5: 25658356 5d4b95dbe14f67113a961a5a419d8ef8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server_2.6.20-16.31_i386.deb\n Size/MD5: 24393594 720c451484e4e17ecfdfbb0036aa6506\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_i386.deb\n Size/MD5: 667938 2b7ff6cd306c617c326433b931e216f8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 244602 e913dcb61ef84b6627b7f18237a712d6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 250124 7f2228c4ab74af27fba4bb22462263ef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 132546 40311392b60143adc9fe23f3dd38cfb7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 133078 ca3ce80ba0b75545dc34638b5e3e3093\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 213188 4e288fe10dcec0c1392ceba87aefa0b4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 220604 293c95c215960ad9c8179b1b87badb2a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 1110410 75deb32ca249568e08b0c5b2ed5cabf2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 1110518 ce208c014af3ccfd3be5a22140bf3409\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 1951376 e21d5a4cfae2c7abd52ce321a31da6e6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 1974734 db0e2ba53b60a7f75f7dab6846d1b84e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 149860 a4f1351290e30f1c4e7260eda9f88848\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 142502 6f7279214ccebd2ebae2e3e07c0366cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 160736 2a5196a2451a69a95ac4081ee383d047\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 161936 2ee85739f55c9c48454ecff39fa5cc2e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 252950 e6d25fb7085fa024c8215794bf41cf7e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 255524 ad476aca2e64994e4996e174f0129d01\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 32766 355e4201f652623ba7a425a455ddd591\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 33336 84393db083655e4746ee5f8872d1634c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 38030 3cd77914f9e2a14b45bffdbcb7afd379\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 38304 312bae8ca1298fb78eeb5f2c14024b1b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 81860 01a489568d19811b95dbda49807e554c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 82094 916c336e60e8e5a6c3ded678daf3eb67\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 47686 a554ef6d1fc404b299b2ca9eab600052\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 47720 e4bd92d0011d9968e3b11a2b53ad898d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 8262 215b2b44f65782e91f246c9892c36d9b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 8496 8325dd4d7645b52215c584ee313090c5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 49958 b7fdb76f7e7b9b53bdfb61d5b4cbaf02\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 51874 b4cd612bd943018b048d33fc01e5b86b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 78852 6017590ac379305f3582cb580c53d69c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 79498 d54d0bf75b57827e777227bf42aa6696\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 322544 83fb94754d28fef49f55abe43d7210d2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 322558 3f453982483722a158b076654a2cbf13\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 1362526 a4592f0dd429f6e30cc099f576875724\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 1347968 e1eff7dc50dda5e62f0048d5b79c9cb9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 42454 b9ed0551f44707a796103007e701ea7b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 42232 3bf62f9da0492ea4b89c5e97e2331d6e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 10764 e4256b9c2b4c127c58a9767480e54fae\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 11400 379056a56e93d6f937eed48d688a8b1f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 55990 4f518d325713f1236e4b0a25f8dd7b52\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 56906 4b4737720e477381e0fb36dd4144bfbe\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 360292 771d1ef6457a09df95544efd1e60eb06\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 363244 35c8893c56a7d607a710053281fbbf91\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb\n Size/MD5: 63174 3b76dd2a0add8ca514ad29439f68eecb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb\n Size/MD5: 63822 c53f0bbf1e69c2640ac21d28686511fd\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb\n Size/MD5: 23844340 0983e69e816ab28b4b64e334402783e8\n http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb\n Size/MD5: 24183898 e8003d1d07e9a8c1406a4015b69c6c3b\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 328852 a7cd45e2be9e7e24b69bddedd50bfdb4\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 325564 1ef1df8e755a7a5b77b8581619c89ee0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 41192 1cac100551f5e4b6b0e2ae199611864b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 47458 9b33803ceac1d9870c77519d76a04ca2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 219676 9b9cd2b6baf413bdca155456830c6f17\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 239174 5f1653e0836212e88ba2311f02f87620\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 43658 bcfd2536cffc99bea761590c172ff275\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 39788 24d008470a22eec523ccdae1a2deefa6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 717810 bfd614b17ec4871312b6d3ac5a9a5bc6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 776474 8f19375582c1eaf502b12eecb6654ab1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 205086 15c27cf635e6df1a0a3002244c6df7b7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 209732 41f77baa8bd624a3e308020161ef65a6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 59220 8edd5472ed0b49960ef60d5a08938662\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 66868 c9eab04b79d1d69cb0413a2baa82b032\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 64208 dc65a0af2c574e8be115966b8546a8b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 65334 645b7161988b7d45de3909ec5495f9f5\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 144020 d3bd7f70c349f7c3f418e1874e1fd3b0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 162728 9e4d6c1014ee67ac7936ae633e5b8c40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 383368 0e4c1db36a8fb12a4ed0ad6f1812cd51\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 251816 60e37f8e82d11c812da0a5fc13956ff0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 2157386 9f989874c520ef7162ff584b1b46c57c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 3083276 9593e34c7bdd87099e52fc6c9b895cab\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb\n Size/MD5: 862972 b92ce0da33fa2ec26026fc0953fb08e2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb\n Size/MD5: 871242 3c5ab3bbae356d7f871ce32467dc5be3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb\n Size/MD5: 861158 1b4608e402fe83c9fc98c61901e78d66\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_powerpc.deb\n Size/MD5: 8149744 6da619f7644f352241474fe8c477fb74\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb\n Size/MD5: 24515980 660232361f3989d0410feb6a6db7b0d9\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb\n Size/MD5: 26857602 9264e9266e6cb960f827f92d36f40548\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb\n Size/MD5: 24218060 aab7fc0aad04b0de9413623ad31d1b2c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb\n Size/MD5: 2127114 a5fc2cbbb33a5347bebfbc6e163ebe80\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb\n Size/MD5: 2853502 6c53e0efb48f37a924a29250f943f817\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb\n Size/MD5: 2048790 d653fc70fe49dc380023d2a5498936e7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_powerpc.deb\n Size/MD5: 644014 9da17f10f2d56ea22b65fa98926800cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 253018 d277f40b34880f91bb2c056aff6ac944\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 295082 58819ea33818cb4aeb48cfdae6395a98\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 155556 495756400fc7ec91ab232f3ebd89d385\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 168438 78fe49aa32d9e4500fc43ae59cb60d7a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 248196 4974d3b007dfe46ce42a2b06c8e17e32\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 279960 a1e9f0007ab0df9f948fdfed5cc26770\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 1110514 16d9506e2af45001d4ff88cf090190d3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 1110664 3093478896f990fc5843a9fac313ca99\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 1951274 1ce8ec5d210a625754b051707ac2f007\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 2253544 4cec0807f70fea6b523482e17a8c3f3f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 233510 d8a0602f850212b4033bf6d0d3f548b8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 223082 8423289edb7f8b98d8d137fa50bf2cd2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 172830 ec4875ed04bf8fe234b1d077edfe2530\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 205458 d6dcff3d393701c4e74a40ea1fad791f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 280984 0677e9ed958f75e003c1be08c278e39a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 316602 2635b1021b00635ecf2fe2b165f878ab\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 44660 99af30e421d82a3ee7ab8dd830b3279e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 43412 8e3266956a0680df84b833337a9e7052\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 41214 fb70bee40375248794dedfdec971d05d\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 53688 6e3d3491ba08fbbfa24c667ba03b010f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 72816 c0555aa557ec4f17de285bdf860289fa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 85290 7701eef53b049cef94049934db28a53f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 74544 3371da9e68ff23fa9a44ab4be9594817\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 29718 0cf514c1aec245368814c31543c058fd\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 8400 eaf01ca132467927b60e01de21c964c8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 9882 f369668ec2986b9bb2e835c792f53a5c\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 56160 f7ebbeedcf2f88cf4ca321351c9da193\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 67414 89742f040e6be6207bda53276f2633eb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 86638 c793c199e9b5b47ea0cd6e1b4a0cf077\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 129208 fcb49eab78230ea9fc2f96b5228641a0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 322566 5ec4f9114292dbe0dee389083f12d26b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 322590 48cabc807eef249b4594d8c381a81363\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 1415824 bfbba6cfea2b470d8a97e9a4d4f88b9a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 1345416 759d88182f74baff59cf7a96aa6642f8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 74232 37b357240eec1bc03aee9b33c3722295\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 83246 b61bcb2c2c62ad88ff41809426778567\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 12016 93ede1fbe9359ed417f07a091a4d9819\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 13946 10c51757e6febf19e2d3417335ef5766\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 78350 16e3593d499463b13dd71d9d09b688eb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 85458 946690439579373ea1826342220071cb\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 398198 d840472b2574e16ea6f44c5f45427de6\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 445188 ee7e96c614a00d1137483658a5450c0a\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 76716 782937e9d57c10902d871b281cf62515\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb\n Size/MD5: 100188 7dd8d77b380f4b3d7a656532510c775f\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 53734 56e3639109c91b9c70151398b3837add\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 42156 01eaf1c77f77ac711cbfa3b6bd7c9ae2\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 211712 79f67c0341bc145590ca2485f7364824\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 607888 d18af721cafb8bec7d1e17297dfbcc32\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 142706 09e2dfa857a349061e96f467e9c825b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 51444 db22c9845a481ca60d58a1f844695163\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 37408 eaedbf00ede88a54db7b13762fdcb716\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 151156 6ee9c9decad54a21140c90893d10b0aa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 1930634 333430bccad9de0487af5a050173091b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb\n Size/MD5: 779738 031e5d9af9445b517c49c8aefcb4dd40\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb\n Size/MD5: 778590 07b6ba1bb24fc1907b991575b8705807\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_sparc.deb\n Size/MD5: 8120610 4418251e39b254cf57130e35220621fa\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb\n Size/MD5: 16955024 69bcc60276b1759bde1206dd2e46584f\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb\n Size/MD5: 16590864 08de9c062a191c372b33bf7449e476b3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb\n Size/MD5: 2262940 07bccad347f0390fb8c1b498b4a668d1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb\n Size/MD5: 2176860 3c6adeb479419b6d42ea864eba0f1be1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_sparc.deb\n Size/MD5: 699174 74d4da9c93b515d1dc80cd6f5c8a6d86\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 264332 b3cb71049afbeaf81b0ca1fa1d5e95d8\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 156572 cd9bdd297c18316905ea3f660a2be324\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 241028 5deb47cc86fdff7ccaf49d50ac4476f0\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 1110524 7b330f95a1cacc790372ef810bc9cda7\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 1571854 7fe9b3ea1766e53415deec6a78c31a89\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 180384 8e8cae9b9c2217cc6fa610160b48ea21\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 310086 9c3269d5982382258ef0f7938ec42116\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 39662 453530c683eef14de2c8c5ff111fce82\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 37984 4e923ff0f29bb521fa542cbf523fb7b1\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 8644 d925f83bd72ace70986656ac077efb0b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 59410 a49e42d1e09c5e734167c09e450ea47b\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 90820 e0ba3e1bb84fd22cfb6deb879eca9634\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 322566 c64db3fb65e3fccb40d454c3fff95cc3\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 882382 5edd846df467cdd53baac8b54f4d1721\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 9828 0d7aac7d3076eed86a509c66a48c8e0e\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 290224 eb743d1afdad54d227eddd91e867e7ef\n http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb\n Size/MD5: 54798 0dd2e0292ae67485c182631388920467\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1356-1 security@debian.org\nhttp://www.debian.org/security/ Dann Frazier\nAugust 15th, 2007 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : linux-2.6\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE ID : CVE-2007-1353 CVE-2007-2172 CVE-2007-2453 CVE-2007-2525\n CVE-2007-2876 CVE-2007-3513 CVE-2007-3642 CVE-2007-3848\n CVE-2007-3851\n \nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-1353\n\n Ilja van Sprundel discovered that kernel memory could be leaked via the\n Bluetooth setsockopt call due to an uninitialized stack buffer. \n\nCVE-2007-2172\n\n Thomas Graf reported a typo in the DECnet protocol handler that could\n be used by a local attacker to overrun an array via crafted packets,\n potentially resulting in a Denial of Service (system crash). \n A similar issue exists in the IPV4 protocol handler and will be fixed\n in a subsequent update. \n Slightly less random numbers resulted from hashing a subset of the\n available entropy. zero-entropy systems were seeded with the same\n inputs at boot time, resulting in repeatable series of random numbers. \n\nCVE-2007-2525\n\n Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused\n by releasing a socket before PPPIOCGCHAN is called upon it. This could\n be used by a local user to DoS a system by consuming all available memory. \n\nCVE-2007-2876\n\n Vilmos Nebehaj discovered a NULL pointer dereference condition in the\n netfilter subsystem. This allows remote systems which communicate using\n the SCTP protocol to crash a system by creating a connection with an\n unknown chunk type. \n\nCVE-2007-3513\n\n Oliver Neukum reported an issue in the usblcd driver which, by not\n limiting the size of write buffers, permits local users with write access\n to trigger a DoS by consuming all available memory. \n\nCVE-2007-3642\n\n Zhongling Wen reported an issue in nf_conntrack_h323 where the lack of\n range checking may lead to NULL pointer dereferences. Remote attackers\n could exploit this to create a DoS condition (system crash). \n\nCVE-2007-3848\n\n Wojciech Purczynski discovered that pdeath_signal was not being reset\n properly under certain conditions which may allow local users to gain\n privileges by sending arbitrary signals to suid binaries. \n\nCVE-2007-3851\n \n Dave Airlie reported that Intel 965 and above chipsets have relocated\n their batch buffer security bits. Local X server users may exploit this\n to write user data to arbitrary physical memory addresses. \n\nThese problems have been fixed in the stable distribution in version \n2.6.18.dfsg.1-13etch1. \n\nThe following matrix lists additional packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n Debian 4.0 (etch)\n fai-kernels 1.17+etch4\n user-mode-linux 2.6.18-1um-2etch3\n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. If you have built a custom kernel from the kernel source\npackage, you will need to rebuild to take advantage of these fixes. \n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.dsc\n Size/MD5 checksum: 5672 ef2648e54c6ea1769b29ba191fc13083\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.diff.gz\n Size/MD5 checksum: 5306139 589297d453d15848b5879cf22eed7d40\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-13etch1_all.deb\n Size/MD5 checksum: 3585938 a94cd1247d3dc98378dd094b3b364044\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-13etch1_all.deb\n Size/MD5 checksum: 1081908 36d119bd92dbd35a8f83b191f74daf09\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch1_all.deb\n Size/MD5 checksum: 1475708 0373ab2ac016f31d2591eab4de39e4d3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-13etch1_all.deb\n Size/MD5 checksum: 41417232 279c0d7b44a451169a118e0a2b0c4eeb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-5_2.6.18.dfsg.1-13etch1_all.deb\n Size/MD5 checksum: 3738202 e4cfce3e67d3a0f6aeb4fe1fb5706372\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-13etch1_all.deb\n Size/MD5 checksum: 51094 b22167a8b2ab8d0cfb9eded0d0b8d8a0\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 3024210 ad1fc21ac8fcb76a0db86d25737c8a83\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 50680 28ad3748b8d76abbb2e896f7ff190240\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-alpha_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 50720 1f106b97c91e07921402b0a2174574c6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 263524 4ce1e83ad733aee9d36b075babc6f908\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 263838 4c9ebe648f73818252ed3de79567219e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 262864 a3d6389b9224fcef726128f3a747a4f8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 3048212 d86c3c8fac6533904b91592016e2afba\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 264300 15606dadab1e1bbb4d9234a8bfb09b5e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 23485186 1978fddd39e8e7ce9ebc88efefd4ebe0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 23464818 bdfd39761fd0bc68de001efb430895af\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 23838852 e9ae2b4f056d9b47832234d2aa6ec4d7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb\n Size/MD5 checksum: 23528772 4f029181ad02c46f2ae2b34038b629e0\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 3164562 5bef24546e02e53d0b866b68e57c8294\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 50644 173c9d06298afe48e609cd08a5420737\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 50668 61e625ce94855d474c0562819ae3b879\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 270036 cd6f518453e0b75e3d4e17bc1fca62a3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 3187796 2958630378a24cb3f16807e04fe17297\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 269650 dbfd4c56547401e7b6a6460f41dd266b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 3330944 996a5cba350ae0c9110f8ca72492bfc2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 271784 c1841e07342a73c9cf87058cc0ca943b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 3353796 730dd7dd17cb532152463000f16459f0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 270068 363ff82948e473032eaa4fc37d2b9d6b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 16838550 dee2a96f0c89bc9b59b2febd42dc8bb1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 1647400 8f72b372c132b40f5c828d7d0a94bf62\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 1679728 853224dc22a8fa38c8b4af6534886a77\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 15238676 d62ddc5e61a35e84529262c9101b0e93\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 15256142 8b0667dd7cb043b753ce3a9770058515\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 50618 0da191c5dcd2406d079f9aab3b4ca0a3\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb\n Size/MD5 checksum: 50632 46cd39c06556d9bc465099cddb3c7f3d\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 3346806 bc6581484d2364ccba4bbdb275072ecb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 50652 976339e33b567d816811d561dc575cc8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-arm_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 50694 19473ef72c0109f1ce9dc9dfd4f3de3d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 225038 969f487c6c9d50fef7200e0a3ecb5c4b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 226564 c5f03ec763dfb6b27d00f8f90e0ae9da\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 232748 bb9606e416b2aa84c3cc8071ac2350d8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 192126 cd01397be860265e013d55aa574c7347\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 194764 e05a0715a2bf9cbac171217b22314b19\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 7518754 018e9a847ff04f7fc3580f85bfc2abe1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 7869416 e4750e15d602443f08ba02c7e7c2a137\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 8806748 7436ed2118660e9c7f4f4697ac5868c3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 4558510 68d071f5a09c182509bea873aef02105\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb\n Size/MD5 checksum: 4981066 6c261104c98cc528d6633f79274ad72a\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 2964238 f6fd8c5dd6071370f953e496756851cf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 50642 8aca6d6bffa3b334b71b66332dd125ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-hppa_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 50668 7dfc3cbdd0f0763008e0246015fe5c9f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 188488 31502e1f9bdcc0a24d6a7762f6f4cbe8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 189420 e6deaa2c4a398b59a40a732cb9018940\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 189146 133d151b9aa064b61c90c0c9ce20656c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 189834 c7ada740b1647894ceda503d4ee8399b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 10498710 5d3ee84cc71a57eabe1d0647f704ad3c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 10940810 8e1de20ffcc7df26862544af83f78771\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 11344516 a6fe777a6d6296c1d95c81c25931102e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb\n Size/MD5 checksum: 11751450 e0c73577059ad7ee24893278e8bb580c\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 3164474 5581e6b60de382087f4e3cd05a326cd8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 277248 ff8b78d10cb79fc1c9258cd43a408499\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 275932 874d04ecd1f692d9781e2cb47c687ee6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 276286 dbcc90161edc6a46b7a89a10b0fc22ff\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 50640 34b3065eb0fdc3a02576c9ebdd2508d9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 50700 77d1ae15ad63b7e9675225a6ca7db47c\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 268294 a60191beaaf0d62099dbd1a20eaf6b75\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 275830 f9a83308d8ecd6eb36d6791b864116c5\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 3050892 8283afde8651de38ff35c68ac9d34feb\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 273688 759941012b1848db94e34d6f1c57cfd6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 273764 bc27c920b5a85c643d3f9a7fa3bb2f9f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 3145220 f0cee6bc58f389ef78fc3cbcad757197\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 270550 b1aca209d3f63334b8512bd70e7fee04\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 3167356 72a44aac33deb66d1eed41b37d9f6f84\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 271130 cebd78501825a595f992a575371cd8b7\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 16170152 7dbf8514bc38e86a6d6454593628a9a8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 16319248 a099f9f04a33385dc29a7cc5ed743411\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 16384438 83d05912745de976a2648295241f0b15\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 16816198 1c14cd0e4867b12f05bea602a7940b11\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 16449650 9c195ec1b9f2b5f2531017389234d817\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 16358054 727d0f2e6e821a34c527c44946660653\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 16488812 1619800305c3c55e48f9b5484cd7ec39\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 1296346 6f233c2b69738b9d577a4c1d7d9283a3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 1323270 c3ba3e1299340fe9666746ada15cafe2\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 14258314 37215c1b602209320153136ddae5b53d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 14272088 00cfea4d19109eff959c360f63b90c18\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 50620 3d60ebbd894ac77ddaafaaba903083b8\n http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb\n Size/MD5 checksum: 50636 9277c97ebb5c14fc93c5449c5e5a391c\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_ia64.deb\n Size/MD5 checksum: 3078390 7c1dc7cf08fdce40fdb01acd14c6167b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_ia64.deb\n Size/MD5 checksum: 50644 4303c1255e6d4840b9ce34b8da158125\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-13etch1_ia64.deb\n Size/MD5 checksum: 50662 5235fb30a8f35c91ea15335ee439a60d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb\n Size/MD5 checksum: 251576 5b89eeb214501b0a1b6e2d2712763fe3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb\n Size/MD5 checksum: 251558 573aa9cc9fba9924a98a1b6ca786edfe\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb\n Size/MD5 checksum: 28008514 baaf3f87d60cb1d68c361cea849d3c27\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb\n Size/MD5 checksum: 28178022 c6cb8de82903383b78c7a9646d7df7da\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 3346354 c0c5d438a80a114ffbe515104f44785f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 50644 822db9efc5caba5bd3f96c2ffef90ce8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mips_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 50692 9fbd9cb53ce75b25243adfb5568bd2f9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 146348 4a2ede92f7cba5e409a01504a5787786\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 156600 b56c8fe624757cca08eafda9a7b62122\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 160930 14710075883c5cb17ed1f4dfa854461f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 179380 f61160dd2e459a70170e5ba8524aea36\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 179154 aba921bcc75c80c0c96c727eac34afaf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 6090314 99e9641ce38b6d0530199ad566738d73\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 8271518 6979492cd1b01cf3b76958211bfb3bdf\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 9037182 56824fbbc825d14d2fec62b2562f44ce\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 15636546 85bc62cca019e5d5c07374fe4ea05df8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb\n Size/MD5 checksum: 15608670 233369e78b74fdca2143c971995440f5\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 3346628 a208480b2fa7bdd13559b4078d03cac9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 50648 20d1bf2c345a889720562597f9300152\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mipsel_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 50712 31666ed837cac8aec136528616a7407f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 146012 ec774ccba8d1783239b0f12cee90abe3\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 152252 99657c9b655c5f1bded07e4a5394d132\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 152340 0c0778fa59bda664f8cb4f0f1ba8f90b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 174444 8927ed0b8d880d99fcc79c64ecc44c54\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 179284 8b01ba01c4d2e0e4a1dbfd4acd5354ea\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 179144 368da689abd47ca70aced24efec5b040\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 6025698 a355ec38f440f7e08d0f22ce6184bcf8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 5937952 2de36f1fdeb55373eb50fb77efe7f938\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 5921402 006d6d3d34f2db5b21500cdc8914dc08\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 9857018 4246c3b15aae0df84b669381a8f1383e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 15052960 317130eff4221493bf31349bb99d0eab\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb\n Size/MD5 checksum: 15019204 a5c6e183ff53d3c8fd169f0d2bc17ebc\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 3388916 6d6415c4241ea26786fd3a72899e266f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 50652 f19e0ad61b5e91f685e920a58248c8e9\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 50698 111c11da4f26a93122b76b6eac5b92c8\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 248366 7bafbd435e00ad6b647b347d84e1e0c1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 225218 90e19db35ef618a7e3f476576de60d95\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 248400 3dd8373a35220a27423c3f4eadd32358\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 248712 8a0281e9b856372f4d01c8a0f4b02d72\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 242934 92f3fda2938f60fdf6f957f0659712ab\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 3411216 b9070329bf0a6045896db2fc15f66f0a\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 248448 e108e05b4fe2239d4e95fb6598405fd6\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 249006 3908dfaf4f518192bd550ca5ac45476f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 16623606 b76fa67819092073c6bfc51904163278\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 15149270 502237df8e0f90e7ab95b28cbe7a5f8f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 16960668 69f13fe8bde671497363849f76636eda\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 18291108 9cc68d73b1bcf401176d1f93bd1dfeb1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 16395670 fbab6e355aba9c29f63603d097855c5e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 17006732 cca0573ca442e02ad6f153fcc059f734\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb\n Size/MD5 checksum: 18340518 3940b166f8b0464baa118c8557922edb\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 2939624 fada85c4d5ec9cbdee803116fde561b1\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 50642 9478b247c93b2ba8b405f93b525307ae\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-s390_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 50664 d694fdeff900e5b1ba575ad15bbd5310\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 139294 02bcbe57d1b62129243c8cb4b7bb8d2d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 139538 69993d0e2867ed4efa5bb0e442d3d014\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 2962698 36d89e72ac15117d15a3488878d205a4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 140274 5b8bacca256347a7ce02783651110e35\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 5398576 b1054f70f0472fd020241b6af904438d\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390-tape_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 1435060 daf41750946017171aad603b9218d0c4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 5613112 68d67210c4c6aa0ea54b1754df137d8e\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb\n Size/MD5 checksum: 5659570 c6a2db3553a427cecf69d9f1258e9444\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 3164578 902a8ff3089225278575251ba13f1f98\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 50640 455bd9863c6f183ee28d15e7ba9ddc38\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 50674 8416d5c20659923183729457854e139f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 161886 f58a554b0de7e05c4727bff1e236a069\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 191010 bad7bf07af89b1ba54ff559f99cf3d1b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 191776 f059b7c75ea312f69758d02e6da4cd4f\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 3186936 2a865cc6aed95cdc0ed3ebb20ec0a6d0\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 192172 197b2cd91975cbda876bc0ac18244870\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 6406184 e0ce977a5c79906c4996f069672e272b\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 10351700 69bc68d296d9134f6df792fb745c9810\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 10610496 b40bc9a07de220a54a1489b22d1d60f4\n http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb\n Size/MD5 checksum: 10656362 91c6c66c24c7d5ca45c0e6eb5dcdcbba\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ etch/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/etch/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFGw6BUhuANDBmkLRkRAoORAJ9xahJqDWTm6CV7/bRjmcFCfPYJuACcDG5b\n2aO+KPMNmsXmfH9W/1fMQtM=\n=L22s\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. (CVE-2007-4133)\n \n The IA32 system call emulation functionality in Linux kernel 2.4.x\n and 2.6.x before 2.6.22.7, when running on the x86_64 architecture,\n does not zero extend the eax register after the 32bit entry path to\n ptrace is used, which might allow local users to gain privileges by\n triggering an out-of-bounds access to the system call table using\n the %RAX register. (CVE-2007-4573)\n \n Integer underflow in the ieee80211_rx function in\n net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before\n 2.6.23 allows remote attackers to cause a denial of service (crash)\n via a crafted SKB length value in a runt IEEE 802.11 frame when\n the IEEE80211_STYPE_QOS_DATA flag is set, aka an off-by-two\n error. (CVE-2007-4997)\n \n The disconnect method in the Philips USB Webcam (pwc) driver in Linux\n kernel 2.6.x before 2.6.22.6 relies on user space to close the device,\n which allows user-assisted local attackers to cause a denial of service\n (USB subsystem hang and CPU consumption in khubd) by not closing the\n device after the disconnect is invoked. NOTE: this rarely crosses\n privilege boundaries, unless the attacker can convince the victim to\n unplug the affected device. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFIM/QcmqjQ0CJFipgRAua3AKCyF+W5X84EyQ0rcplkQs8m3TeBDQCgvo2f\nAEfloFQ4ShfC936g0fSh5vo=\n=RHR2\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2007-3851" }, { "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "db": "BID", "id": "25263" }, { "db": "VULHUB", "id": "VHN-27213" }, { "db": "VULMON", "id": "CVE-2007-3851" }, { "db": "PACKETSTORM", "id": "59004" }, { "db": "PACKETSTORM", "id": "58993" }, { "db": "PACKETSTORM", "id": "58639" }, { "db": "PACKETSTORM", "id": "66584" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-3851", "trust": 3.3 }, { "db": "BID", "id": "25263", "trust": 2.9 }, { "db": "SECUNIA", "id": "26389", "trust": 2.6 }, { "db": "SECUNIA", "id": "26450", "trust": 1.8 }, { "db": "SECUNIA", "id": "27227", "trust": 1.8 }, { "db": "SECUNIA", "id": "26500", "trust": 1.8 }, { "db": "SECUNIA", "id": "26760", "trust": 1.8 }, { "db": "SECUNIA", "id": "26643", "trust": 1.8 }, { "db": "SECUNIA", "id": "26664", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2007-2854", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-000692", "trust": 0.8 }, { "db": "UBUNTU", "id": "USN-509-1", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-510-1", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDVSA-2008:105", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2007:051", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2007:053", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2007:0705", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1356", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200708-174", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-27213", "trust": 0.1 }, { "db": "VUPEN", "id": "2007/2854", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2007-3851", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "59004", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "58993", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "58639", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "66584", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-27213" }, { "db": "VULMON", "id": "CVE-2007-3851" }, { "db": "BID", "id": "25263" }, { "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "db": "PACKETSTORM", "id": "59004" }, { "db": "PACKETSTORM", "id": "58993" }, { "db": "PACKETSTORM", "id": "58639" }, { "db": "PACKETSTORM", "id": "66584" }, { "db": "CNNVD", "id": "CNNVD-200708-174" }, { "db": "NVD", "id": "CVE-2007-3851" } ] }, "id": "VAR-200708-0604", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-27213" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:27:48.307000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ChangeLog-2.6.22.2", "trust": 0.8, "url": "http://www.kernel.org/pub/linux/kernel/v2.6/changelog-2.6.22.2" }, { "title": "RHSA-2007:0705", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2007-0705.html" }, { "title": "RHSA-2007:0705", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2007-0705j.html" }, { "title": "Ubuntu Security Notice: linux-source-2.6.17 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-509-1" }, { "title": "Ubuntu Security Notice: linux-source-2.6.20 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-510-1" }, { "title": "Debian Security Advisories: DSA-1356-1 linux-2.6 -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=dbc12ca9823e98eb7504357da5ff0825" } ], "sources": [ { "db": "VULMON", "id": "CVE-2007-3851" }, { "db": "JVNDB", "id": "JVNDB-2007-000692" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-27213" }, { "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "db": "NVD", "id": "CVE-2007-3851" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.securityfocus.com/bid/25263" }, { "trust": 2.6, "url": "http://secunia.com/advisories/26389" }, { "trust": 2.1, "url": "http://kernel.org/pub/linux/kernel/v2.6/changelog-2.6.22.2" }, { "trust": 1.8, "url": "http://secunia.com/advisories/26450" }, { "trust": 1.8, "url": "http://secunia.com/advisories/26500" }, { "trust": 1.8, "url": "http://secunia.com/advisories/26643" }, { "trust": 1.8, "url": "http://secunia.com/advisories/26664" }, { "trust": 1.8, "url": "http://secunia.com/advisories/26760" }, { "trust": 1.8, "url": "http://secunia.com/advisories/27227" }, { "trust": 1.8, "url": "http://www.debian.org/security/2007/dsa-1356" }, { "trust": 1.8, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:105" }, { "trust": 1.8, "url": "http://www.redhat.com/support/errata/rhsa-2007-0705.html" }, { "trust": 1.8, "url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html" }, { "trust": 1.8, "url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-509-1" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-510-1" }, { "trust": 1.8, "url": "https://issues.rpath.com/browse/rpl-1620" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/2854" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2007/2854" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11196" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3851" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3851" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3851" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2007-0705.html" }, { "trust": 0.3, "url": "http://support.novell.com/techcenter/psdb/a4e6d19f94707022b621550d1049f74e.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3513" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3848" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2876" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3105" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3104" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4308" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3642" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2525" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/399.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/509-1/" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3843" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-generic_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-386_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-kernel-devel_2.6.20-16.31_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-16-lowlatency_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/irda-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/socket-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ipv6-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/sata-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ide-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc-smp_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-doc-2.6.20_2.6.20-16.31_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-server_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-sparc64-smp_2.6.20-16.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-generic_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-generic_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-server_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server-bigiron_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/kernel-image-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-386_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/md-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-libc-dev_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-generic_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-powerpc_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-sparc64_2.6.20-16.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fb-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-server_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/block-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/ppp-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-source-2.6.20_2.6.20-16.31_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/parport-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-secondary-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-shared-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/firewire-core-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-usb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/input-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-pcmcia-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.20/linux-image-2.6.20-16-lowlatency_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16-386_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/acpi-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-debug-2.6.20-16-generic_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nfs-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-headers-2.6.20-16_2.6.20-16.31_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/speakup-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2878" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-generic_2.6.20-16.31_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/message-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pata-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/pcmcia-storage-modules-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/storage-core-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/cdrom-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/nic-firmware-2.6.20-16-386-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/floppy-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/usb-modules-2.6.20-16-generic-di_2.6.20-16.31_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/linux-image-2.6.20-16-powerpc64-smp_2.6.20-16.31_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fs-core-modules-2.6.20-16-powerpc64-smp-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/plip-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2875" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/serial-modules-2.6.20-16-generic-di_2.6.20-16.31_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/scsi-firmware-2.6.20-16-powerpc-di_2.6.20-16.31_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.20/fat-modules-2.6.20-16-sparc64-di_2.6.20-16.31_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc-smp_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fs-common-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-generic_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server_2.6.17.1-12.40_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server-bigiron_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-sparc64_2.6.17.1-12.40_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.40.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc64-smp_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-generic_2.6.17.1-12.40_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-generic_2.6.17.1-12.40_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-kernel-devel_2.6.17.1-12.40_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server_2.6.17.1-12.40_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-386_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc-smp_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.40_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server-bigiron_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-sparc64-smp_2.6.17.1-12.40_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-386_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/hfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-sparc64_2.6.17.1-12.40_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-sparc64-smp_2.6.17.1-12.40_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-doc-2.6.17_2.6.17.1-12.40_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ipv6-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-server_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1-12.40.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fs-common-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-server-bigiron_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc-smp_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-source-2.6.17/linux-image-kdump_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-powerpc64-smp_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/plip-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/input-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/xfs-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-sparc64-smp_2.6.17.1-12.40_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-sparc64_2.6.17.1-12.40_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-debug-2.6.17-12-powerpc_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-shared-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-386_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/hfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.40_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/pcmcia-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12-generic_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fat-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ide-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/kernel-image-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.40_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/floppy-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/jfs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-generic_2.6.17.1-12.40_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-core-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-server_2.6.17.1-12.40_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-powerpc64-smp_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-source-2.6.17_2.6.17.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-image-2.6.17-12-generic_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ufs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/socket-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/affs-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-firmware-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/sata-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-pcmcia-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext3-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.40_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-libc-dev_2.6.17.1-12.40_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/irda-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/reiserfs-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/serial-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/parport-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ext2-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/usb-storage-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-usb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/acpi-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/cdrom-core-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ntfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/scsi-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-powerpc-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nic-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.40_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/linux-headers-2.6.17-12_2.6.17.1-12.40_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/fb-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-powerpc64-smp-di_2.6.17.1-12.40_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/crc-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/nfs-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/md-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/ppp-modules-2.6.17-12-sparc64-di_2.6.17.1-12.40_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/loop-modules-2.6.17-12-generic-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/speakup-modules-2.6.17-12-generic-di_2.6.17.1-12.40_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.17/firewire-core-modules-2.6.17-12-386-di_2.6.17.1-12.40_i386.udeb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-13etch1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-i386_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-rpc_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-generic_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-ia64_2.6.18.dfsg.1-13etch1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2172" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-prep_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-13etch1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390-tape_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-itanium_2.6.18.dfsg.1-13etch1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-footbridge_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-486_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-k7_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-1353" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64-smp_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-hppa_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2453" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r4k-kn04_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-alpha-legacy_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s390_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-alpha-smp_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mips_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-s390_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1a-bcm91480b_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-13etch1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r3k-kn02_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r5k-ip32_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-686-bigmem_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch1.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-s3c2410_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-s390x_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-mckinley_2.6.18.dfsg.1-13etch1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-alpha_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc-smp_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-iop32x_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-ixp4xx_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc64_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-k7_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-s390x_2.6.18.dfsg.1-13etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sb1-bcm91250a_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc64_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-r4k-ip22_2.6.18.dfsg.1-13etch1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc-miboot_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-13etch1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-qemu_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-686_2.6.18.dfsg.1-13etch1_i386.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-mipsel_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-parisc_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-r5k-cobalt_2.6.18.dfsg.1-13etch1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-powerpc_2.6.18.dfsg.1-13etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-parisc-smp_2.6.18.dfsg.1-13etch1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-5_2.6.18.dfsg.1-13etch1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13etch1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-alpha_2.6.18.dfsg.1-13etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-arm_2.6.18.dfsg.1-13etch1_arm.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4133" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4997" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3740" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-5093" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5093" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4133" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1669" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1375" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4573" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4997" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3740" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1669" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1375" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/security/kernelupdate" } ], "sources": [ { "db": "VULHUB", "id": "VHN-27213" }, { "db": "VULMON", "id": "CVE-2007-3851" }, { "db": "BID", "id": "25263" }, { "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "db": "PACKETSTORM", "id": "59004" }, { "db": "PACKETSTORM", "id": "58993" }, { "db": "PACKETSTORM", "id": "58639" }, { "db": "PACKETSTORM", "id": "66584" }, { "db": "CNNVD", "id": "CNNVD-200708-174" }, { "db": "NVD", "id": "CVE-2007-3851" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-27213" }, { "db": "VULMON", "id": "CVE-2007-3851" }, { "db": "BID", "id": "25263" }, { "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "db": "PACKETSTORM", "id": "59004" }, { "db": "PACKETSTORM", "id": "58993" }, { "db": "PACKETSTORM", "id": "58639" }, { "db": "PACKETSTORM", "id": "66584" }, { "db": "CNNVD", "id": "CNNVD-200708-174" }, { "db": "NVD", "id": "CVE-2007-3851" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-08-13T00:00:00", "db": "VULHUB", "id": "VHN-27213" }, { "date": "2007-08-13T00:00:00", "db": "VULMON", "id": "CVE-2007-3851" }, { "date": "2007-08-09T00:00:00", "db": "BID", "id": "25263" }, { "date": "2007-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "date": "2007-09-01T04:09:47", "db": "PACKETSTORM", "id": "59004" }, { "date": "2007-08-31T17:03:00", "db": "PACKETSTORM", "id": "58993" }, { "date": "2007-08-16T08:55:55", "db": "PACKETSTORM", "id": "58639" }, { "date": "2008-05-22T05:14:01", "db": "PACKETSTORM", "id": "66584" }, { "date": "2007-08-13T00:00:00", "db": "CNNVD", "id": "CNNVD-200708-174" }, { "date": "2007-08-13T19:17:00", "db": "NVD", "id": "CVE-2007-3851" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-29T00:00:00", "db": "VULHUB", "id": "VHN-27213" }, { "date": "2017-09-29T00:00:00", "db": "VULMON", "id": "CVE-2007-3851" }, { "date": "2008-05-21T20:34:00", "db": "BID", "id": "25263" }, { "date": "2007-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000692" }, { "date": "2007-10-25T00:00:00", "db": "CNNVD", "id": "CNNVD-200708-174" }, { "date": "2017-09-29T01:29:08.157000", "db": "NVD", "id": "CVE-2007-3851" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "25263" }, { "db": "PACKETSTORM", "id": "58993" }, { "db": "CNNVD", "id": "CNNVD-200708-174" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux Kernel of drm/i915 Elevation of privilege vulnerability in components", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000692" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-174" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.